You are on page 1of 36

Vishwajeet Rathore

Network Bulls
COMMUNICATION PROBLEM
DECnet Vs IBM
Open System Interconnection
 OSI is not a physical model but a guidelines to be
followed by Developer for proper communication.

 In the late 1970s, the Open Systems Interconnection


(OSI) reference model was created by the International
Organization for Standardization (ISO).
OSI MODEL
Layer - 7 APPLICATION
Upper Layer
Layer - 6 PRESENTATION

Layer - 5 SESSION

Layer - 4 TRANSPORT

Layer - 3 NETWORK
Lower Layer
Layer - 2 DATA LINK

Layer - 1 Physical
THE LAYERED APPROACH
 Understand that a reference model is a
conceptual blueprint of how communications
should take place. It addresses all the
processes required for effective
communication and divides them into logical
groupings called layers. When a
communication system is designed in this
manner, it’s known as a hierarchical or layered
architecture
ADVANTAGES OF OSI MODEL
 This is a hierarchical Model, The Primary purpose of
all such model especially the OSI model, is to allow
different vendor’s network to communicate

 It Divides the network communication process into


smaller & Simplex component.
ADVANTAGES OF OSI MODEL
 The Greatest function of OSI specification is to assist
in data transfer between different hosts.
 Examples : Transfer Data between MAC and Linux.

 OSI Model has seven different layers divided into two


groups, Upper three Layers for Application
Communication between host they don’t know about
network or networking. To handle Network or
Networking this is responsibility of Last three Layers.
THE APPLICATION LAYER
 This is the layer that actually interacts with the
operating system or application whenever the user
chooses to transfer files, read messages or perform
other network-related activities
 File transfers
 Email
 Enabling remote access
 Network management activities
 Client/server processes
THE APPLICATION LAYER
Telnet
 Telnet was one of the first Internet standards,
developed in 1969, and is the chameleon of protocols its
specialty is terminal emulation. It allows a user on a
remote client machine, called the Telnet client, to
access the resources of another machine, the Telnet
server, in order to access a command-line interface.
THE APPLICATION LAYER
File Transfer Protocol (FTP)
 File Transfer Protocol (FTP) actually lets us transfer
files, and it can accomplish this between any two
machines using it. But FTP isn’t just a protocol; it’s also
a program. Operating as a protocol, FTP is used by
applications. As a program, it’s employed by users to
perform file tasks by hand.
THE APPLICATION LAYER
Hypertext Transfer Protocol (HTTP)
 All those snappy websites comprising a melange of
graphics, text, links, ads and so on rely on the
Hypertext Transfer Protocol (HTTP) to make it all
possible . It’s used to manage communications
between web browsers and web servers and opens the
right resource when you click a link, wherever that
resource may actually reside.
THE APPLICATION LAYER
Dynamic Host Configuration Protocol
 Dynamic Host Configuration Protocol (DHCP) assigns
IP addresses to hosts. It allows for easier
administration and works well in small to very large
network environments. Many types of hardware can be
used as a DHCP server, including a Cisco router.
DHCP PROCESS
THE PRESENTATION LAYER
 It presents data to the Application layer and is
responsible for data translation and code formatting.
 key functions like data compression, decompression,
encryption, and decryption are also associated with
this layer.
 It’s responsible for converting data into standard
format which may include:
JPEG, MPEG, BMP, MIDI, WAV, MP3
THE SESSION LAYER
 Layer 5 establishes, maintains and ends
communication with the receiving device.
 The Session layer is responsible for setting up,
managing, and dismantling sessions between
Presentation layer entities and keeping user data
separate. Dialog control between devices also occurs at
this layer.
THE SESSION LAYER
 Communication between hosts’ various applications at
the Session layer, as from a client to a server, is
coordinated and organized via three different modes:
simplex, half duplex, and full-duplex.
THE TRANSPORT LAYER
 The basic roles of the Transport Layer are to
establish end-to-end connections from one
computer to another on the network and provide
reliable "transport" of data between devices.

