TCP/IP Guide. OSI Reference Model Real-World Analogy Phase OSI Layer CEO LetterWeb Site Connection (Simplified) Transmission 7 The CEO of a company in.

Slides:



Advertisements
Similar presentations
1 The 7 layer OSI model Sending an . 2 The seven layers.
Advertisements

Network Layer and Transport Layer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
Networking Theory (part 2). Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication.
Communicating over the Network
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
BA 471 – Telecommunications and Networking Dr. V.T. Raja Oregon State University
Introduction To Networking
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
BA Telecommunications and Networking Dr. V.T. Raja Oregon State University
CECS 474 Computer Network Interoperability Tracy Bradley Maples, Ph.D. Computer Engineering & Computer Science Cal ifornia State University, Long Beach.
Understanding Networks Charles Zangla. Network Models Before I can explain how connections are made from across the country, I would like to provide you.
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
Unit 4, Lesson 11 How Data Travels the Internet
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Chapter 3 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain why protocols are necessary in communication.
Computer Networks.  The OSI model is a framework containing seven layers that defines the protocols and devices used at each stage of the process when.
Characteristics of Communication Systems
INTERNET DATA FLOW Created by David Whitchurch for ISDS 4120 Louisiana State University.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
Internet Ethernet Token Ring Video High Speed Router Host A: Client browser: REQUEST:http//mango.ee.nogradesu.edu/c461.
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
1 CS 4396 Computer Networks Lab TCP/IP Networking An Example.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
TCP =Transmission Control Protocol IP = Internet Protocol TCP/IP Protocol.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
1 12-Jan-16 OSI network layer CCNA Exploration Semester 1 Chapter 5.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
TCP/IP. The idea behind TCP/IP is exactly the same we explained about the OSI reference model: when transmitting data, programs talk to the Application.
Transmission Control Protocol (TCP) Internet Protocol (IP)
THE NETWORKS Theo Chakkapark. Open System Interconnection  The tower of power!  The source of this power comes from the model’s flexibility.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
The OSI Model A Framework for Communications David A. Abarca July 19, 2005.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
J. Liebeher (modified by M. Veeraraghavan) 1 Introduction Complexity of networking: An example Layered communications The TCP/IP protocol suite.
1 Introductory material. This module illustrates the interactions of the protocols of the TCP/IP protocol suite with the help of an example. The example.
How Information Flows via the Internet By: Lee Farrell.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Introduction and Overview of Network and Telecommunications.
The OSI Model. History of OSI Model ISO began developing the OSI model in It is widely accepted as a model for understanding network communication.
Introduction and Overview of Network and Telecommunications
Chapter 5 Network and Transport Layers
Distributed Systems.
Part I. Overview of Data Communications and Networking
Layered Architectures
Networking for Home and Small Businesses – Chapter 6
TCP/IP Networking An Example
Lec 5 Layers Computer Networks Al-Mustansiryah University
Encapsulation/Decapsulation
Networking for Home and Small Businesses – Chapter 6
Topic 5: Communication and the Internet
TCP/IP Networking An Example
Lecture 4 Communication Network Protocols
TCP/IP Protocol Suite: Review
Networking Theory (part 2)
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
CSE 313 Data Communication
How Our Customers Communicate With Us
Networking for Home and Small Businesses – Chapter 6
INFORMATION FLOW ACROSS THE INTERNET
Kyle Broussard, Alexandra Mikolai,
Networking Theory (part 2)
Networking Theory (part 2)
Presentation transcript:

TCP/IP Guide

OSI Reference Model Real-World Analogy Phase OSI Layer CEO LetterWeb Site Connection (Simplified) Transmission 7 The CEO of a company in decides he needs to send a letter to a peer of his in. He dictates the letter to his administrative assistant.administrative assistant You decide you want to connect to the web server at IP address , which is within your organization but not on your local network. You type the address into your browser. 6The administrative assistant transcribes the dictation into writing. (Generally, with a web site connection, nothing happens at this layer, but format translation may be done in some cases.) 5 The administrative assistant puts the letter in an envelope and gives it to the mail room. The assistant doesn't actually know how the letter will be sent, but he knows it is urgent so he says, “get this to its destination quickly”. The request is sent via a call to an application program interface (API), to issue the command necessary to contact the server at that address.application program interfaceserver 4 The mail room must decide how to get the letter where it needs to go. Since it is a rush, the people in the mail room decide they must use a courier. The envelope is given to the courier company to send.courier company The Transmission Control Protocol (TCP) is used to create a segment to be sent to IP address Routing 3 The courier company receives the envelope, but it needs to add its own handling information, so it places the smaller envelope in a courier envelope (encapsulation). The courier then consults its airplane route information and determines that to get this envelope to, it must be flown through its hub in. It hands this envelope to the workers who load packages on airplanes. Your computer creates an IP datagram encapsulating the TCP datagram created above. It then addresses the packet to but discovers that it is not on its local network. So instead, it realizes it needs to send the message to its designated routing device at IP address It hands the packet to the driver for your Ethernet card (the software that interfaces to the Ethernet hardware). 2 The workers take the courier envelope and put on it a tag with the code for. They then put it in a handling box and then load it on the plane to. The Ethernet card driver forms a frame containing the IP datagram and prepares it to be sent over the network. It packages the message and puts the address (for the router) in the frame. 1The plane flies to. The frame is sent over the twisted pair cable that connects your local area network. (I'm ignoring overhead, collisions, etc. here, but then I also ignored the possibility of collisions with the plane. ) 2 In, the box is unloaded, and the courier envelope is removed from it and given to the people who handle routing in. The Ethernet card at the machine with IP address receives the frame, strips off the frame headers and hands it up to the network layer. 3 The tag marked “” is removed from the outside of the courier envelope. The envelope is then given back to the airplane workers to be sent to. The IP datagram is processed by the router, which realizes the destination ( ) can be reached directly. It passes the datagram back down to the Ethernet driver. 2 The envelope is given a new tag with the code for, placed in another box and loaded on the plane to. The Ethernet driver creates a new frame and prepares to send it to the device that uses IP address The plane flies to.The frame is sent over the network. 2 The box is unloaded and the courier envelope is removed from the box. It is given to the routing office. The Ethernet card at the device with IP address receives the frame, strips off the headers and passes it up the stack. Reception 3 The courier company in sees that the destination is in, and delivers the envelope to the destination CEO's company. The IP headers are removed from the datagram and the TCP segment handed up to TCP. 4 The mail room removes the inner envelope from the courier envelope and delivers it to the destination CEO's assistant. TCP removes its headers and hands the data up to the drivers on the destination machine. 5The assistant takes the letter out of the envelope.The request is sent to the Web server software for processing. 6 The assistant reads the letter and decides whether to give the letter to the CEO, transcribe it to , call the CEO on her cell phone, or whatever. (Again, in this example nothing probably happens at the Presentation layer.) 7The second CEO receives the message that was sent by the first one.The Web server receives and processes the request.