The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.

Slides:



Advertisements
Similar presentations
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
Advertisements

OSI Model OSI MODEL.
OSI Model OSI LAYER / MODEL.
OSI MODEL Maninder Kaur
Open System Interconnection
Chapter 2 Network Models.
Chapter 2 Network Models.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Data Communications Network Models.
Lecturer: Tamanna Haque Nipa
NETWORKING CONCEPTS. OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement.
Data Communications Taught by Mr. Kim No, M.Sc. In Telecommunications Engineering Chapter 2: Network Model 1.
Lecture 1 The OSI Model Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Chapter 2 Network Models
Presentation on Osi & TCP/IP MODEL
Chapter 2 Network Models
Kashif Bashir Chapter 2 Network Models.
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
Data and Computer Communications
Service Primitives Six service primitives that provide a simple connection-oriented service 4/23/2017
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 2 The OSI Model and TCP/IP Protocol Suite.
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
 An ISO is a multi national body dedicated to worldwide agreement on international standards.  An ISO standard that covers all aspects of network communications.
The OSI Model and the TCP/IP Protocol Suite Outline: 1.Protocol Layers 2.OSI Model 3.TCP/IP Model 4.Addressing 1.
NET 221D:Computer Networks Fundamentals
The OSI Model.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
MODULE I NETWORKING CONCEPTS.
1 Kyung Hee University Chapter 2 Network Models. 2 Kyung Hee University 2.1 LAYERED TASKS We use the concept of layers in our daily life. As an example,
©Brooks/Cole, 2003 Model and protocol  A model is the specification set by a standards organization as a guideline for designing networks.  A protocol.
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
OSI Reference Model. Open Systems Interconnection (OSI) Model International standard organization (ISO) established a committee in 1977 to develop an.
Prepared by Engr.Jawad Ali BSc(Hons)Computer Systems Engineering University of Engineering and Technology Peshawar.
THE OSI MODEL ISO is the organization.OSI is the model. ISO  International Standards Organization OSI  Open Systems Interconnection.
정보 시스템 보안 3-1 장. 네트워크 기초 강원대학교 컴퓨터과학전공.
Chapter 2 Network Models
Network Models.
Protocols Used for communications between entities in a system Used for communications between entities in a system Must speak the same language Must speak.
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
8/28/ Network Models - Lin 1 CPET/ECET Network Models Data Communications and Networking Fall 2004 Professor Paul I-Hai Lin Electrical and.
Chapter 2. Network Models
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Overview of Data Communications and Networking
OSI Model. Open Systems Interconnection (OSI) is a set of internationally recognized, non proprietary standards for networking and for operating system.
Lecture Focus: Data Communications and Networking  Network Models  Data Link Layer  Network Layer  ……… Lecture 10 CSCS 311.
Data Communication Network Models
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Computer Network Lab. 1 3 장 OSI 기본 참조 모델 n OSI : Open System Interconnection n Basic Reference Model : ISO-7498 n Purpose of OSI Model ~ is to open communication.
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Lecture 3 : Network Architectures 1.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Network Models.
The OSI Model Prof. Choong Seon HONG.
Chap. 2 Network Models.
The OSI Model & the TCP/IP Protocol Suite
The OSI Model and the TCP/IP Protocol Suite
Lecturer, Department of Computer Application
DEPARTMENT OF COMPUTER SCIENCE
IOS Network Model 2nd semester
Lec 5 Layers Computer Networks Al-Mustansiryah University
The OSI Model and the TCP/IP Protocol Suite
Chapter 3: Open Systems Interconnection (OSI) Model
OSI Model The Seven Layers
Network Layer The network layer is responsible for the source-to-destination delivery of a packet, possibly across multiple networks (links). Whereas the.
OSI Model. Overview:  Review  OSI Model  Layer 1 - The Physical Layer  Layer 2 - The Data Link Layer  Layer 3 - The Network Layer  Layer 4 - The.
OSI Model OSI MODEL.
Chapter 2 Network Models
The OSI Model and the TCP/IP Protocol Suite
Presentation transcript:

The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their underlying architecture

2.2 Seven layers of the OSI model

2.3 Figure 2.4 An exchange using the OSI model

2.4 LAYERS IN THE OSI MODEL LAYERS IN THE OSI MODEL In this section we briefly describe the functions of each layer in the OSI model. Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer

 Transmits the digital bit stream over the transmission medium.  Defines the electrical and mechanical specifications of the connection (i.e. cable and connectors).

