Institute of Technology Sligo - Dept of Computing Application Presentation Session Transport Network Data-Link Physical THE OSI MODEL Where We’ve Been.

Slides:



Advertisements
Similar presentations
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
Advertisements

CCNA – Network Fundamentals
Network Certification Preparation. Module - 1 Communication methods OSI reference model and layered communication TCP/IP model TCP and UDP IP addressing.
1: Review Of Semester 1v2 in Sem 2v Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing.
Semester 3 Chapter 1 Review.
Institute of Technology Sligo - Dept of Computing Wrapping The Package Devices & Data Encapsulation Paul Flynn.
Review of Chapters 12, 13 & 14 Transport Layer Session Layer Presentation Layer.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
OSI Reference Model An overview. Standards and the internet International Organization for Standardization ISO 70’s.
M. Dahshan - TCOM52721 TCOM 5272 Telecomm Lab Dr. Mostafa Dahshan OU-Tulsa 4W 2 nd floor
Chapter 2 Network Models.
COMPUTER NETWORKS.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
©Brooks/Cole, 2003 Chapter 6 Computer Networks. ©Brooks/Cole, 2003 Understand the rationale for the existence of networks. Distinguish between the three.
Lecturer: Tamanna Haque Nipa
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
Application Presentation Session Transport Network Data-Link Physical THE OSI MODEL Where We’ve Been Chapter 1—Review By: Allan Johnson.
Semester 1 Module 8 Ethernet Switching Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Chapter 1 Overview Review Overview of demonstration network
OSI Model Honolulu Community College Cisco Academy Training Center
Chapter 2 Network Models
Presentation on Osi & TCP/IP MODEL
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary
1 Review - OSI Model n OSI Reference Model u represents the communications process. u 7 layers: physical, data link, network, transport, session, presentation.
The OSI Model and the TCP/IP Protocol Suite Outline: 1.Protocol Layers 2.OSI Model 3.TCP/IP Model 4.Addressing 1.
1 OSI Reference Model. 2 Agenda The Layered Model Layers 1 & 2: Physical & Data Link Layers Layer 3: Network Layer Layers 4–7: Transport, Session, Presentation,
Module 8: Ethernet Switching
UNDERSTANDING THE HOST-TO-HOST COMMUNICATIONS MODEL - OSI LAYER & TCP/IP MODEL 1.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
OSI Model Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Data Communications and Networks
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
1 Chapter Overview Network Communications The OSI Reference Model.
1 Chapter Overview Network Communications The OSI Reference Model.
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
OSI Reference Model This module covers the OSI reference model. It is sometimes also called ISO or 7 layer reference model. The model was developed by.
Open System Interconnection Describe how information from a software application in one computer moves through a network medium to a software application.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
OSI means Open System Interconnect model. OSI means Open System Interconnect model. Developed by the International Organization for Standardization in.
SWICHING & ROUTING.
Local Area Networks Honolulu Community College
The OSI Model A Framework for Communications David A. Abarca July 19, 2005.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Prepared by: PACE Academy ( Welcome to CCNAX Cisco Certified Network Associate Version 2 ( ) Recognize the purpose and functions.
Data Communication Network Models
Application Presentation Session Transport Network Data-Link Physical THE OSI MODEL Where We’ve Been Chapter 1—Review By: Allan Johnson.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Welcome Back Cisco Semester 1 & 2 Review. Why are Networks Complex Environments?? They involve: They involve: –Interconnections to networks outside an.
CIS 173 Networking Week #9 OBJECTIVES Chapter #6 Network Communications Protocols.
1 OSI Reference Model Benefits Standardizes interfaces Facilitates modular engineering Ensures interoperable technology Accelerates evolution Simplifies.
OSI LAYERS.
Part I. Overview of Data Communications and Networking
The OSI Model and the TCP/IP Protocol Suite
Semester 2 1 JEOPARDY CHAPTER 1 REVIEW S2C01 Jeopardy Review.
ISO/OSI Model and Collision Domain
The OSI Model and the TCP/IP Protocol Suite
Layered Task, OSI Model, TCP/IP Model
Semesters 1 & 2 Concept Review
Protocol layering and data
The OSI 7 Layer Model Ben, Stuart, Charles.
CCNA 2 Review of Cisco CCNA 1.
Protocol layering and data
The OSI Model and the TCP/IP Protocol Suite
Open System Interconnect (OSI).
LEARNING COMPUTER NETWORKS OSI Model (layers). Why a layered model?  Easier to teach communication process.  Speeds development, changes in one layer.
Presentation transcript:

