OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

Similar documents
Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1

Cisco Cisco Certified Network Associate (CCNA)

Chapter -4 OSI Reference Model

Defining Networks with the OSI Model. Module 2

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

1: Review Of Semester Provide an overview of encapsulation.

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

Network Architecture Models

Data Communication and Network. Introducing Networks

CCNA Exploration1 Chapter 7: OSI Data Link Layer

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

Chapter 7. Local Area Network Communications Protocols

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

ITEC 3800 Data Communication and Network. Introducing Networks

Communicating over the Network

Networking Models OSI Model Created by International Organization Standardization

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Lecture (02) Network Protocols and Standards

Question 7: What are Asynchronous links?

Lecture (03) (I) OSI Reference Model

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

Cross Layer Protocol Design. Radio Communication III

Lecture-4. TCP/IP-Overview:

Networking Fundamentals

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition

Imi :... Data:... Nazwisko:... Stron:...

M242 COMPUTER NETWORS AND SECURITY

Internetwork Basic. Possible causes of LAN traffic congestion are

System Programming. Introduction to computer networks

Chapter 2. Communicating Over The Network

Chapter 2 Communicating Over the Network

Introduction to Open System Interconnection Reference Model

Lecture (03) Network Model

Network Reference Models

Communication Networks

NetWare Protocols. Background CHAPTER

ELC 537 Communication Networks

CCNA MCQS with Answers Set-1

Chapter 2 Network Models 2.1

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

COMPONENTS OF DATA COMMUNICATION

Internetworking Models The OSI Reference Model

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards

Copyleft 2005, Binnur Kurt. Objectives

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

TCP/IP THE TCP/IP ARCHITECTURE

NetWare Protocols. Background. Technology Basics CHAPTER

Networking interview questions

Lecture (03) Data Encapsulation. Network Layer (Physical/Data link)

8. Networks. Why networked embedded systems General network architecture. Networks. Internet-enabled embedded systems Sensor networks

Networks: Access Management

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers.

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

OSI and TCP/IP Models

Operating Systems and. Computer Networks. Introduction to Computer Networks. Operating Systems and

Lecture (03) Networking Model (TCP/IP) Networking Standard (OSI) cont.,..

Network Review TEJ4M. SBrace

Raj Jain. The Ohio State University Columbus, OH

SUBJECT: DATA COMMUNICATION AND NETWORK SEMESTER: V SEMESTER COURSE: BCA SUBJECT TEACHER: Dr.K.Chitra Assistant Professor, Department of Computer

Computer Networks (Unit wise Questions)

Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak

Cisco CCNA (and CCDA) Study Guide

Chapter 11: Wide-Area Networks and the Internet

Operating Systems CS 571

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Interface The exit interface a packet will take when destined for a specific network.

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

Lecture 3 Protocol Stacks and Layering

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02

TCP/IP Protocol Suite and IP Addressing

CS-461 Internetworking. Dr. Mohamed Aboutabl

Networking midterm. 5. As a data unit moves up from one protocol layer to another, control headers are:

QUESTION BANK ENGINEERS ACADEMY. Computer Networks Computer Network Basics Segentation is done in. 12. Session layer is used for

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

ECE4110 Internetwork Programming. Introduction and Overview

Revision of Previous Lectures

TCP/IP Overview. Basic Networking Concepts. 09/14/11 Basic TCP/IP Networking 1

Communication Networks

DATA COMMUNICATION AND NETWORKS

Study Guide. Module Two

Computer Networks (Introduction to TCP/IP Protocols)

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Need For Protocol Architecture

Need For Protocol Architecture

Cisco Interconnecting Cisco Networking Devices Part 1.

Lecture (02) The TCP/IP Networking Model

Module 11. OSI Model, Network Devices, and Network Standards

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

AppleTalk. Chapter Goals. Introduction CHAPTER

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

Networking and TCP/IP. John Kalbach November 8, 2004

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

Transcription:

Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010

OSI Reference Model Late in 1970s the International Organization for Standardization (ISO) developed the Open Systems Interconnection (OSI) Reference Model to describe how information is transferred from one machine to another, from the point when a user enters information using a keyboard and mouse to when that information is converted to electrical or light signals transferred along a piece of wire or radio waves transferred through the air. Advantages: Dividing the complex network operations into manageable layers. The possibility of changing one layer without having to change all other layers. Simplifies teaching and learning.

The Upper Layers The top three layers define how the applications within the end stations will communicate with each other and with users. None of the upper layers knows anything about networking or network addresses. The Lower Layers The four bottom layers that define how data is transferred through a physical wire or through switches and routers. These bottom layers also determine how to rebuild a data stream from a transmitting host to a destination host s application.(how data is transmitted endto-end).

