Вы находитесь на странице: 1из 45

The Open Systems Interconnection

Reference Model
Presentation Overview
Introduction
The OSI Reference Model
The OSI Model Layers and Functions
Data Encapsulation
Peer-to-Peer Communications
Introduction
Significant increase in the number and overall
size of networks existed in the early 1980s.

Many of the early networks were built using


different implementations of hardware and
software.

Proprietary systems were privately developed,


owned, and controlled.
Introduction
Communication between networks became quite
difficult due to incompatibility.

The ISO recognized the need to create a network


model that would help networks communicate
and work together (interoperability).
Analyzing Network in Layers
Layers help us understand the actions that occur
during communication.
The OSI Reference Model
The primary model in network 7 Application
communications.
6 Presentation
Composed of seven layers which 5 Session
allows users to visualize the
4 Transport
network functions that occur at
each layer. 3 Network

2 Data Link
A framework used to understand
how information travels through 1 Physical
a network.
Benefits of the OSI Reference Model
Reduces complexity 7 Application

Standardizes interfaces 6 Presentation

5 Session
Facilitates modular engineering
4 Transport
Ensures interoperable technology 3 Network

Accelerates evolution 2 Data Link

1 Physical
Simplifies teaching and learning
The OSI Model Layers and Functions

7 Application Network Processes to Applications


6 Presentation
Provides network services to application
5 Session processes such as electronic mail, file transfer,
and terminal emulation.
4 Transport

3 Network

2 Data Link

1 Physical
The OSI Model Layers and Functions

7 Application

6 Presentation Data Representation


5 Session
Ensure data is readable by receiving system
4 Transport Format of data
Data structures
3 Network
Negotiates data transfer syntax for application
2 Data Link layer

1 Physical
The OSI Model Layers and Functions

7 Application

6 Presentation

5 Session Interhost Communication


4 Transport
Establishes, manages, and terminates
3 Network sessions between applications

2 Data Link

1 Physical
The OSI Model Layers and Functions

7 Application

6 Presentation

5 Session

4 Transport End-to-end Connections


3 Network
Concerned with transport issues between hosts
2 Data Link Data transport reliability
Establish, maintain, terminate virtual circuits
1 Physical
Fault detection and recovery information flow
control
The OSI Model Layers and Functions

7 Application Provides reliable transfer of data across media


Connectivity and path selection between host
6 Presentation
systems
5 Session Logical addressing
Best effort delivery
4 Transport

3 Network Network Address and Best Path Determination


2 Data Link

1 Physical
The OSI Model Layers and Functions

7 Application

6 Presentation

5 Session
Provides reliable transfer of data across media
4 Transport Connectivity and path selection between host
systems
3 Network

2 Data Link Direct Link Control, Access to Media


1 Physical
The OSI Model Layers and Functions

7 Application

6 Presentation

5 Session

4 Transport

3 Network
Wires, connectors, voltages, data rates
2 Data Link

1 Physical Binary Transmission


Data Encapsulation
The process by which data are wrapped with the
necessary protocol information before network
transit.

As data packet moves down through the layers


of the OSI model, it receives headers, trailer, and
other information.
Data Encapsulation
In order to encapsulate data, networks must
perform five conversion steps as follows:

Build the data.


Package the data for end-to-end transport.
Add the network IP address to the header.
Add the data link layer header and trailer.
Convert to bits for transmission.
Peer-to-peer Communications
Data travel from the source to the destination.
Each layer of the OSI model at the source must
communicate with its peer layer at the
destination.
Peer-to-peer Communications
7 Application 7 Application
6 Presentation 6 Presentation
5 Session 5 Session
4 Transport 4 Transport
3 Network 3 Network
2 Data Link 2 Data Link
1 Physical 1 Physical

Source Destination
The TCP/IP Protocol Stack
Presentation Overview
TCP/IP
TCP/IP Stack Protocols and Layers
OSI Model vs. TCP/IP Protocol Stack
Internet Protocol (IP)
TCP/IP Application

A standard, routable enterprise Transport

networking protocol that is the Internet


most complete and accepted.
Network Access

Various protocols work together to make


network communication happen.
The process involves multiple activities including:
resolving user-friendly computer names to IP addresses;
determining the location of the destination computer; and
routing the data so that it reaches the destination
successfully.
TCP/IP Stack Protocols and Layers

Application

Transport
Includes the session and presentation layer
Internet details
Handles high level protocols, issues of
Network Access representation, encoding, and dialog control
Common TCP/IP Protocols

