The OSI Model. Level 3 Unit 9 Computer Networks

Similar documents
E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

1: Review Of Semester Provide an overview of encapsulation.

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols

Network Protocols - Revision

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Networking Models OSI Model Created by International Organization Standardization

Defining Networks with the OSI Model. Module 2

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

CCNA 1 Chapter 10 v5.0 Exam Answers 2013

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

ก ก Information Technology II

Chapter 2 Network Models 2.1

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Communicating over the Network. Network Fundamentals. ITE PC v4.0 Chapter Cisco Systems, Inc. All rights reserved.

ISO/OSI Model and Collision Domain NETWORK INFRASTRUCTURES NETKIT - LECTURE 1 MANUEL CAMPO, MARCO SPAZIANI

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

Communicating over the Network

Lab Using Wireshark to Examine Ethernet Frames

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

Unit 28 Website Production ASSIGNMENT 1

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1

CIT 380: Securing Computer Systems. Network Security Concepts

Chapter 3: Network Protocols and Communications

IP Basics Unix/IP Preparation Course June 29, 2010 Pago Pago, American Samoa

Lab Using Wireshark to Examine Ethernet Frames

products. OSI is an ISO Standard: OSI was officially adopted as an international standard by the International Organisation of Standards (ISO).

SETUP FOR OUTLOOK (Updated October, 2018)

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

PROGRAMMING Kyriacou E. Frederick University Cyprus. Network communication examples

Chapter -4 OSI Reference Model

Use of the TCP/IP Protocols and the OSI Model in Packet Tracer

Operating Systems CS 571

Component 4: Introduction to Information and Computer Science

Read addressing table and network map

Computer Networks (Introduction to TCP/IP Protocols)

ENEE 457: Computer Systems Security 11/07/16. Lecture 18 Computer Networking Basics

Data Communication and Network. Introducing Networks

Chapter 2 Communicating Over the Network

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Network Reference Models

Application Layer: OSI and TCP/IP Models

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards

CCNA Guide to Cisco Networking, Third Edition

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP)

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer

CCNA 1 Chapter 5 v5.0 Exam Answers 2013

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Networking Fundamentals

Electronic Mail (SMTP)

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

ITEC 3800 Data Communication and Network. Introducing Networks

2. What is a characteristic of a contention-based access method?

Revision of Previous Lectures

Imi :... Data:... Nazwisko:... Stron:...

Introduction to computer networking

Interconnecting Cisco Networking Devices Part1 ( ICND1) Exam.

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Cross Layer Protocol Design. Radio Communication III

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

Introduction to the Packet Tracer Interface using a Hub Topology

System Programming. Introduction to computer networks

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

How to Configure Mobile VPN for Forcepoint NGFW TECHNICAL DOCUMENT

Copyleft 2005, Binnur Kurt. Objectives

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁

Packet Tracer - Investigating the TCP/IP and OSI Models in Action (Instructor Version Optional Packet Tracer)

CPEG514 Advanced Computer Networks. Atef Abu Salim University of Nizwa Spring 2013/2014

Special expressions, phrases, abbreviations and terms of Computer Networks

Networking Applications

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

Ethernet. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1

NAPIER UNIVERSITY SCHOOL OF COMPUTING

20-CS Cyber Defense Overview Fall, Network Basics

Lecture 7: Internetworking See Chapter 3 of Colouris

Introduction to TCP/IP

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

Chapter 3 LAN Configuration

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer

Experiment 3: Protocol Visualization with Packet Tracer

Time : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A.

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

ARP, IP, TCP, UDP. CS 166: Introduction to Computer Systems Security 4/7/18 ARP, IP, TCP, UDP 1

A Simplified Example of TCP/IP Communication Chuck Cusack

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses

Network Devices,Frame Relay and X.25

CS-461 Internetworking. Dr. Mohamed Aboutabl

CSc 466/566. Computer Security. 18 : Network Security Introduction

Cisco Cisco Certified Network Associate (CCNA)

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

CCNA 1 v5.0 R&S ITN Final Exam 2014

Transcription:

The OSI Model

OSI Model Consider the network models we have already covered Whenever data is transferred from PC to PC or PC to Server it will travel through the Layers of the OSI Model

OSI Model

OSI Model Why do you need to Learn about OSI? Network professionals use the OSI to communicate with each other in the workplace! OSI = Open Systems Interconnection Developed by Computer Networking industry at ISO (International Standardization Organization) meetings to allow for equipment from different manufacturers to work together.