Institute of Technology Sligo - Dept of Computing Application Presentation Session Transport Network Data-Link Physical THE OSI MODEL Where We’ve Been Chapter 1—Review Paul Flynn

Institute of Technology Sligo - Dept of Computing Table of Contents  Enterprise  Review the OSI Model  Encapsulation  LAN Devices & Technologies  Transport Layer  IP Addressing Go There!

Institute of Technology Sligo - Dept of Computing A New Word!—Enterprise A corporation, agency, school, or other organization that works to tie together its data, communication, computing, and file servers.

Institute of Technology Sligo - Dept of Computing Your Job as a Network Guru  Help Enterprises meet their needs by:  Interconnecting their LANs so that geographically remote services can be accessed  Ensuring users get high bandwidth access over their LANs (i.e. Replacing hubs with switches; 10Mbps NICs with 10/100 Mbps NICs)  Implementing new technologies as they emerge like e-commerce, video conferencing, voice over IP, and distance learning.

Institute of Technology Sligo - Dept of Computing Application Presentation Session Transport Network Data-Link Physical THE OSI MODEL Review The Model Open Systems Interconnected Reference Model Table of Contents

Institute of Technology Sligo - Dept of Computing Why A Layered Model?  Reduces complexity  Standardizes interfaces  Facilitates modular engineering  Ensures interoperable technology  Accelerates evolution  Simplifies teaching & learning Application Presentation Session Transport Network Data-Link Physical

Institute of Technology Sligo - Dept of Computing Host Layers vs. Media Layers Application Presentation Session Transport Network Data-Link Physical Host Layers Provides accurate data delivery between computers Application Presentation Session Transport

Institute of Technology Sligo - Dept of Computing Host Layers vs. Media Layers Application Presentation Session Transport Network Data-Link Physical Media Layers Controls physical delivery of the message over the network Network Data-Link Physical

Institute of Technology Sligo - Dept of Computing Application Layer  Provides network services (processes) to applications.  For example, a computer on a LAN can save files to a server using a network redirector supplied by NOSs like Novell.  Network redirectors allow applications like Word and Excel to “see” the network. Application Presentation Session Transport Network Data-Link Physical

Institute of Technology Sligo - Dept of Computing Presentation Layer  Provides data representation and code formatting.  Code formatting includes compression and encryption  Basically, the presentation layer is responsible for representing data so that the source and destination can communicate at the application layer. Application Presentation Session Transport Network Data-Link Physical

Institute of Technology Sligo - Dept of Computing Session Layer  Provides inter-host communication by establishing, maintaining, and terminating sessions.  Session uses dialog control and dialog separation to manage the session  Some Session protocols:  NFS (Network File System)  SQL (Structured Query Language)  RCP (Remote Call Procedure)  ASP (AppleTalk Session Protocol)  SCP (Session Control Protocol)  X-window Application Presentation Session Transport Network Data-Link Physical

Institute of Technology Sligo - Dept of Computing Transport Layer  Provides reliability, flow control, and error correction through the use of TCP.  TCP segments the data, adding a header with control information for sequencing and acknowledging packets received.  The segment header also includes source and destination ports for upper-layer applications  TCP is connection-oriented and uses windowing.  UDP is connectionless. UDP does not acknowledge the receipt of packets. Application Presentation Session Transport Network Data-Link Physical

