SlideShare a Scribd company logo
OSI MODELOSI MODEL
WITHWITH
NETWORKING OVERVIEWNETWORKING OVERVIEW
Networking
Network
“ ... communication system for connecting end-systems”
End-systems a.k.a. “hosts”
PCs, workstations
dedicated computers
network components
Multiaccess vs. Point-to-point
 Multiaccess means shared medium.
 many end-systems share the same physical communication resources (wire,
frequency, ...)
 There must be some arbitration mechanism.
 Point-to-point
 only 2 systems involved
 no doubt about where data came from !
MultiaccessMultiaccess Point-to-pointPoint-to-point
LAN - Local Area Network
 connects computers that are physically close together
( < 1 mile).
 high speed
 multi-access
 Technologies:
 Ethernet 10 Mbps, 100Mbps
 Token Ring16 Mbps
 FDDI 100 Mbps
WAN - Wide Area Network
 connects computers that are physically far apart.
“long-haul network”.
 typically slower than a LAN.
 typically less reliable than a LAN.
 point-to-point
 Technologies:
 telephone lines
 Satellite communications
MAN - Metropolitan Area Network
 Larger than a LAN and smaller than a WAN
- example: campus-wide network
- multi-access network
 Technologies:
 coaxial cable
 microwave
Internetwork
 Connection of 2 or more distinct (possibly dissimilar) networks.
 Requires some kind of network device to facilitate the
connection.
Net A Net B
OSI Reference Model
 Layered model:
7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data Link
1. Physical
The Physical Layer
 Responsibility:
 transmission of raw bits over a communication channel.
 Issues:
 mechanical and electrical interfaces
 time per bit
 distances
Data Link Layer -
Data Link Control
 Responsibility:
 provide an error-free communication link
 Issues:
 framing (dividing data into chunks)
 header & trailer bits
 addressing
10110110101 01100010011 10110000001
Data Link Layer –
The MAC sub layer
 Medium Access Control - needed by mutiaccess networks.
 MAC provides DLC with “virtual wires” on multiaccess networks.
The Network Layer
 Responsibilities:
 path selection between end-systems (routing).
 subnet flow control.
 fragmentation & reassembly
 translation between different network types.
 Issues:
 packet headers
 virtual circuits
The Transport Layer
 Responsibilities:
 provides virtual end-to-end links between peer processes.
 end-to-end flow control
 Issues:
 headers
 error detection
 reliable communication
The Session Layer
 Responsibilities:
 establishes, manages, and terminates sessions between
applications.
 service location lookup
 Many protocol suites do not include a session layer.
The Presentation Layer
 Responsibilities:
 data encryption
 data compression
 data conversion
 Many protocol suites do not include a Presentation
Layer.
The Application Layer
 Responsibilities:
 anything not provided by any of the other layers
 Issues:
 application level protocols
 appropriate selection of “type of service”
Layering & Headers
 Each layer needs to add some control information to the data in
order to do it’s job.
 This information is typically prepended to the data before being
given to the lower layer.
 Once the lower layers deliver the the data and control
information - the peer layer uses the control information.
Headers
Process
Transport
Networ
k
Data
Link
Process
Transport
Network
Data Link
DATA
DATA
DATA
DATA
H
H
H
H
HH
What are the headers?
Physical: no header - just a bunch of bits.
Data Link:
 address of the receiving endpoints
 address of the sending endpoint
 length of the data
 checksum.
Network layer header - examples
 protocol suite version
 type of service
 length of the data
 packet identifier
 fragment number
 time to live
protocolprotocol
header checksumheader checksum
source networksource network
addressaddress
destination networkdestination network
addressaddress
Important Summary
 Data-Link: communication between machines on the
same network.
 Network: communication between machines on
possibly different networks.
 Transport: communication between processes
(running on machines on possibly different networks).
Connecting Networks
 Repeater: physical layer
 Bridge: data link layer
 Router: network layer
 Gateway: network layer and above.