 Physical Characteristics of Interface and Media  Representation of Bits/ Encoding  Data Rate/ Transmission Rate  Synchronization of Bits

 Line Configuration  Physical Topology  Transmission Mode

 Responsible for Node-To-Node Delivery  Makes Physical Layer error free to the upper layers

 Framing  Physical Addressing  Flow Control  Error Control  Access Control

Data Link Layer Example

 Responsible for Source-to-Destination delivery  Network Layer ensures that each packet gets from its point of origin to its final destination  DL Layer oversees the delivery of data between 2 systems on the same network

 Node –to Node vs Source to Destination  If the two systems are connected to the same network, there is no need for Network layer and node –to node delivery is enough  If two systems are connected to two different networks, there is often a need for Source-to destination delivery

 Logical Addressing  Physical addressing implemented by Data link layer handles addressing problem locally  If a packet is going from one network to another, we need another addressing system to help distinguish source & destination systems  Network layer adds Header to the data coming from upper layers that among other things include LOGICAL ADDRESS of the sender and receiver

 When independent networks or links are connected together to create an “internetwork”, the internetworking devices route packets to their final destination  Routers are those internetworking devices  One of the functions of Network layer is to define this route

 We want to send data from a node with network address ‘A’ and physical address 10, located on one LAN to  A node with network address P and physical address 95 located on another LAN  Because the two nodes are present on two different networks, we cannot use physical address only  We need a Network address that can pass us from the Network boundaries  The packet therefore contains the logical address which remains the same from source to destination  The physical address will change when packet moves from one network to the other

 Responsible for Source-to-Destination delivery of Entire Message  Network Layer oversees source-to- destination delivery of the entire packets but it does not recognize any relationship b/w those packets  Transport Layer ensures that whole message arrives at the destination intact

 Service Point Addressing  Segmentation and Reassembly  Connection Control  Flow Control  Error Control

 Computers run several programs at the same time  Source-to-Destination delivery means delivery not only from only from one computer to the other but also from a specific process on one computer to a specific process on the other  Transport layer header includes a type of address called Service Point Address or PORT Address  Network layer each packet to the correct computer while Transport layer gets entire message to the correct process on that computer

 Message is divided into transmittable segments  Each segment contains a sequence number  These sequence no.s enable Transport layer at the receiving m/c to reassemble message correctly at the destination and to identify and replace lost packets

 Transport layer can be either connection-less or connection-oriented  ConnectionLess ◦ Treats each segment as an independent packet and delivers it to the transport layer of the destination machine  Connection-Oriented ◦ A connection is established first with Transport layer before delivering the packet.

 Like Data link layer, Transport layer is also responsible for Flow control  Flow control is performed end-to-end rather than across a single link  Error Control  Like data link layer, Transport layer is responsible for the Error Control  Error control is performed end-to-end  This layer makes sure that entire message reaches Rx Transport layer w/o error  Error can be a result of Lost, damaged or duplicated data and usually Re Tx is done

 Session layer is the Network Dialog Controller  Establishes, Maintains, and Synchronizes the interaction between communicating systems

 Dialog Control  Session layer allows two systems to enter into a dialog.  It allows communication between two processes to take place either in half duplex or full duplex mode

 Session layer allows a process to add check points (synchronization points) in a stream of data  If a system is sending a file of 2000 pages, it is advisable to insert check points after every 100 page to ensure that each 100 page unit is received and acknowledged independently  In this case, if a crash happens during the transmission of page 523, retransmission at page 501  Page need not be retransmitted

 Presentation layer is concerned with Syntax and Semantics of info exchange between two systems

 Translation  Encryption  Compression

 The processes (running programs) in two systems are usually exchanging info in the form of character strings, numbers and so on…..  The info should be changed to bit streams before being transmitted  Because different computers use different ENCODING SYSTEMS, presentation layer is responsible for interoperability b/w these different encoding methods  The presentation layer at the sender changes the info from its sender-dependent format to the common format  The presentation at the receiver changes info from common to the receiver dependent format

 To carry sensitive info, a system must be able to assure privacy  Encryption means that sender transforms original info to another form and sends the resulting message out over the network  Decryption reverses the original process to transform message back to its original form  Compression  Data compression reduces the number of bits to be transmitted  Data compression becomes particularly important in transmission of multimedia such as text, audio and video

 Enables the user either human or software to access the network  It provides user interface and support for the services such as ◦ Electronic mail ◦ Remote File access and Transfer ◦ Shared Database Management

 In the figure, of many application services available, only three services are shown  X-400 (message Handling Services)  X-500 (Directory Services)  File Transfer, Access& Management (FTAM)  In this example user uses X-400 to send an message

 Network Virtual Terminal  File Transfer, Access & Management (FTAM)  Mail Services  Directory Services

 NVT is a software version of a physical terminal and allows a user to log on to a remote host  To do so the application created emulation of terminal at the remote host  Users computer talks to the software terminal which in turn talks to the host *& vice versa  Remote host believes it is communication with one of its own terminals and allow you to log on

 This application allows a user to access file on the remote computers to make changes or read data  The purpose of this access is to Retrieve files from a remote computer and to manage or control files in that remote computer  Mail Services  This application provides the basis for forwarding and storage  Directory Services  Provides distributed database sources and access for global info about various objects and services