The Open Systems Interconnection
Reference Model
Presentation Overview
Introduction
The OSI Reference Model
The OSI Model Layers and Functions
Data Encapsulation
Peer-to-Peer Communications
Introduction
Significant increase in the number and overall
size of networks existed in the early 1980s.
Many of the early networks were built using
different implementations of hardware and
software.
Proprietary systems were privately developed,
owned, and controlled.
Introduction
Communication between networks became quite
difficult due to incompatibility.
The ISO recognized the need to create a network
model that would help networks communicate
and work together (interoperability).
Analyzing Network in Layers
Layers help us understand the actions that occur
during communication.
The OSI Reference Model
The primary model in network 7 Application
communications.
6 Presentation
Composed of seven layers which 5 Session
allows users to visualize the
4 Transport
network functions that occur at
each layer. 3 Network
2 Data Link
A framework used to understand
how information travels through 1 Physical
a network.
Benefits of the OSI Reference Model
Reduces complexity 7 Application
Standardizes interfaces 6 Presentation
5 Session
Facilitates modular engineering
4 Transport
Ensures interoperable technology 3 Network
Accelerates evolution 2 Data Link
1 Physical
Simplifies teaching and learning
The OSI Model Layers and Functions
7 Application Network Processes to Applications
6 Presentation
Provides network services to application
5 Session processes such as electronic mail, file transfer,
and terminal emulation.
4 Transport
3 Network
2 Data Link
1 Physical
The OSI Model Layers and Functions
7 Application
6 Presentation Data Representation
5 Session
Ensure data is readable by receiving system
4 Transport Format of data
Data structures
3 Network
Negotiates data transfer syntax for application
2 Data Link layer
1 Physical
The OSI Model Layers and Functions
7 Application
6 Presentation
5 Session Interhost Communication
4 Transport
Establishes, manages, and terminates
3 Network sessions between applications
2 Data Link
1 Physical
The OSI Model Layers and Functions
7 Application
6 Presentation
5 Session
4 Transport End-to-end Connections
3 Network
Concerned with transport issues between hosts
2 Data Link Data transport reliability
Establish, maintain, terminate virtual circuits
1 Physical
Fault detection and recovery information flow
control
The OSI Model Layers and Functions
7 Application Provides reliable transfer of data across media
Connectivity and path selection between host
6 Presentation
systems
5 Session Logical addressing
Best effort delivery
4 Transport
3 Network Network Address and Best Path Determination
2 Data Link
1 Physical
The OSI Model Layers and Functions
7 Application
6 Presentation
5 Session
Provides reliable transfer of data across media
4 Transport Connectivity and path selection between host
systems
3 Network
2 Data Link Direct Link Control, Access to Media
1 Physical
The OSI Model Layers and Functions
7 Application
6 Presentation
5 Session
4 Transport
3 Network
Wires, connectors, voltages, data rates
2 Data Link
1 Physical Binary Transmission
Data Encapsulation
The process by which data are wrapped with the
necessary protocol information before network
transit.
As data packet moves down through the layers
of the OSI model, it receives headers, trailer, and
other information.
Data Encapsulation
In order to encapsulate data, networks must
perform five conversion steps as follows:
Build the data.
Package the data for end-to-end transport.
Add the network IP address to the header.
Add the data link layer header and trailer.
Convert to bits for transmission.
Peer-to-peer Communications
Data travel from the source to the destination.
Each layer of the OSI model at the source must
communicate with its peer layer at the
destination.
Peer-to-peer Communications
7 Application 7 Application
6 Presentation 6 Presentation
5 Session 5 Session
4 Transport 4 Transport
3 Network 3 Network
2 Data Link 2 Data Link
1 Physical 1 Physical
Source Destination
The TCP/IP Protocol Stack
Presentation Overview
TCP/IP
TCP/IP Stack Protocols and Layers
OSI Model vs. TCP/IP Protocol Stack
Internet Protocol (IP)
TCP/IP Application
A standard, routable enterprise Transport
networking protocol that is the Internet
most complete and accepted.
Network Access
Various protocols work together to make
network communication happen.
The process involves multiple activities including:
resolving user-friendly computer names to IP addresses;
determining the location of the destination computer; and
routing the data so that it reaches the destination
successfully.
TCP/IP Stack Protocols and Layers
Application
Transport
Includes the session and presentation layer
Internet details
Handles high level protocols, issues of
Network Access representation, encoding, and dialog control
Common TCP/IP Protocols
FTP HTTP SMTP DNS HTTP SMTP
TCP UDP
IP
Internet LAN Many LANs and WANs
TCP/IP Stack Protocols and Layers
Application
Transport
Internet
Deals with the quality of service issues of
Network Access reliability, flow control, and error correction.
