SlideShare a Scribd company logo
TCP/IP and the
Seven Layers
Objectives
 TheOSI

Seven Layer Model
 The TCP/IP 4 Layer Model
 TCP/IP






Counting in Binary
IP Addresses
Subnet Masks
RFC1918
The OSI Reference Model


In the early 1980s, the International Standards Organization (ISO)
developed the Open Systems Interconnect (OSI) reference model to
standardize the way devices communicate on a network. This model was
a major step toward ensuring interoperability between network devices.



A system that implements protocol behaviour consisting of a series of
these layers is known as a protocol stack. Protocol stacks can be
implemented either in hardware or software, or a combination of both.
Typically, only the lower layers are implemented in hardware, and the
higher layers are implemented in software. Each layer is responsible for
part of the processing to prepare data for transmission on the network. The
chart shows what each layer of the OSI model does.



In the OSI model, when data is transferred, it is said to virtually travel down
the OSI model layers of the sending computer and up the OSI model
layers of the receiving computer.



When a user sends data, such as an email, the encapsulation process
starts at the application layer. The application layer provides network
access to applications. Information flows through the top three layers and
is considered to be data when it gets down to the transport layer.
The TCP/IP Model


An architectural model is a common frame of reference for
explaining Internet communications and developing
communication protocols. It separates the functions of protocols
into manageable layers. Each layer performs a specific function in
the process of communicating over a network.



The TCP/IP model was created by researchers in the U.S.
Department of Defense (DoD). The TCP/IP suite of protocols is the
dominant standard for transporting data across networks and the
Internet. It consists of layers that perform functions necessary to
prepare data for transmission over a network. The chart shows the
four layers of the TCP/IP model.



A message begins at the top application layer and moves down
the TCP/IP layers to the bottom network access layer. Header
information is added to the message as it moves down through
each layer and is then transmitted. After reaching the destination,
the message travels back up through each layer. The header
information that was added to the message is stripped away as
the message moves up through the layers toward its destination.
The models together




The OSI model and the TCP/IP model are both
reference models used to describe the data
communication process. The TCP/IP model is used
specifically for the TCP/IP suite of protocols, and
the OSI model is used for the development of
standard communication for equipment and
applications from different vendors.
The TCP/IP model performs the same process as
the OSI model, but uses four layers instead of
seven. The chart shows how the layers of the two
models compare.
TCP/IP




Transmission Control Protocol/Internet Protocol
(TCP/IP) defines the rules computers must follow to
communicate with each other over the Internet. TCP
is the primary Internet protocol for the reliable
delivery of data. IP provides an addressing structure
that is responsible for delivering data from the source
computer to the destination computer.
An IP address is a number that is used to identify a
device on the network. Each device on a network
must have a unique IP address to communicate with
other network devices. As noted earlier, a host is a
device that sends or receives information on the
network. Network devices are devices that move
data across the network.
TCP/IP


A person's fingerprints usually do not change. They provide a way
to physically identify people. The mailing address of a person can
change, as it relates to where the person lives or picks up mail. This
address can change. On a host, the Media Access Control (MAC)
address is assigned to the host NIC and is known as the physical
address. The physical address remains the same regardless of
where the host is placed on the network, in the same way that
fingerprints remain with the person regardless of where the person
goes. MAC addresses consist of 6 groupings of 2 hexadecimal
values separated by either a dash (-) or a colon (:), for example, 0026-6C-FC-D5-AE. Hexadecimal values are defined as a range of the
numbers from 0-9 and the letters a-f.



The IP address is similar to the mailing address of a person. It is
known as a logical address because it is logically assigned based
on the host location. The IP address, or network address, is based
on the local network and is assigned to each host by a network
administrator. This process is similar to the local government
assigning a street address based on the logical description of the
city or village and neighbourhood.
TCP/IP v4


An IPv4 address consists of a series of 32 binary bits (ones
and zeros). It is difficult for humans to read a binary IPv4
address. For this reason, the 32 bits are grouped into four
segments of 8 bits called octets. An IPv4 address, even in
this grouped format, is hard for humans to read, write, and
remember. Therefore, each octet is presented as its
decimal value, separated by a decimal point or period.
This format is referred to as dotted-decimal notation.



When a host is configured with an IPv4 address, it is entered
as a dotted-decimal number, such as 192.168.1.5. Imagine
if you had to enter the 32-bit binary equivalent of this:
11000000101010000000000100000101. If just one bit were
mistyped, the address would be different, and the host
might not be able to communicate on the network.
TCP/IP v4


The logical 32-bit IPv4 address is hierarchical and is
composed of two parts. The first part identifies the
network, and the second part identifies a host on
that network. Both parts are required. For example,
if a host has the IPv4 address 192.168.18.57, the first
three octets, 192.168.18, identify the network
portion of the address, and the last octet, 57
identifies the host. This is known as hierarchical
addressing, because routers only need to
communicate with networks and not individual
hosts. A router is a networking device that forwards
data packets across networks toward their
destinations.

