0% found this document useful (0 votes)
41 views

Week 3 OSI Models and Protocols - PPT

Week 3 OSI Models and Protocols_PPT
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views

Week 3 OSI Models and Protocols - PPT

Week 3 OSI Models and Protocols_PPT
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Week 3

OSI Models and Protocols


OSI Model
Application Layer
Layer 7 provides an interface between a host’s communication software and
any necessary external applications (such as email, file transfers, and
terminal emulation).
This layer can also evaluate what resources are necessary to communicate
between two devices and determine their availability.
Layer 7 also provides the following functionality:
• Synchronization of client/server applications
• Error control and data integrity between applications
• System-independent processes to a host
Ex. Protocols: HTTP,FTP, SMTP, Telnet, SNMP.
Presentation Layer
• Layer 6 presents data to the Application layer and acts as a data format translator
• Format translation is necessary to ensure and negotiating data transfer syntax to Layer 7
• Processes involved include data encryption, decryption, compression, and decompression.
• The Presentation layer is the only layer that can actually change data.
• Joint Photographic Experts Group (JPEG)
• American Standard Code for Information Interchage (ASCII/)
• Extended Binary Coded Decimal Interchange Code(EBCDIC)
• Tagged Image File (GIF)
• Picture (PICT)
• Moving Picture Experts Group (MPEG)
• Musical Instrument Digital Interface (MIDI)
• QuickTime
• Rich Text Format (RTF)
Session Layer
• Layer 5 is primarily concerned with dialog control among devices. This layer determines the beginning, middle and
end of a session or conversation that occurs between application.
In this way, the Session layer acts as an intermediary for those applications.
Transport Layer
• Layer 4 is responsible for end-to-end connections and data delivery between tew hosts.
• The ability to segment and reassemble data is a key functionality of this layer.
• Transmissions occur via logical connectivity between the sender and destination. Layer 4
provides transparent data transfer by hiding details of the transmission from the upper
layers.
Layer 4 also provides the following functionality
• Fault detection
• Error recovery
• Establishing, maintaining, and tearing down virtual circuits
The Transport layer can provide reliable networking via acknowledgements, sequencing, and
flow control.
• Acknowledgements – Delivered segments are acknowledged to the sender. If they are not
acknowledged, the sender will retransmit.
• Sequencing – Data segments are sequenced into their original order when they arrive at the destination.
• Flow Control – Provides buffer controls that prevent packet flooding to the destination host. Buffers
store bursts of data for processing when the transmission is complete.
Layer 4 protocols include the following:
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)
Sequenced Packet Exchange (SPX) – A reliable communications protocol created by Novel Netware
Network Layer
• Layer 3 is where the best path determination is made for packet delivery across the network.
• Routed protocols such as IP are used to determine logical addressing, which can identify the
destination of a packet or datagram.
• The most common network device found at the Network layer is a router; however, Layer 3 switches
may also be implemented.
• A router at the Network layer follows these general steps to ensure proper data transport:
• The router checks the destination IP address of the incoming packet on the router interface.
• Packets destined for that router are processed, whereas packets destined for another router must be
looked up in the routing table.
• The router determines an exit interface based on the routing table and sends the packet.
• To the interface for framing and forwarding. If there is no route in the routing table, the packet is
dropped by the router.
A routing table on a router contains the following information:
Network Address
Interface - Exit interface used to forward packets
Metric - Distance to reach a remote network
There are two packet types utilized at Layer 3:
Data Packets - Transport data across the internetwork and are supported by IP and IPX protocols.
Route Update Packets - Send updates to neighbour routers about all networks connected to that
internetwork and are supported by routing protocols such as RIP, EIGRP, and OSPF.
Layer 3 routed protocols include the following:
Internet Protocol (IP)
Internet Packet Exchange (IPX) - Part of the IPX/SPX protocol suite created by Novell NetWare
AppleTalk DDP - Datagram delivery protocol used by Apple
Datalink Layer