TCP/IP Stack Protocols and Layers
Application
Transport
Internet
Network Access
Responsible for sending source packets from
any network on the internetwork and have
them arrive at the destination independent of
the path and networks they took to get there.
TCP/IP Stack Protocols and Layers
Application
Transport
Internet
Network Access
Concerned with all the issues that an IP packet
requires to actually make a physical link.
OSI Model vs. TCP/IP Protocol Stack
7 Application
6 Presentation Application
5 Session
4 Transport Transport
3 Network Internet
2 Data Link
Network Access
1 Physical
OSI Model TCP/IP Model
OSI Model vs. TCP/IP Protocol Stack
Similarities:
Both have layers
Both have Application Layers, though they include
very different services
Both have comparable Transport and Network Layers
Packet-switched (not circuit-switched) technology is
assumed
Networking professionals need to know both
OSI Model vs. TCP/IP Protocol Stack
Differences:
TCP/IP combines the Presentation and Session Layer
issues into its Application Layer
TCP/IP combines the OSI Data Link and Physical
Layers into one layer
TCP/IP appears simpler because it has few layers,
but the OSI Model is simpler to develop and
troubleshoot
TCP/IP protocols are the standards around to which
the Internet developed
Internet Protocol (IP)
An Internet Layer protocol which helps to identify
the location of the destination computer in a
network communication.
A connectionless, unreliable protocol that is
primarily responsible for addressing packets and
routing them between networked computers.
Although IP always attempts to deliver packets,
it does attempt to recover then from errors by
requesting retransmission of data.
Internet Protocol (IP)
Analogous to a mailroom, IP is where packet
sorting and delivery take place. IP routes the
packets until they reach their destination.
Each packet includes the IP address of the
source and its intended recipient.
If IP identifies a destination address to be of the
same network segment, it transmits the packet
directly to that computer. Otherwise, IP must use
a router to send the packets.
Internet Protocol (IP)
IP is also responsible for ensuring that a packet
does not remain on a network forever .
A Time to Live (TTL) number is assigned to every
packet, which specifies the maximum length of
time that the packet can travel on the network
before being discarded.
Characteristics of TCP and UDP
Presentation Overview
User Datagram Protocol
Transmission Control Protocol
TCP and UDP Port Numbers
TCP Header Format
User Datagram Protocol (UDP)
A Transport Layer protocol that identifies the
destination application in communication of
networks.
UDP is used by applications through broadcast or
multicast transmission.
UDP is used for transmitting small amount of
data, or data that is not of high importance such
as streaming media.
User Datagram Protocol (UDP)
UDP characteristics include:
Connectionless
Unreliable
Transmits messages (called user datagrams)
Provides no software checking for message delivery
(unreliable)
Does not reassemble incoming messages
Uses no acknowledgments
Provides no flow control
Transmission Control Protocol (TCP)
A standard protocol that provides a reliable,
connection-oriented data delivery service
between only 2 computers (unicast).
Connection must be established before data is
transmitted.
TCP guarantees delivery of data at the
destination.
Transmission Control Protocol (TCP)
TCP characteristics include:
Connection-oriented
Reliable
Divided outgoing messages into segments
Reassembles messages at the destination station
Re-sends anything not received
Reassembles messages from incoming segments.
TCP Three-Way Handshake
Source
Destination
1. Source computer initiates connection by
transmitting session information, including
sequence number and size of packet.
TCP Three-Way Handshake
Source
Destination
2. Destination computer responds with its
session information.
TCP Three-Way Handshake
Source
Destination
3. Source computer agrees with and
acknowledges the received information.
TCP and UDP Port Numbers
A Port is an identifier for an application within a
computer, and is associated with either TCP or
UDP.
A port can be any number between 0 and
65,535.
A Socket is a combination of an IP address and a
a TCP or UDP port.
The IP address helps locate the destination
computer, and the port determines the
application to which data is to be sent.
TCP and UDP Port Numbers
TCP Ports UDP Ports
Port No. Description Port No. Description
21 FTP 53 DNS
23 Telnet 69 TFTP
25 SMTP 161 SNMP
TCP Header Format
0 4 10 16 24 31
SOURCE PORT DESTINATION PORT
SEQUENCE NUMBER
ACKNOWLEDGMENT NUMBER
HLEN RESERVED CODE BITS WINDOW
CHECKSUM URGENT POINTER
PADDING
OPTIONS (IF ANY)
DATA
…
Thank You