Application Layer It provides the interface that a person uses to interact with the application. This interface can be command-line-based or graphics-based. Cisco IOS routers and switches have a command-line interface (CLI), whereas a web browser uses a graphical interface. Protocols: File Transfer Protocol (FTP) File Transfer Protocol, or FTP, is a protocol used to upload files from a workstation to a FTP server or download files from a FTP server to a workstation. It is the way that files get transferred from one device to another in order for the files to be available on the Internet. When ftp appears in a URL (Uniform Resource Locator) it means that the user is connecting to a file server and not a Web server and that some form of file transfer is going to take place. Most FTP servers require the user to log on to the server in order to transfer files. Hyper Text Transfer Protocol (HTTP) In contrast, Hyper Text Transfer Protocol, or HTTP, is a protocol used to transfer files from a Web server onto a browser in order to view a Web page that is on the Internet. Unlike FTP, where entire files are transferred from one device to another and copied into memory, HTTP only transfers the contents of a web page into a browser for viewing. FTP is a two-way system as files are transferred back and forth between server and workstation. HTTP is a one-way system as files are transported only from the server onto the workstation's browser. When http appears in a URL it means that the user is connecting to a Web server and not a file server. The files are transferred but not downloaded, therefore not copied into the memory of the receiving device. Telephone etwork (Telnet) terminal emulation program for TCP/IP networks. The Telnet program runs on your computer and connects your PC to a server on the network. You can then enter commands through the Telnet program and they will be executed as if you were entering them directly on the server console. Electronic Mail (Email) Transmission of messages over communications networks can use Simple Mail Transfer Protocol (SMTP) or the X.400 standard to deliver messages between different e-mail applications.

Presentation Layer Defining data encryption, compression, and format example, text is represented in two different forms: ASCII and EBCDIC. ASCII (the American Standard Code for Information Interchange, used by most devices today) uses seven bits to represent characters. EBCDIC (Extended Binary-Coded Decimal Interchange Code, developed by IBM) is still used in mainframe environments to represent characters. Text can also be shaped by different elements, such as font, underline, italic, and bold. There are different standards for representing graphical information BMP, GIF, JPEG, TIFF, and others. This variety of standards is also true of audio (WAV and MIDI) and video (WMV, AVI, and MPEG). Session Layer Protocols: Start, control and ends conversations (communication sessions). Keeps different application separate. etwork File System ( FS) Developed by Sun Microsystems and used with TCP/IP and Unix workstations to allow transparent access to remote resources. Structured Query Language (SQL) Developed by IBM to provide users with a simpler way to define their information requirements on both local and remote systems. Remote Procedure Call (RPC) A broad client/server redirection tool used for disparate service environments. Its procedures are created on clients and performed on servers. X Window Widely used by intelligent terminals for communicating with remote Unix computers, allowing them to operate as though they were locally attached monitors. AppleTalk Session Protocol (ASP) Another client/server mechanism, which both establishes and maintains sessions between AppleTalk client and server machines.

Transport Layer Establishing a connection-oriented (reliable) and connectionless (unreliable) communications. Segments and reassembles data into a data stream, sequencing and combination. Provide end-to-end data transport services and can establish a logical connection virtual circuits between the sending host and destination host on an internetwork. Protocols: Transmission Control Protocol (TCP) is a connection-oriented protocol. Sequenced Packet Exchange (SPX) is a connection-oriented protocol. User Datagram Protocol (UDP) is a connection-less protocol. Ex: Connection-Oriented Communication Establishing a connection-oriented session Transmitting segments with flow control

Windowing: Data throughput would be low if transmitting machine had to wait for an acknowledgment after sending each segment. Controls how much information is transferred from one end to the other. Acknowledgments: Data won t duplicate or lost, positive acknowledgment with retransmission.

Network Layer Routing through internetwork and network addressing, transporting traffic between devices that are not locally attached, how to fragment segments to smaller packets to accommodate media with smaller maximum transmission size, how routing works and how routes are learned. IP running in CISCO router responsible for examining the destination IP comparing the destination IP with the routing table fragmenting packet and queuing the fragmented packets. Protocols: Internet Protocol (IP) (32 bits). Internetwork Packet exchange (IPX) (80 bits, 4 bytes network portion and 6 bytes node portion MAC address ). Internet Control Message Protocol (ICMP). Address Resolution Protocol (ARP). Reverse Address Resolution Protocol (RARP). Routed protocols Data Packets : Used to transport user data through the internetworking. Protocols transport user data called routed protocols such as IP, IPX.