Repeater
 Copies bits from one network to another
 Does not look at any bits
 Allows the extension of a network beyond physical length
limitations
REPEATER
Bridge
 Copies frames from one network to another
 Can operate selectively - does not copy all frames (must look at
data-link headers).
 Extends the network beyond physical length limitations.
BRIDGE
Router
 Copies packets from one network to another.
 Makes decisions about what route a packet should take (looks at
network headers).
ROUTERROUTER
Gateway
 Operates as a router
 Data conversions above the network layer.
 Conversions:
encapsulation - use an intermediate network
translation - connect different application protocols
encrpyption - could be done by a gateway
Encapsulation Example
 Provides service connectivity even though
intermediate network does not support protocols.
Gateway Gateway
Translation
 Translate from green protocol to brown protocol
Gateway
Encryption gateway
Encryption/Decryption
Gateways
Secure
Network
Secure
Network
GWGW ?
?
?
Insecure Network
Hardware vs. Software
 Repeaters are typically hardware devices.
 Bridges can be implemented in hardware or software.
 Routers & Gateways are typically implemented in software so that they
can be extended to handle new protocols.
 Many workstations can operate as routers or gateways.
Multiplexing
 “.. to combine many into one”.
 Many processes sharing a single network interface.
 A single process could use multiple protocols.
 More on this when we look at TCP/IP.
Modes of Service
 connection-oriented vs. connectionless
 sequencing
 error-control
 flow-control
 byte stream vs. message based
 full-duplex vs. half-duplex.
Connection-Oriented vs.
Connectionless Service
 A connection-oriented service includes the
establishment of a logical connection between 2
processes.
 establish logical connection
 transfer data
 terminate connection.
 Connectionless services involve sending of
independent messages.
Sequencing
 Sequencing provides support for an order to
communications.
 A service that includes sequencing requires that
messages (or bytes) are received in the same order
they are sent.
Error Control
 Some services require error detection (it is important to
know when a transmission error has occured).
 Checksums provide a simple error detection
mechanism.
 Error control sometimes involves notification and
retransmission.
Flow Control
 Flow control prevents the sending process from
overwhelming the receiving process.
 Flow control can be handled a variety of ways - this is
one of the major research issues in the development
of the next generation of networks (ATM).
Byte Stream vs. Message
 Byte stream implies an ordered sequence of bytes
with no message boundaries.
 Message oriented services provide communication
service to chunks of data called datagrams.
Full- vs. Half-Duplex
 Full-Duplex services support the transfer of data in both
directions.
 Half-Duplex services support the transfer of data in a
single direction.
End-to-End vs. Hop-toHop
 Many service modes/features such as flow control and
error control can be done either:
between endpoints of the communication.
-or-
between every 2 nodes on the path between the
endpoints.
End-to-End
Process A
Process B
Hop-by-Hop
Process A
Process B
Buffering
 Buffering can provide more efficient communications.
 Buffering is most useful for byte stream services.
Process A Process B
Send
Buffer
Recv.
Buffer
Addresses
 Each communication endpoint must have an address.
 Consider 2 processes communicating over an internet:
 the network must be specified
 the host (end-system) must be specified
 the process must be specified.
Addresses at Layers
 Physical Layer: no address necessary
 Data Link Layer - address must be able to select any
host on the network.
 Network Layer - address must be able to provide
information to enable routing.
 Transport Layer - address must identify the destination
process.
Broadcasts
 Many networks support the notion of sending a
message from one host to all other hosts on the
network.
 A special address called the “broadcast address” is
often used.
 Some popular network services are based on
broadcasting (YP/NIS, rup, rusers)