More Related Content

What's hot

IP Address
IP AddressIP Address
IP Address
Rahul P
 
OSI MODEL
OSI MODELOSI MODEL
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORT
Rajat Kumar
 
Ipv4 presentation
Ipv4 presentationIpv4 presentation
Ipv4 presentation
shakeel khan
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP Addressing
Bisrat Girma
 
Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)
Geethu Jose
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
Rishav Bhurtel
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
junnubabu
 
Protocol architecture TCP IP
Protocol architecture TCP IPProtocol architecture TCP IP
Protocol architecture TCP IP
ToufiqueAhmed13
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
urooj ehsan
 
Ip address
Ip address Ip address
Ip address
Yash Bansal
 
Presentation on TCP/IP Model
Presentation on TCP/IP ModelPresentation on TCP/IP Model
Presentation on TCP/IP Model
Abir Junayed
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
Adeel Rasheed
 
Ip and mac addressing
Ip and mac addressingIp and mac addressing
Ip and mac addressing
nafisarayhana1
 
Computer Networks 3
Computer Networks 3Computer Networks 3
Computer Networks 3
Mr Smith
 
Ip address
Ip addressIp address
IP, Addressing, Host
IP, Addressing, HostIP, Addressing, Host
IP, Addressing, Host
AfsanaAkterRubi
 

What's hot (20)

IP Address
IP AddressIP Address
IP Address
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORT
 
Ipv4 presentation
Ipv4 presentationIpv4 presentation
Ipv4 presentation
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP Addressing
 
TCP IP Addressing
TCP IP AddressingTCP IP Addressing
TCP IP Addressing
 
IP Address
IP AddressIP Address
IP Address
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
Protocol architecture TCP IP
Protocol architecture TCP IPProtocol architecture TCP IP
Protocol architecture TCP IP
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 
Ip address
Ip address Ip address
Ip address
 
Presentation on TCP/IP Model
Presentation on TCP/IP ModelPresentation on TCP/IP Model
Presentation on TCP/IP Model
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
Ip and mac addressing
Ip and mac addressingIp and mac addressing
Ip and mac addressing
 
Computer Networks 3
Computer Networks 3Computer Networks 3
Computer Networks 3
 
Ip address
Ip addressIp address
Ip address
 
IP, Addressing, Host
IP, Addressing, HostIP, Addressing, Host
IP, Addressing, Host
 

Similar to Week 6 osi-tcp

Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addressesAmandeep Kaur
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
Dineesha Suraweera
 
Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0
Emertxe Information Technologies Pvt Ltd
 
TCP (1).pdf
TCP (1).pdfTCP (1).pdf
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
Serious_SamSoul
 
Cisco doc
Cisco docCisco doc
Cisco doc
Prakash V
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
SmtArunaAsafAliGovtP
 
Basics of OSI and TCP IP Layers
Basics of OSI and TCP IP LayersBasics of OSI and TCP IP Layers
Basics of OSI and TCP IP Layers
hafsabanu
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
eyebolloptics
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP Layer
Netwax Lab
 
INT 1010 06-2.pdf
INT 1010 06-2.pdfINT 1010 06-2.pdf
INT 1010 06-2.pdf
Luis R Castellanos
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
Raja Waseem Akhtar
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
EILLEN IVY PORTUGUEZ
 
Osi model
Osi modelOsi model
Osi model
dhawal mehta
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
zeyadosama505
 
Lesson 13University of the CumberlandsProfessor Dr. I.docx
Lesson 13University of the CumberlandsProfessor Dr. I.docxLesson 13University of the CumberlandsProfessor Dr. I.docx
Lesson 13University of the CumberlandsProfessor Dr. I.docx
smile790243
 

Similar to Week 6 osi-tcp (20)

IP Address
IP AddressIP Address
IP Address
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addresses
 
Hardware9
Hardware9Hardware9
Hardware9
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0
 
TCP (1).pdf
TCP (1).pdfTCP (1).pdf
TCP (1).pdf
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
Cisco doc
Cisco docCisco doc
Cisco doc
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
 
Ccna1v3 Mod09
Ccna1v3 Mod09Ccna1v3 Mod09
Ccna1v3 Mod09
 
Basics of OSI and TCP IP Layers
Basics of OSI and TCP IP LayersBasics of OSI and TCP IP Layers
Basics of OSI and TCP IP Layers
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP Layer
 
INT 1010 06-2.pdf
INT 1010 06-2.pdfINT 1010 06-2.pdf
INT 1010 06-2.pdf
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Osi model
Osi modelOsi model
Osi model
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
Lesson 13University of the CumberlandsProfessor Dr. I.docx
Lesson 13University of the CumberlandsProfessor Dr. I.docxLesson 13University of the CumberlandsProfessor Dr. I.docx
Lesson 13University of the CumberlandsProfessor Dr. I.docx
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Week 6 osi-tcp