Institute of Technology Sligo - Dept of Computing Network Layer  Responsible for logically addressing the packet and path determination.  Addressing is done through routed protocols such as IP, IPX, AppleTalk, and DECnet.  Path Selection is done by using routing protocols such as RIP, IGRP, EIGRP, OSPF, and BGP.  Routers operate at the Network Layer Application Presentation Session Transport Network Data-Link Physical

Institute of Technology Sligo - Dept of Computing Data-Link Layer  Provides access to the media  Handles error notification, network topology issues, and physically addressing the frame.  Media Access Control through either...  Deterministic—token passing  Non-deterministic—broadcast topology (collision domains)  Important concept: CSMA/CD Application Presentation Session Transport Network Data-Link Physical

Institute of Technology Sligo - Dept of Computing Physical Layer  Provides electrical, mechanical, procedural and functional means for activating and maintaining links between systems.  Includes the medium through which bits flow. Media can be...  CAT 5 cable  Coaxial cable  Fiber Optics cable  The atmosphere Application Presentation Session Transport Network Data-Link Physical

Institute of Technology Sligo - Dept of Computing Application Presentation Session Transport Network Data-Link Physical THE OSI MODEL Encapsulation Peer-to-Peer Communications Table of Contents

Institute of Technology Sligo - Dept of Computing Peer-to-Peer Communications  Peers communicate using the PDU of their layer. For example, the network layers of the source and destination are peers and use packets to communicate with each other. Application Presentation Session Transport Network Data-Link Physical Data Segments Packets Frames Bits Data

Institute of Technology Sligo - Dept of Computing Encapsulation Example  You type an message. SMTP takes the data and passes it to the Presentation Layer.  Presentation codes the data as ASCII.  Session establishes a connection with the destination for the purpose of transporting the data. Application Presentation Session Transport Network Data-Link Physical

Institute of Technology Sligo - Dept of Computing Encapsulation Example  Transport segments the data using TCP and hands it to the Network Layer for addressing  Network addresses the packet using IP.  Data-Link then encaps. the packet in a frame and addresses it for local delivery (MACs)  The Physical layer sends the bits down the wire. Application Presentation Session Transport Network Data-Link Physical

Institute of Technology Sligo - Dept of Computing Application Presentation Session Transport Network Data-Link Physical THE OSI MODEL LAN Devices & Technologies The Data-Link & Physical Layers Table of Contents

Institute of Technology Sligo - Dept of ComputingDevices  What does it do?  Connects LAN segments;  Filters traffic based on MAC addresses; and  Separates collision domains based upon MAC addresses. What layer device?

Institute of Technology Sligo - Dept of ComputingDevices  What does it do?  Since it is a multi-port bridge, it can also  Connect LAN segments;  Filter traffic based on MAC addresses; and  Separate collision domains  However, switches also offer full-duplex, dedicated bandwidth to segments or desktops. What layer device?

Institute of Technology Sligo - Dept of ComputingDevices  What does it do?  Concentrates LAN connections from multiple devices into one location  Repeats the signal (a hub is a multi-port repeater) What layer device?

Institute of Technology Sligo - Dept of ComputingDevices  What does it do?  Interconnects networks and provides broadcast control  Determines the path using a routing protocol or static route  Re-encapsulates the packet in the appropriate frame format and switches it out the interface  Uses logical addressing (i.e. IP addresses) to determine the path What layer device?