More Related Content

What's hot

OSI MODEL
OSI MODELOSI MODEL
OSI MODELMousa_k
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsGayathri Kesavan
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP modelRubal Sagwal
 
Computer Networks - Layers in OSI Model
Computer Networks - Layers in OSI ModelComputer Networks - Layers in OSI Model
Computer Networks - Layers in OSI ModelShreyash Agarwal
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsbhavanatmithun
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of NetworkingMukesh Tekwani
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerNetwax Lab
 
OSI reference model
OSI reference modelOSI reference model
OSI reference modelIshan Udyoga
 
OSI MODEL AND ITS PROTOCOL
OSI MODEL AND ITS PROTOCOLOSI MODEL AND ITS PROTOCOL
OSI MODEL AND ITS PROTOCOLIkhlas Rahman
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)Tutun Juhana
 
Osi & ip presentation
Osi & ip presentationOsi & ip presentation
Osi & ip presentationMonika Vijay
 
Network protocols
Network protocolsNetwork protocols
Network protocolsHemnath R.
 
OSI(Open System Interconnection) model
OSI(Open System Interconnection) modelOSI(Open System Interconnection) model
OSI(Open System Interconnection) modelNamra Afzal
 
Introduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerIntroduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerVNIT-ACM Student Chapter
 

What's hot (20)

OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol Functions
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 
Computer Networks - Layers in OSI Model
Computer Networks - Layers in OSI ModelComputer Networks - Layers in OSI Model
Computer Networks - Layers in OSI Model
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
 
Osi model
Osi modelOsi model
Osi model
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP Layer
 
OSI MODEL - A PROJECT
OSI MODEL - A PROJECTOSI MODEL - A PROJECT
OSI MODEL - A PROJECT
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
Protocols
ProtocolsProtocols
Protocols
 
OSI MODEL AND ITS PROTOCOL
OSI MODEL AND ITS PROTOCOLOSI MODEL AND ITS PROTOCOL
OSI MODEL AND ITS PROTOCOL
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
Osi & ip presentation
Osi & ip presentationOsi & ip presentation
Osi & ip presentation
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
osi vs tcp/ip
osi vs tcp/iposi vs tcp/ip
osi vs tcp/ip
 
OSI(Open System Interconnection) model
OSI(Open System Interconnection) modelOSI(Open System Interconnection) model
OSI(Open System Interconnection) model
 
Introduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerIntroduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link Layer
 

Viewers also liked

Viewers also liked (16)

Tcp and introduction to protocol
Tcp and introduction to protocolTcp and introduction to protocol
Tcp and introduction to protocol
 
Subnetting
SubnettingSubnetting
Subnetting
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
INTEGRATED CIRCUIT
INTEGRATED CIRCUITINTEGRATED CIRCUIT
INTEGRATED CIRCUIT
 
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTERANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
 
Processor
ProcessorProcessor
Processor
 
Storage device
Storage deviceStorage device
Storage device
 
configure IP address in command mode
configure IP address in command modeconfigure IP address in command mode
configure IP address in command mode
 
CCNA ALL IN ONE
CCNA ALL IN ONE CCNA ALL IN ONE
CCNA ALL IN ONE
 
Basics of computer
Basics of computerBasics of computer
Basics of computer
 
IEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer ProtocolIEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer Protocol
 
01.number systems
01.number systems01.number systems
01.number systems
 
Iso model
Iso modelIso model
Iso model
 
Raid Levels
Raid LevelsRaid Levels
Raid Levels
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and Internet
 

Similar to Osi model with neworking overview

Data & comp. communication
Data & comp. communicationData & comp. communication
Data & comp. communicationAshwin Namewar
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsRajet Veshin
 
Jaimin chp-1 - introduction - 2011 batch
Jaimin   chp-1  - introduction - 2011 batchJaimin   chp-1  - introduction - 2011 batch
Jaimin chp-1 - introduction - 2011 batchJaimin Jani
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer NetworksGhaffar Khan
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnologyGulrez Khan
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)Sri Prasanna
 
Networking
NetworkingNetworking
NetworkingSNancy
 
Computer Networks | Communication Networks
Computer Networks | Communication NetworksComputer Networks | Communication Networks
Computer Networks | Communication NetworksDr. Rahul Pandya
 

Similar to Osi model with neworking overview (20)

