1 / 38

Understanding the OSI Model: Layers & Protocols

Learn about the OSI model, its layers, and protocols for efficient network communication. Explore examples and functions of each layer.

allredj
Download Presentation

Understanding the OSI Model: Layers & Protocols

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Semester 1 Chapter 2 The OSI Model

  2. The OSI Reference Model • The OSI layer was introduced by the International Organization for Standardization (ISO) in 1984 in order to provide a reference model to make sure products of different vendors would interoperate in networks. • OSI is short for Open Systems Interconnection. • The OSI layer shows WHAT needs to be done to send data from an application on one computer, trough a network, to an application on another computer, not HOW it should be done. • A layer in the OSI model communicates with three other layers: the layer above it, the layer below it, and the same layer at its communication partner. • Data transmitted between software programs passes all 7 OSI layers. • The Application, Presentation and Session layers are also known as the Upper Layers. • The Data Link and Physical layers are often implemented together to define LAN and WAN specifications.

  3. What is a Protocol? • A Protocol is a set of rules that make communication on a network more efficient. • E.G. - When answering the telephone, someone says, "Hello," then the person calling says, "Hello. This is.... "; and so it goes back and forth • One technical definition of a data communications protocol is: a set of rules, or an agreement, that determines the format and transmission of data. Layer n on one computer communicates with Layer n on another computer.

  4. What are the 7 layers of the OSI Model?

  5. Why use a Layered Model?

  6. Remembering the OSI Model • All 7 - Application • People 6 - Presentation • Seem 5 - Session • To 4 - Transport • Need 3 - Network • Domino’s 2 - Data Link • Pizza 1 - Physical

  7. Remembering the OSI Model • Away 7 - Application • Pizza 6 - Presentation • Sausage 5 - Session • Throw 4 - Transport • Not 3 - Network • Do 2 - Data Link • Please 1 - Physical

  8. Layer 1 – Physical Layer • The physical layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between communicating network systems. • Physical layer specifications define characteristics such as: • voltage levels • timing of voltage changes • physical data rates • maximum transmission distances • physical connectors • Physical layer implementations can be categorized as either LAN or WAN specifications. • more on next slide…

  9. Layer 1 – Physical Layer – Continued… • Examples of LAN specifications are: • Ethernet • FastEthernet • Token Ring • FDDI • Examples of WAN specifications are: • HSSI • V.24 • V.35 • BRI • RS-232 • Transmits bits. (bitstream) • Repeaters operate at this layer.

  10. Some Layer 1 Examples… 10 Base 2 – Co Ax 10 Base 5 – Thicknet Fibre Optic Connectors UTP

  11. Layer 2 – Data Link Layer • Defines psychical addressing, network topology, and is also concerned with error notification, sequencing of frames and flow control. • Examples of network topologies are: • Star • Bus • Ring • Physical addresses are also known as hardware and BIA's (Burned In Addressess) but most commonly as MAC addresses. • Examples of Data Link LAN specifications are: • Ethernet • FastEthernet • Token Ring • FDDI • More on next slide…

  12. Layer 2 – Data Link Layer – Continued… • Examples of Data Link WAN specifications are: • Frame Relay (operates also on the Physical layer) • PPP (operates also on the Physical layer) • X.25 (operates also on the Physical and Network layer) • Transmits Frames. • Bridges and Switches operate at this layer. • The Data Link layer consists of two sublayers: • LCC (Logical Link Control) sublayer • Manages communication between devices over a single link of a network. • Enables multiple higher-layer protocols to share a single physical data link. • MAC sublayer • Manages protocol access to the physical network medium. • Determines hardware addresses.

  13. Some Layer 2 Examples… Network Interface Card (NIC) Workgroup Switch

  14. Layer 3 – Network Layer • Defines logical addressing for nodes and networks/segments. • Enables internetworking, passing data from one network to another. • Defines the logical network layout so routers can determine how to forward packets trough an internetwork. • Routing occurs at this layer, hence Routed and Routing protocols reside on this layer. • Routed protocols are used to encapsulate data into packets. The header added by the Network layer contains a network address so it can be routed trough an internetwork. • Examples of Network layer Routed protocols are: • IP, IPX, AppleTalk • Routing protocols are used to create routing tables; routing tables are used to determine the best path / route. Routing protocols provide periodic communication between routers in an internetwork to maintain information on network links in a routing table. • Examples of Network layer Routing protocols are: • OSPF, IGRP/EIGRP, RIP, BGP. • Transmits Packets. • Routers operate at this layer.

  15. Layer 4 – Transport Layer • The main purpose of this layers is making sure that the data is delivered error-free and in the correct sequence. • Establishes, maintains and terminates virtual circuits. • Provides error detection and recovery. • Is concerned with reliable and unreliable transport. When using a connection-oriented, reliable transport protocol, such as TCP, acknowledgments are send back to the sender to confirm that the data has been received. • Provides Flow Control and Windowing. • Provides multiplexing; the support of different flows of data to different applications on the same host. • Examples of Transport layer protocols are: • TCP (connection-oriented, reliable, provides guaranteed delivery.) • UDP (connectionless, unreliable, less overhead, reliability can be provided by the Application layer) • SPX • Transmits Segments.