• Layer 2 ensures reliable data transfer from the Network layer to the Physical layer
for transmission across the network.
• Data received from the Network layer is formatted into frames to be transmitted to
the Physical layer.
• This layer is also responsible for error notification (not correction), network
topology, and flow control.
• This is the only layer of the OSI model that has sublayers.
The IEEE Ethernet 802.3 sublayers are Media Access Control (MAC) and Logical Link
Control (LLC)
Two domains determine data transport reliability:
Broadcast Domain—A group of nodes that can receive each other's broadcast messages and are segmented
by routers.
Collision Domain—A group of nodes that share the same media and are segmented by switches. A collision
occurs if two nodes attempt a simultaneous transmission.
Carrier Sense Multiple Access Collision Detection (CSMA/CD) is an access method that sends a jam
signal to notify the devices that there has been a collision. The devices then halt transmission for a random
back-off time.
Media Access Control (MAC)
The MAC address is the hard-coded address on the network interface controller (NIC) of the Physical layer
node attached to the network.
Although the source address will always be a unicast or single destination address, the destination address
can be a unicast, multicast (a determined subset of nodes), or broadcast (all nodes in a broadcast domain)
address.
Each MAC address must be unique and follow this format:
It must consist of 48 bits.
It must be displayed by 12 hexadecimal digits (0-9, A-F).
The first 6 hexadecimal digits in the address are a vendor code or organizationally unique identifier
(OUI) assigned by the NIC manufacturer.
This is an example of a MAC address: 00:00:07:A9:B2:EB
Logical Link Control (LLC)
The LLC sublayer complements the MAC sublayer in the ethernet model; the LLC is responsible for
framing, error, and flow control.
LLC provides a service access point (SAP) identifier in the frame. The SAP field of the frame consists
of one byte that identifies an upper layer protocol (for example, 06 = IP, whereas EO = IPX). The LLC
inserts a destination SAP (DSAP) and a Source SAP (SSAP) in the frame Ethernet 802.2 Frames
Physical Layer
Layer 1 moves bits between nodes. Electrical, mechanical, procedural, and
functional requirements are defined at the Physical layer to assist with the
activation, maintenance, and deactivation of physical connectivity between devices.
Other attributes of Layer 1 include the following:
• Specification of voltage, wire speed, and pin-out cables .
• Capability to receive and transmit a data signal . Identification of the interface that is
set up between the data terminal equipment (DTE) and the data communication
equipment (DCE)
Encapsulation The process of adding a header or trailer to the PDU at each layer
of the OSI is called encapsulation.
Protocol Data Unit (PDU) consists of the layer n control information and layer
n+1encapsulated data for each layer (for same-layer interaction). Ex: L7PDU,
L6PDU, … L2PDU
TCP / IP Model
• Application Layer
• This layer combines functionalities of the three top layers of the OSI model and may also be called the
Process/Application layer.
Also, some of the most popular applications (email, file transport, and so on) interface with this layer to
communicate with other applications on the network.
Transport Layer

• The Transport layer corresponds with the Transport layer of


the OSI model and is also known as the Host-to-Host layer.
• Not only is this layer responsible for reliable data delivery,
but it can also make certain that data arrives in the proper
order. You will see two transport layer protocols
• Example : TCP & UDP
Internet Layer
The following protocols relate to the logical transmission of packets:
IP
ICMP
• Ping (Packet Internet Groper) enables you to validate that an IP address exists and can accept
requests.
• Traceroute traces the route or path taken from a client to a remote host. Traceroute also reports the
IP addresses of the routers at each next hop on the way to the destination. This is especially useful
when you suspect that a router on the route to an unreachable network is responsible for dropping
the packet.
ARP maps a known IP address to a MAC address by sending a broadcast ARP. When the destination
IP address is on another subnet, the sender broadcasts ARP for the router's ethernet port or default
gateway, so the MAC address sent back is that of the router's ethernet port.
RARP maps a known MAC address to an IP address.
Proxy ARP enables a router to respond to an ARP request that has been sent to a remote host.
Network Interface Layer

This layer corresponds with the Data Link and Physical layers of the OSI
model.

You might also like