Data & comp. communication
Data & comp. communicationData & comp. communication
Data & comp. communication
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Jaimin chp-1 - introduction - 2011 batch
Jaimin   chp-1  - introduction - 2011 batchJaimin   chp-1  - introduction - 2011 batch
Jaimin chp-1 - introduction - 2011 batch
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
Computer network basics
Computer network basicsComputer network basics
Computer network basics
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Networking
NetworkingNetworking
Networking
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Networking
NetworkingNetworking
Networking
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
Sem 1 Ch 5
Sem 1 Ch 5Sem 1 Ch 5
Sem 1 Ch 5
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
Computer Networks | Communication Networks
Computer Networks | Communication NetworksComputer Networks | Communication Networks
Computer Networks | Communication Networks
 
computer network basics
computer network basicscomputer network basics
computer network basics
 
Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
 
Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform EngineeringJemma Hussein Allen
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»QADay
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

Osi model with neworking overview

  • 1. OSI MODELOSI MODEL WITHWITH NETWORKING OVERVIEWNETWORKING OVERVIEW
  • 3. Network “ ... communication system for connecting end-systems” End-systems a.k.a. “hosts” PCs, workstations dedicated computers network components
  • 4. Multiaccess vs. Point-to-point  Multiaccess means shared medium.  many end-systems share the same physical communication resources (wire, frequency, ...)  There must be some arbitration mechanism.  Point-to-point  only 2 systems involved  no doubt about where data came from !
  • 6. LAN - Local Area Network  connects computers that are physically close together ( < 1 mile).  high speed  multi-access  Technologies:  Ethernet 10 Mbps, 100Mbps  Token Ring16 Mbps  FDDI 100 Mbps
  • 7. WAN - Wide Area Network  connects computers that are physically far apart. “long-haul network”.  typically slower than a LAN.  typically less reliable than a LAN.  point-to-point  Technologies:  telephone lines  Satellite communications
  • 8. MAN - Metropolitan Area Network  Larger than a LAN and smaller than a WAN - example: campus-wide network - multi-access network  Technologies:  coaxial cable  microwave
  • 9. Internetwork  Connection of 2 or more distinct (possibly dissimilar) networks.  Requires some kind of network device to facilitate the connection. Net A Net B
  • 10. OSI Reference Model  Layered model: 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical
  • 11. The Physical Layer  Responsibility:  transmission of raw bits over a communication channel.  Issues:  mechanical and electrical interfaces  time per bit  distances
  • 12. Data Link Layer - Data Link Control  Responsibility:  provide an error-free communication link  Issues:  framing (dividing data into chunks)  header & trailer bits  addressing 10110110101 01100010011 10110000001
  • 13. Data Link Layer – The MAC sub layer  Medium Access Control - needed by mutiaccess networks.  MAC provides DLC with “virtual wires” on multiaccess networks.
  • 14. The Network Layer  Responsibilities:  path selection between end-systems (routing).  subnet flow control.  fragmentation & reassembly  translation between different network types.  Issues:  packet headers  virtual circuits
  • 15. The Transport Layer  Responsibilities:  provides virtual end-to-end links between peer processes.  end-to-end flow control  Issues:  headers  error detection  reliable communication
  • 16. The Session Layer  Responsibilities:  establishes, manages, and terminates sessions between applications.  service location lookup  Many protocol suites do not include a session layer.
  • 17. The Presentation Layer  Responsibilities:  data encryption  data compression  data conversion  Many protocol suites do not include a Presentation Layer.
  • 18. The Application Layer  Responsibilities:  anything not provided by any of the other layers  Issues:  application level protocols  appropriate selection of “type of service”
  • 19. Layering & Headers  Each layer needs to add some control information to the data in order to do it’s job.  This information is typically prepended to the data before being given to the lower layer.  Once the lower layers deliver the the data and control information - the peer layer uses the control information.
  • 21. What are the headers? Physical: no header - just a bunch of bits. Data Link:  address of the receiving endpoints  address of the sending endpoint  length of the data  checksum.