OSI Layers

OSI Model Mnemonic Layer 7 All A > Application Layer 6 People P > Presentation Layer 5 Seem S > Session Layer 4 To T > Transport Layer 3 Need N > Network Layer 2 Data D > Data Link Layer 1 Processing P > Physical

Software Engineers v s Network Engineers

Software Engineer Layers

Software Engineering Layers

Layer 7 Application Layer

Layer 7 Application Layer Layer 7 = Application Layer What If we had no GUI? We would need to write code\commands! For Example: The HTTP Get Request: GET /index.html HTTP/1.1 Host: www.google.co.uk

Layer 6 Presentation Layer Format the Data Correctly! Ensure it is Readable: Compression - LZ (Lossless) MP3 (Lossy) Encryption - SSL, IPSec File Formats ASCII, MIME, XML, RTF (Text) JPEG, GIF, PNG (Picture) MPEG, MP4 (Video) MP3 (Audio)

Layer 5 Session Layer Layer 5 = Session Layer Start a Session! TCP 3 Way Handshaking > 1/. Client 1 Q: Would You Like to Have a Conversation? 2/. Client 2 A: Yes! 3/. Client 1 A: OK Lets Start Talking!

Layer 5 Session Layer Layer 5 = Session Layer Multiple Sessions Session Authentication e.g. Logging In To Online Banking or estudy Consider Browser Tabs 1 x Applications, 3 x Sessions Open!

Day in the life of a Packet Pt.1

Network Engineer Layers

Layer 4 - Transport A Day in the Life of a Packet! Email Example Part 2 Layer 4 = Transport Layer Logical Port Numbers Encapsulation = Split the Data into Segments Encapsulation = Label Logical Port Numbers Get the Data to the Correct Application From: SMTP Port#25 (Send or Receive?) To: POP3 Port#110

Layer 3 Network Layer A Day in the Life of a Packet! Email Example Part 3 Encapsulation = Packets Remember: The IP Address is looked up using DNS Label From: Source IP Address e.g. 192.168.1.10 Label To: Destination IP Address e.g. 192.168.2.10 Using a Mask of 255.255.255.0 Are these Clients in the Same Network?

Layer 2 Data Link Layer Layer 2 = Data Link Layer Media Independence Different Type of Frames for Different Media e.g. Copper or Fibre optic Cabling A Day in the Life of a Packet! Email Example Part 4 Encapsulation = Frames Label From: Source MAC Address e.g. 00-11-22-33-44-55 Label To: Destination MAC Address e.g. 66-77-88-99-AA-BB (Note: MAC is a Globally Unique Identifier on all NICs it is made up of Hexadecimal digits 0-9 and A-F) Layer 2 vs Layer 3 Addressing Local LAN (MAC) vs Remote WAN (IP) Addressing IP Address Stays the Same! MAC Changes Every Step

Layer 2 Data Link Layer Q: Layer 2 = Data Link Layer How Does the Client Know the MAC Address? A: ARP (Address Resolution Protocol) (Cover Later!)

Layer 2 Data Link Layer ARP is used to perform IP address resolution which is the linking of a Layer 3 IP addresses to a Layer 2 MAC (Media Access Control) hardware addresses. ARP uses a broadcast to do this by asking the host that has the given IP address to respond to the broadcast (ARP REQUEST = WHO HAS XX.XX.XX.XX.XX.XX TELL 172.19.13.1) with its MAC address (ARP REPLY = I HAVE XX.XX.XX.XX.XX.XX @ 172.19.13.50). Broadcast traffic goes to all hosts in the LAN, so all hosts will receive the ARP request and the specific host will be the only one to reply. Entries in ARP cache are kept for a maximum of 10 minutes. An entry that is not used within 2 minutes is deleted. This allows for faulty hardware being removed from the network and the IP address being assigned to different physical hardware.

Layer 1 Physical Layer

Layer 1 Physical Layer Represent the Data as Electrical or Light Pulses

OSI Model