  • 2. Objectives  TheOSI Seven Layer Model  The TCP/IP 4 Layer Model  TCP/IP     Counting in Binary IP Addresses Subnet Masks RFC1918
  • 3. The OSI Reference Model  In the early 1980s, the International Standards Organization (ISO) developed the Open Systems Interconnect (OSI) reference model to standardize the way devices communicate on a network. This model was a major step toward ensuring interoperability between network devices.  A system that implements protocol behaviour consisting of a series of these layers is known as a protocol stack. Protocol stacks can be implemented either in hardware or software, or a combination of both. Typically, only the lower layers are implemented in hardware, and the higher layers are implemented in software. Each layer is responsible for part of the processing to prepare data for transmission on the network. The chart shows what each layer of the OSI model does.  In the OSI model, when data is transferred, it is said to virtually travel down the OSI model layers of the sending computer and up the OSI model layers of the receiving computer.  When a user sends data, such as an email, the encapsulation process starts at the application layer. The application layer provides network access to applications. Information flows through the top three layers and is considered to be data when it gets down to the transport layer.
  • 4.
  • 5. The TCP/IP Model  An architectural model is a common frame of reference for explaining Internet communications and developing communication protocols. It separates the functions of protocols into manageable layers. Each layer performs a specific function in the process of communicating over a network.  The TCP/IP model was created by researchers in the U.S. Department of Defense (DoD). The TCP/IP suite of protocols is the dominant standard for transporting data across networks and the Internet. It consists of layers that perform functions necessary to prepare data for transmission over a network. The chart shows the four layers of the TCP/IP model.  A message begins at the top application layer and moves down the TCP/IP layers to the bottom network access layer. Header information is added to the message as it moves down through each layer and is then transmitted. After reaching the destination, the message travels back up through each layer. The header information that was added to the message is stripped away as the message moves up through the layers toward its destination.
  • 6.
  • 7.
  • 8. The models together   The OSI model and the TCP/IP model are both reference models used to describe the data communication process. The TCP/IP model is used specifically for the TCP/IP suite of protocols, and the OSI model is used for the development of standard communication for equipment and applications from different vendors. The TCP/IP model performs the same process as the OSI model, but uses four layers instead of seven. The chart shows how the layers of the two models compare.
  • 9. TCP/IP   Transmission Control Protocol/Internet Protocol (TCP/IP) defines the rules computers must follow to communicate with each other over the Internet. TCP is the primary Internet protocol for the reliable delivery of data. IP provides an addressing structure that is responsible for delivering data from the source computer to the destination computer. An IP address is a number that is used to identify a device on the network. Each device on a network must have a unique IP address to communicate with other network devices. As noted earlier, a host is a device that sends or receives information on the network. Network devices are devices that move data across the network.
  • 10. TCP/IP  A person's fingerprints usually do not change. They provide a way to physically identify people. The mailing address of a person can change, as it relates to where the person lives or picks up mail. This address can change. On a host, the Media Access Control (MAC) address is assigned to the host NIC and is known as the physical address. The physical address remains the same regardless of where the host is placed on the network, in the same way that fingerprints remain with the person regardless of where the person goes. MAC addresses consist of 6 groupings of 2 hexadecimal values separated by either a dash (-) or a colon (:), for example, 0026-6C-FC-D5-AE. Hexadecimal values are defined as a range of the numbers from 0-9 and the letters a-f.  The IP address is similar to the mailing address of a person. It is known as a logical address because it is logically assigned based on the host location. The IP address, or network address, is based on the local network and is assigned to each host by a network administrator. This process is similar to the local government assigning a street address based on the logical description of the city or village and neighbourhood.
  • 11. TCP/IP v4  An IPv4 address consists of a series of 32 binary bits (ones and zeros). It is difficult for humans to read a binary IPv4 address. For this reason, the 32 bits are grouped into four segments of 8 bits called octets. An IPv4 address, even in this grouped format, is hard for humans to read, write, and remember. Therefore, each octet is presented as its decimal value, separated by a decimal point or period. This format is referred to as dotted-decimal notation.  When a host is configured with an IPv4 address, it is entered as a dotted-decimal number, such as 192.168.1.5. Imagine if you had to enter the 32-bit binary equivalent of this: 11000000101010000000000100000101. If just one bit were mistyped, the address would be different, and the host might not be able to communicate on the network.
  • 12. TCP/IP v4  The logical 32-bit IPv4 address is hierarchical and is composed of two parts. The first part identifies the network, and the second part identifies a host on that network. Both parts are required. For example, if a host has the IPv4 address 192.168.18.57, the first three octets, 192.168.18, identify the network portion of the address, and the last octet, 57 identifies the host. This is known as hierarchical addressing, because routers only need to communicate with networks and not individual hosts. A router is a networking device that forwards data packets across networks toward their destinations.