 A pair of well-known protocols called TCP and UDP


are integral to this layer.

 Define Well Known Port Services


THE TRANSPORT LAYER
 Break Up Data between sender and receiver into
smaller parts . (Called Segmentation)

 Establish End to End Connectivity

 Can Ensure reliable delivery


ie. Error Detection & Retransmission
Connection-Oriented Communication

SYN

SYN + ACK

ACK

ESTABLISHED
TCP VS UDP
TCP UDP

Transmission Control Protocol User Datagram Protocol

TCP is a connection-oriented protocol. UDP is a connectionless protocol.

TCP does error checking UDP does error checking, but no


recovery options.

TCP does Flow Control. TCP handles UDP does not have an option for flow
reliability and congestion control. control

The speed for TCP is slower than UDP. UDP is faster because there is no error-
checking for packets.
FLOW CONTROL
 The purpose of flow control is to provide a way for the
receiving device to control the amount of data sent by
the sender.
WINDOWING
 Windows are used to control the amount of
outstanding, unacknowledged data segments.

 The quantity of data segments, measured in bytes,


that the transmitting machine is allowed to send
without receiving an acknowledgment is called a
window.
ACKNOWLEDGMENTS
 Reliable data delivery ensures the integrity of a stream
of data sent from one machine to the other through a
fully functional data link. It guarantees that the data
won’t be duplicated or lost. This is achieved through
something called positive acknowledgment with
retransmission— a technique that requires a receiving
machine to communicate with the transmitting
source by sending an acknowledgment message back
to the sender when it receives data.
TCP SEGMENT FORMAT
USER DATAGRAM PROTOCOL
THE NETWORK LAYER
 The Network layer (also called layer 3) manages device
addressing, tracks the location of devices on the
network, and determines the best way to move data,
which means that the Network layer must transport
traffic between devices that aren’t locally attached.

 Two types of packets are used at the Network layer:


data and route updates.
THE NETWORK LAYER
 Data packets Used to transport user data through the
internetwork. Protocols used to support data traffic are
called routed protocols; examples of routed protocols
are IP and IPv6.

 Route update packets Used to update neighboring


routers about the networks connected to all routers
within the internetwork. Protocols that send route
update packets are called routing protocols; examples
of some common ones are RIP, RIPv2, EIGRP, and
OSPF.
IP HEADER
THE DATA LINK LAYER
 The Data Link layer formats the message, each called a
data frame, and adds a customized header containing
the hardware destination and source address.

 It perform Error Detection & not correction.

 The IEEE Ethernet Data Link layer has two sub layers:
 Media Access Control
 Logical Link Control
THE DATA LINK LAYER
 Media Access Control (MAC)
 Defines how packets are placed on the media. Contention
media access is “first come/first served” access where
everyone shares the same bandwidth
 Logical Link Control (LLC)
 Responsible for identifying Network layer protocols and
then encapsulating them. An LLC header tells the Data
Link layer what to do with a packet once a frame is received.
It works like this: a host receives a frame and looks in the
LLC header to find out where the packet is destined—for
instance, the IP protocol at the Network layer.
THE DATA LINK LAYER
 Typical Layer 2 Devices and Protocols
Examples: Switches, Bridges ,HDLC, Frame Relay,
PPP, ATM, IEEE 802.3/802.2
THE PHYSICAL LAYER
 This is the physical media through which the data,
represented as electronic signals, is sent from the
source host to the destination host.

 Data will be converted in Binary that is 0’s & 1’s.

 Provide Access to the Cables.


TCP vs. OSI
A B

Data
Application Application
Data
Data
Presentation Presentation
Data

Session Data Session


Data

TH TH
Transport Data
Segment TH
Segment
Data Transport

Network NH
Packet
Segment NHPacket
Segment Network NH

DHFrameDT DH
Packet
DTFrame
Packet
Data LinkDH
Packet DT
Data Link

Physical Bits Bits Physical


ENCAPSULATION &
DECAPSULATION IN OSI MODEL

You might also like