FTP HTTP SMTP DNS HTTP SMTP

TCP UDP

IP

Internet LAN Many LANs and WANs


TCP/IP Stack Protocols and Layers

Application

Transport

Internet
Deals with the quality of service issues of
Network Access reliability, flow control, and error correction.
TCP/IP Stack Protocols and Layers

Application

Transport

Internet

Network Access
Responsible for sending source packets from
any network on the internetwork and have
them arrive at the destination independent of
the path and networks they took to get there.
TCP/IP Stack Protocols and Layers

Application

Transport

Internet

Network Access

Concerned with all the issues that an IP packet


requires to actually make a physical link.
OSI Model vs. TCP/IP Protocol Stack
7 Application

6 Presentation Application

5 Session

4 Transport Transport

3 Network Internet

2 Data Link
Network Access
1 Physical

OSI Model TCP/IP Model


OSI Model vs. TCP/IP Protocol Stack

Similarities:
Both have layers
Both have Application Layers, though they include
very different services
Both have comparable Transport and Network Layers
Packet-switched (not circuit-switched) technology is
assumed
Networking professionals need to know both
OSI Model vs. TCP/IP Protocol Stack

Differences:
TCP/IP combines the Presentation and Session Layer
issues into its Application Layer
TCP/IP combines the OSI Data Link and Physical
Layers into one layer
TCP/IP appears simpler because it has few layers,
but the OSI Model is simpler to develop and
troubleshoot
TCP/IP protocols are the standards around to which
the Internet developed
Internet Protocol (IP)

An Internet Layer protocol which helps to identify


the location of the destination computer in a
network communication.
A connectionless, unreliable protocol that is
primarily responsible for addressing packets and
routing them between networked computers.

Although IP always attempts to deliver packets,


it does attempt to recover then from errors by
requesting retransmission of data.
Internet Protocol (IP)

Analogous to a mailroom, IP is where packet


sorting and delivery take place. IP routes the
packets until they reach their destination.

Each packet includes the IP address of the


source and its intended recipient.

If IP identifies a destination address to be of the


same network segment, it transmits the packet
directly to that computer. Otherwise, IP must use
a router to send the packets.
Internet Protocol (IP)

IP is also responsible for ensuring that a packet


does not remain on a network forever .
A Time to Live (TTL) number is assigned to every
packet, which specifies the maximum length of
time that the packet can travel on the network
before being discarded.
Characteristics of TCP and UDP
Presentation Overview
User Datagram Protocol
Transmission Control Protocol
TCP and UDP Port Numbers
TCP Header Format
User Datagram Protocol (UDP)

A Transport Layer protocol that identifies the


destination application in communication of
networks.

UDP is used by applications through broadcast or


multicast transmission.

UDP is used for transmitting small amount of


data, or data that is not of high importance such
as streaming media.
User Datagram Protocol (UDP)

UDP characteristics include:


Connectionless
Unreliable
Transmits messages (called user datagrams)
Provides no software checking for message delivery
(unreliable)
Does not reassemble incoming messages
Uses no acknowledgments
Provides no flow control
Transmission Control Protocol (TCP)

A standard protocol that provides a reliable,


connection-oriented data delivery service
between only 2 computers (unicast).

Connection must be established before data is


transmitted.

TCP guarantees delivery of data at the


destination.
Transmission Control Protocol (TCP)

TCP characteristics include:


Connection-oriented
Reliable
Divided outgoing messages into segments
Reassembles messages at the destination station
Re-sends anything not received
Reassembles messages from incoming segments.
TCP Three-Way Handshake

Source

Destination

1. Source computer initiates connection by


transmitting session information, including
sequence number and size of packet.
TCP Three-Way Handshake

Source

Destination

2. Destination computer responds with its


session information.
TCP Three-Way Handshake

Source

Destination

3. Source computer agrees with and


acknowledges the received information.
TCP and UDP Port Numbers
A Port is an identifier for an application within a
computer, and is associated with either TCP or
UDP.
A port can be any number between 0 and
65,535.
A Socket is a combination of an IP address and a
a TCP or UDP port.
The IP address helps locate the destination
computer, and the port determines the
application to which data is to be sent.
TCP and UDP Port Numbers

TCP Ports UDP Ports


Port No. Description Port No. Description
21 FTP 53 DNS

23 Telnet 69 TFTP

25 SMTP 161 SNMP


TCP Header Format

0 4 10 16 24 31
SOURCE PORT DESTINATION PORT
SEQUENCE NUMBER
ACKNOWLEDGMENT NUMBER
HLEN RESERVED CODE BITS WINDOW
CHECKSUM URGENT POINTER
PADDING
OPTIONS (IF ANY)

DATA

Thank You

Вам также может понравиться