  16. Layer 5 – Session Layer • The session layer establishes, manages, maintains and terminates communication channels between software programs on network nodes. • Provides error reporting for the Application and Presentation layer. • Examples of Session layer protocols are: • NFS • SQL • RPC • Transmits Data.

  17. Layer 6 – Presentation Layer • Defines coding and conversion functions. • Ensures that information sent from the application layer of one system is readable by the application layer of another system. • Includes common data representation formats, conversion of character representation formats, common data compression schemes, and common data encryption schemes, common examples of these formats and schemes are: • MPEG, QuickTime • ASCII, EBCDIC • GIF, TIFF, JPEG • Transmits Data.

  18. Layer 7 – Application Layer • Provides network services directly to applications. Software programs itself are not part of the OSI model. • Determines the identity and availability of communication partners, and determines if sufficient resources are available to start program-to-program communication. • This layer is closest to the user. • Examples of Application layer protocols are: • Telnet • SMTP • FTP • SNMP • Transmits Data.

  19. Data Encapsulation • Data Encapsulation is the process of adding a header to wrap the data that flows down the OSI model. • Each OSI layer may add it's own header to the data received from above. (from the layer above or from the software program 'above' the Application layer.) • The 5 Steps of Data Encapsulation are: • 1. The Application, Presentation andSession layers create DATA from users‘input. • 2. The Transport layer converts the DATA to SEGMENTS • 3. The Network layer converts the SEGMENTS to PACKETS (or datagrams) • 4. The Data Link layer converts the PACKETS to FRAMES • 5. The Physical layer converts the FRAMES to BITS. • At the sending computer the information goes from top to bottom while each layers divides the information received from upper layers in to smaller pieces and adds a header. At the receiving computer the information flows up the model discarding the corresponding header at each layer and putting the pieces back together.

  20. Data Encapsulation Diagram

  21. What are PDU’s? Each layer contains a Protocol Data Unit (PDU). PDU’s are used for peer-to-peer conversations.

  22. The TCP/IP Model • The TCP/IP Model was develop by the Department of Defense in the late 60s’ to ensure data communications would not be interrupted even under the worse circumstances. • Since then, TCP/IP has become the de facto method we use for data communications on the Internet.

  23. Exploring the 4 Layers of the TCP/IP Model Application • Includes all the functions of the OSI’s Application, Presentation, & Session layers including: • Data representation • Data encryption and • Dialog control Transport Internet Network Access

  24. Application Layer Protocols Application • FTP-File Transfer Protocol • HTTP-Hypertext Transfer Protocol • SMTP-Simple Mail Transfer Protocol • DNS-Domain Name Service • TFTP-Trivial File Transfer Protocol Transport Internet Network Access

  25. Exploring the 4 Layers of the TCP/IP Model Application • Uses the TCP protocol and is responsible for quality of service issues including: • Reliability • Flow Control and • Error Correction Transport Internet Network Access

  26. Transport Layer Protocols Application • TCP-Transmission Control Protocol • UDP-User Datagram Protocol Transport Internet Network Access

  27. Exploring the 4 Layers of the TCP/IP Model Application • Uses the IP protocol and is responsible for: • Path determination and • Packet switching. Transport Internet Network Access

  28. Internet Layer Protocols Application • IP – Internet Protocol Transport Internet Network Access

  29. Exploring the 4 Layers of the TCP/IP Model Application • Includes all the functions of the OSI’s Data Link & Physical layers including: • Processes required by IP to ensure a packet reaches its destination. • All the various LAN & WAN Technologies such as 100BaseTX & Frame Relay. Transport Internet Network Access

  30. Network Access Layer Protocols Application • LAN and WAN Technologies Transport Internet Network Access

  31. Comparing the 2 Models TCP/IP OSI Application Application Presentation Session Transport Transport Internet Network Network Access Data Link Physical

  32. Why are there 2 models? • TCP/IP is the most popular “protocol specific” model used on the Internet. • However, TCP/IP does not cover all the protocols and standards we will be exploring. • The OSI Model is “protocol independent.” Therefore, all topics covered in the curriculum can fit into its framework.

  33. What should I know for the test? • The OSI Model’s layers & their key characteristics and functions. • The process of data encapsulation and the various PDUs. • The TCP/IP layers and its corresponding protocols. • Comparison of the two model’s layers.

  34. Sample CCNA Question #1 In the TCP/IP model which layer would deal with reliability, flow control, and error correction? A – Transport Layer B – Internet Layer C – Network Layer D – Application Layer

  35. Sample CCNA Answer #1 In the TCP/IP model which layer would deal with reliability, flow control, and error correction? A – Transport Layer B – Internet Layer C – Network Layer D – Application Layer

  36. Sample CCNA Question #2 What is the control information called that is placed before data when encapsulating that data for network transmission? A – Frame B – Header C – Capsule D – Routing Information

  37. Sample CCNA Answer #2 What is the control information called that is placed before data when encapsulating that data for network transmission? A – Frame B – Header C – Capsule D – Routing Information

More Related