Institute of Technology Sligo - Dept of Computing Media Types

Institute of Technology Sligo - Dept of Computing LAN Technologies Three Most Common Used Today in Networking

Institute of Technology Sligo - Dept of ComputingEthernet/802.3  Cable Specifications:  10Base2  Called Thinnet; uses coax  Max. distance = 185 meters (almost 200)  10Base5  Called Thicknet; uses coax  Max. distance = 500 meters  10BaseT  Uses Twisted-pair  Max. distance = 100 meters  10 means 10 Mbps

Institute of Technology Sligo - Dept of ComputingEthernet/802.3  Ethernet is broadcast topology.  What does that mean?  Every devices on the Ethernet segment sees every frame.  Frames are addressed with source and destination ______ addresses.  When a source does not know the destination or wants to communicate with every device, it encapsulates the frame with a broadcast MAC address: FFFF.FFFF.FFFF  What is the main network traffic problem caused by Ethernet broadcast topologies?

Institute of Technology Sligo - Dept of ComputingEthernet/802.3  Ethernet topologies are also shared media.  That means media access is controlled on a “first come, first serve” basis.  This results in collisions between the data of two simultaneously transmitting devices.  Collisions are resolved using what method?

Institute of Technology Sligo - Dept of ComputingEthernet/802.3  CSMA/CD (Carrier Sense Multiple Access with Collision Detection)  Describe how CSMA/CD works:  A node needing to transmit listens for activity on the media. If there is none, it transmits.  The node continue to listen. A collision is detected by a spike in voltage (a bit can only be a 0 or a 1--it cannot be a 2)  The node generates a jam signal to tell all devices to stop transmitting for a random amount of time (back- off algorithm).  When media is clear of any transmissions, the node can attempt to retransmit.

Institute of Technology Sligo - Dept of Computing Address Resolution Protocol  In broadcast topologies, we need a way to resolve unknown destination MAC addresses.  ARP is protocol where the sending device sends out a broadcast ARP request which says, “What’s you MAC address?”  If the destination exists on the same LAN segment as the source, then the destination replies with its MAC address.  However, if the destination and source are separated by a router, the router will not forward the broadcast (an important function of routers). Instead the router replies with its own MAC address.

Institute of Technology Sligo - Dept of Computing Application Presentation Session Transport Network Data-Link Physical THE OSI MODEL Transport Layer A Quick Review Table of Contents

Institute of Technology Sligo - Dept of Computing Transport Layer Functions  Synchronization of the connection  Three-way handshake  Flow Control  “Slow down, you’re overloading my memory buffer!!”  Reliability & Error Recovery  Windowing: “How much data can I send before getting an acknowledgement?”  Retransmission of lost or unacknowledged segments

Institute of Technology Sligo - Dept of Computing Transport’s Two Protocols  TCP  Transmission Control Protocol  Connection-oriented  Acknowledgment & Retransmission of segments  Windowing  Applications:   File Transfer  E-Commerce  UDP  User Datagram Protocol  Connectionless  No Acknowledgements  Applications:  Routing Protocols  Streaming Audio  Gaming  Video Conferencing

Institute of Technology Sligo - Dept of Computing Application Presentation Session Transport Network Data-Link Physical THE OSI MODEL IP Addressing Subnetting Review Table of Contents

Institute of Technology Sligo - Dept of Computing Logical Addressing  At the network layer, we use logical, hierarchical addressing.  With Internet Protocol (IP), this address is a 32- bit addressing scheme divided into four octets.  Do you remember the classes 1st octet’s value?  Class A:  Class B:  Class C:  Class D: (multicasting)  Class E: (experimental)

Institute of Technology Sligo - Dept of Computing Network vs. Host NHHH Class A: 2 7 = 126 networks; 2 24 > 16 million hosts NNHH Class B : 2 14 = 16,384 networks; 2 16 > 65,534 hosts NNNH Class C : 2 21 > 2 million networks; 2 8 = 254 hosts

Institute of Technology Sligo - Dept of Computing Why Subnet?  Remember: we are usually dealing with a broadcast topology.  Can you imagine what the network traffic overhead would be like on a network with 254 hosts trying to discover each others MAC addresses?  Subnetting allows us to segment LANs into logical broadcast domains called subnets, thereby improving network performance.