  • 22. Network layer header - examples  protocol suite version  type of service  length of the data  packet identifier  fragment number  time to live protocolprotocol header checksumheader checksum source networksource network addressaddress destination networkdestination network addressaddress
  • 23. Important Summary  Data-Link: communication between machines on the same network.  Network: communication between machines on possibly different networks.  Transport: communication between processes (running on machines on possibly different networks).
  • 24. Connecting Networks  Repeater: physical layer  Bridge: data link layer  Router: network layer  Gateway: network layer and above.
  • 25. Repeater  Copies bits from one network to another  Does not look at any bits  Allows the extension of a network beyond physical length limitations REPEATER
  • 26. Bridge  Copies frames from one network to another  Can operate selectively - does not copy all frames (must look at data-link headers).  Extends the network beyond physical length limitations. BRIDGE
  • 27. Router  Copies packets from one network to another.  Makes decisions about what route a packet should take (looks at network headers). ROUTERROUTER
  • 28. Gateway  Operates as a router  Data conversions above the network layer.  Conversions: encapsulation - use an intermediate network translation - connect different application protocols encrpyption - could be done by a gateway
  • 29. Encapsulation Example  Provides service connectivity even though intermediate network does not support protocols. Gateway Gateway
  • 30. Translation  Translate from green protocol to brown protocol Gateway
  • 32. Hardware vs. Software  Repeaters are typically hardware devices.  Bridges can be implemented in hardware or software.  Routers & Gateways are typically implemented in software so that they can be extended to handle new protocols.  Many workstations can operate as routers or gateways.
  • 33. Multiplexing  “.. to combine many into one”.  Many processes sharing a single network interface.  A single process could use multiple protocols.  More on this when we look at TCP/IP.
  • 34. Modes of Service  connection-oriented vs. connectionless  sequencing  error-control  flow-control  byte stream vs. message based  full-duplex vs. half-duplex.
  • 35. Connection-Oriented vs. Connectionless Service  A connection-oriented service includes the establishment of a logical connection between 2 processes.  establish logical connection  transfer data  terminate connection.  Connectionless services involve sending of independent messages.
  • 36. Sequencing  Sequencing provides support for an order to communications.  A service that includes sequencing requires that messages (or bytes) are received in the same order they are sent.
  • 37. Error Control  Some services require error detection (it is important to know when a transmission error has occured).  Checksums provide a simple error detection mechanism.  Error control sometimes involves notification and retransmission.
  • 38. Flow Control  Flow control prevents the sending process from overwhelming the receiving process.  Flow control can be handled a variety of ways - this is one of the major research issues in the development of the next generation of networks (ATM).
  • 39. Byte Stream vs. Message  Byte stream implies an ordered sequence of bytes with no message boundaries.  Message oriented services provide communication service to chunks of data called datagrams.
  • 40. Full- vs. Half-Duplex  Full-Duplex services support the transfer of data in both directions.  Half-Duplex services support the transfer of data in a single direction.
  • 41. End-to-End vs. Hop-toHop  Many service modes/features such as flow control and error control can be done either: between endpoints of the communication. -or- between every 2 nodes on the path between the endpoints.
  • 44. Buffering  Buffering can provide more efficient communications.  Buffering is most useful for byte stream services. Process A Process B Send Buffer Recv. Buffer
  • 45. Addresses  Each communication endpoint must have an address.  Consider 2 processes communicating over an internet:  the network must be specified  the host (end-system) must be specified  the process must be specified.
  • 46. Addresses at Layers  Physical Layer: no address necessary  Data Link Layer - address must be able to select any host on the network.  Network Layer - address must be able to provide information to enable routing.  Transport Layer - address must identify the destination process.
  • 47. Broadcasts  Many networks support the notion of sending a message from one host to all other hosts on the network.  A special address called the “broadcast address” is often used.  Some popular network services are based on broadcasting (YP/NIS, rup, rusers)