Routing protocols Route Update Packets : Used to update neighbor about networks connected to routers in the internetwork. Protocols that send route updates packets are called routing protocols such as IGRP, EIGRP, RIP, OSPF Routing table used in a router Devices: Router is a device that functions at the Network layer. Data Link Layer ( LLC & MAC): Translate message from network layer into bits for the physical layer to transmit, formatting the message into Data Frame adding header containing the hardware destination and source address.

Media Access Control (MAC) Layer Function: Arbitration: which determine when it is appropriate to use the physical medium. For Example: Ethernet uses the Carrier Sense Multiple Access with Collision Detection algorithm for arbitration. The basic algorithm for using Ethernet when there is data to be sent consists of the following steps: 1. Check if a digital signal (Frame) on the wire (Carrier Sense) another NIC might already have a frame on the wire (Multiple Access). 2. If another digital signal (Frame) on the wire Wait, and then listen again. 3. If clear No other host is transmitting send. 4. The transmitting host constantly monitors the wire to make sure no other hosts begin transmitting. 5. If the host detects a signal (Frame) on the wire it sends extended JAM SIGNAL that causes all nodes in the segment to stop sending data (Frames) THINK, Busy Signal (Collision Detection). 6. The nodes respond to that jam signal by waiting a while before attempting to transmit again. Backoff algorithms determine when the colliding stations can retransmit. 7. If collisions keep occurring after 15 tries Time out. Addressing: so that the correct recipient(s) receive and process the data that is sent. Error detection and ordered delivery of frames: which determines whether the data made the trip across the medium successfully. (Parity & CRC). For Example: Ethernet uses Cyclic Redundancy Check (CRC) stored in Frame Check Sequence (FCS). The filed contains a value of 4 Bytes which, when plugged into a mathematical formula along with the frame contents, can determine if the Frame had bit errors.

Logical Link Layer (LLC) Layer Function: What is the data? Which determines the type of header that follows the data link header. For Example: One types of Ethernet frames available: IEEE 802.2: SAP (Service Access Point) Field Length in Bytes Description Destination SAP number 1 Identifies the network layer protocol that this is to be sent to Source SAP number 1 Identifies the network layer protocol that originated this data Control field 1-2 Determines the fields that follow this field Data Variable This contains the upper layer network layer packet Protocols: The LLC performs its multiplexing by using Service Access Point (SAP) identifiers. When a network layer protocol is encapsulated in the 802.2 frames, the protocol of the network data is placed in the SAP field. When the destination receives the frame, it examines the SAP field to determine which upper-layer network layer protocol should process the frame. This allows the destination network device to differentiate between TCP/IP and IPX network layer protocols that are being transmitted across the data link layer connection. LA Protocols: 802.2 (LLC) 802.3 (Ethernet) 802.5 (Token Ring) 802.11(wireless) WA Protocols: HDLC PPP Frame Relay ISDN ATM Devices: ICs, Switches and Bridges are examples of devices that function at the Data Link layer.

Physical Layer: The physical layer responsible for how binary information is converted to a physical layer signal. For example, if the cable uses copper as a transport medium, the physical layer defines how binary 1 s and 0 s are converted into an electrical signal by using different voltage levels. If the cable uses fiber, the physical layer defines how 1 s and 0 s are represented using an LED or laser with different light frequencies. The physical layer is also defines physical properties for connections and communication, including wires (UTP and fiber) and connectors (RJ-45 and DB-9). The type of interface used on the networking device: The type of interface is commonly called a NIC. A NIC can be a physical card that you put into a computer, like a 10BaseT Ethernet card, or a fixed interface on a switch, like a 100BaseTX port on a Cisco Catalyst 1900 series switch. The type of cable used for connecting devices: Examples of physical layer standards include the following cable types: Category-3, -5, and -5E; and others. The connectors used on each end of the cable: Interface connectors include the following: AUI, BNC, RJ-11, RJ-45, and others. The pin-outs used for each of the connections on the cable: The straight-through cable is used to connect: Host to switch or hub, Router to switch or hub Four wires are used in straight-through cable to connect Ethernet devices. Devices: A hub, repeater and cable connectors are examples of devices that function at the physical layer. A hub and a repeater are examples of devices that function at the physical layer. A hub is really a multiple-port repeater. A repeater receives a digital signal and reamplifies or regenerates that signal, and then forwards the digital signal out all active ports without looking at any data. An active hub does the same thing.