Institute of Technology Sligo - Dept of Computing Stealing Bits  In order to subnet, we must steal or “borrow” bits from the host portion on the IP address.  First, we must to determine how many subnets we need and how many hosts per subnet.  We do this through the power of 2  For example, I need 8 subnets from a Class C:  2 4 = = 14 subnets  Remember: we subtract 2 because these subnets are not used  How many host do we have?  It’s a Class C, so 4 bits are left: 2 4 = = 14 hosts  Remember: we subtract 2 because one address is the subnet address and one is the broadcast address

Institute of Technology Sligo - Dept of Computing Subnet Mask  We determine the subnet mask by adding up the decimal value of the bits we borrowed.  In the previous Class C example, we borrowed 4 bits. Below is the host octet showing the bits we borrowed and their decimal values We add up the decimal value of these bits and get 240. That’s the last non-zero octet of our subnet mask. So our subnet mask is

Institute of Technology Sligo - Dept of Computing Last Non-Zero Octet  Memorize this table. You should be able to:  Quickly calculate the last non-zero octet when given the number of bits borrowed.  Determine the number of bits borrowed given the last non-zero octet.  Determine the amount of bits left over for hosts and the number of host addresses available.

Institute of Technology Sligo - Dept of Computing CIDR Notation  Classless Interdomain Routing is a method of representing an IP address and its subnet mask with a prefix.  For example: /27  What do you think the 27 tells you?  27 is the number of 1 bits in the subnet mask. Therefore,  Also, you know 192 is a Class C, so we borrowed 3 bits!!  Finally, you know the magic number is = 32, so the first useable subnet address is !!  Let’s see the power of CIDR notation.

Institute of Technology Sligo - Dept of Computing /26  Subnet mask?   Bits borrowed?  Class C so 2 bits borrowed  Magic Number?  = 64  First useable subnet address?   Third useable subnet address?  = 192, so

Institute of Technology Sligo - Dept of Computing /30  Subnet mask?   Bits borrowed?  Class C so 6 bits borrowed  Magic Number?  = 4  Third useable subnet address?  = 12, so  Second subnet’s broadcast address?  = 11, so

Institute of Technology Sligo - Dept of Computing /28  What kind of address is ?  Class C, so 4 bits borrowed  Last non-zero octet is 240  Magic number is = 16  32 is a multiple of 16 so is a subnet address--the second subnet address!!  What’s the broadcast address of ?  = 47, so

Institute of Technology Sligo - Dept of Computing /29  What kind of address is ?  Class C, so 5 bits borrowed  Last non-zero octet is 248  Magic number is = 8  Subnets are.8,.16,.24,.32, ect.  So belongs to the third subnet address ( ) and is a host address.  What broadcast address would this host use to communicate with other devices on the same subnet?  It belongs to.24 and the next is.32, so 1 less is.31 ( )

Institute of Technology Sligo - Dept of Computing No Worksheet Needed!  After some practice, you should never need a subnetting worksheet again.  The only information you need is the IP address and the CIDR notation.  For example, the address /26  You can quickly determine that the first subnet address is How?  Class C, 2 bits borrowed  = 64, so  For the rest of the addresses, just do multiples of 64 (.64,.128,.192).

Institute of Technology Sligo - Dept of Computing The Key!!  MEMORIZE THIS TABLE!!!

Institute of Technology Sligo - Dept of Computing Practice On Your Own  Below are some practice problems. Take out a sheet of paper and calculate...  Bits borrowed  Last non-zero octet  Second subnet address and broadcast address / / / / /28 6. Challenge: /19 7. Challenge: /16 Answers

Institute of Technology Sligo - Dept of ComputingAnswers Don’t Cheat Yourself!! Work them out before you check your answers. Click the back button if you’re not done. Otherwise, click anywhere else in the screen to see the answers. Back