0% found this document useful (0 votes)
15 views

Models - An Overview

The document discusses the OSI reference model and TCP/IP model, describing the OSI model as having 7 layers that define network communication standards from the physical layer to the application layer, and the TCP/IP model as having 5 layers that are similar but fewer than the OSI model. Both models provide layered frameworks to allow communication across different computer systems and network types through protocols that define services between each layer.
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Models - An Overview

The document discusses the OSI reference model and TCP/IP model, describing the OSI model as having 7 layers that define network communication standards from the physical layer to the application layer, and the TCP/IP model as having 5 layers that are similar but fewer than the OSI model. Both models provide layered frameworks to allow communication across different computer systems and network types through protocols that define services between each layer.
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 129

OSI Reference Model and the TCP/IP Model

Unit 2
Protocol Reference Model of
OSI
THE OSI MODEL
 Established in 1947 by ISO,
 The International Standards Organization (ISO) is a multinational body
dedicated to worldwide agreement on international standards.
 An ISO standard that covers all aspects of network communications is the
Open Systems Interconnection (OSI) model.
 It was first introduced in the late 1970s.

 Layers :
 Application layer
 Presentation layer
 Session layer
 Transport layer
 Network layer
 Data link layer
 Physical layer
Introduction to the OSI layer
Open Systems Interconnection (OSI)
Each layer support the layers above it and offers
services to the layers below
Each layer performs unique and specific task
A layer has knowledge of its neighbour layers only
A layer’s service is independent of its implementation
How OSI was created
An attempt to design a framework to develop
networking technologies
OSI became a tool for explaining Networking in
general
Before OSI was created people created their
Software/Hardware as they wanted it to be.
There was no compatibility.
OSI is used as a rule set for all vendors to create their
Software/Hardware by using the standards.
Protocol Reference Model of OSI
II OSI Overview

1. OSI- layered framework for the


design of network systems that
allows communication across all
types of computer systems.

2. The OSI 7 Layers. ( Brief


functional overview. )

3. Vertical and horizontal


communication between the
layers using interfaces. (defines
what information and services
should the layer provide to the
layer above it. )
Layers
Each layer contains a logical grouping of functions
Each function receive an input(one or more) and
produces an output
Protocol Reference Model of OSI
I History
1. The need for standardization
- many vendors, no interoperability
- no common framework

2. ISO and CCITT came up with


OSI (Open System
Intercommunication) in 1984.

3. OSI Protocol Suite – unaccepted by


vendors and users. (TCP won)

4. OSI – a standard, which allows


communication between different
systems without requiring changes
to the logic of the underlying
hardware and software.

CCITT (Consultative Committee for International Telephony and


Telegraphy)
ITU-T (for Telecommunication Standardization
Sector of the International Telecommunications
Protocol Reference Model of OSI
Layer abstraction and the path of the message
Protocol Reference Model of OSI

OSI Overview

4. Data Encapsulation
a) PDU conception –
each protocol on the diff.
layer has its own format.
b) Headers are added
while a packet is going
down the stack at each
layer.
c) Trailers are usually
added on the second
layer.

Protocol data unit


An exchange using the OSI model
The TCP/IP Service Model
Researchers also developed the TCP/IP protocol suite
- a layered reference model – (Internet Model)
The TCP/IP reference model consists of 5 layers
3 software layers
1 software & hardware layer
1 hardware layer
The TCP/IP Service Model
 The 5 layers:

1. Application
2. Transport
3. Internet
4. Network Interface
5. Hardware
TCP/IP Network Model
Different view – 4 layers
Layer 1 : Link
Layer 2 : Network
Layer 3 : Transport
Layer 4 : Application
Comparison with TCP/IP
Pretty similar to OSI
TCP/IP has fewer layers(four)
The main difference in layers is after the 4th layer
Layers
Application layer(Layer 7)
Applications and Services run on it
Enables users to interface with the underlying data network
Applications on that layer (E-mail clients, web browsers, Chats,
etc.) – top-stack applications (As users are on the top of the
stack)
Applications provide users with a way to create messages
Application layer services establish an interface to the network
Protocols provide the rules and formats that govern how data
is treated
Protocols on the destination and the host must match
Application layer
Protocol Reference Model of OSI

III The OSI Layers


7. Application Layer

 Provides user interfaces


and support for services
 Resource sharing and
device redirection
 Remote file access
 Remote printer access
 Inter-process
communication
 Network management
 Directory services
 Electronic messaging (such
as mail)
 Network virtual terminals
Presentation layer(Layer 6)
 Coding and conversion of Application layer data to ensure that data from the
source device can be interpreted by the appropriate application on the
destination device.
 Compression of the data in a manner that can be decompressed by the
destination device.
 Encryption of the data for transmission and the decryption of data upon
receipt by the destination.
 This is the layer at which application programmers consider data structure
and presentation
 Examples: GIF, JPEG, TIFF, etc.
 Sometimes no distinction is made between the presentation and application
layers. For example http/https. HTTP is generally regarded as an
application layer protocol although it has Presentation layer aspects such
as the ability to identify character encoding for conversion
Presentation layer
Protocol Reference Model of OSI

The OSI Layers


6. Presentation Layer

Translation
(connects different
computer systems)
Compression
(transmission
efficiency)
Encryption (SSL
security)
Session layer(Layer 5)
Functions at this layer create and maintain dialogs
between source and destination applications
Authentication
Permissions
Session Restoration (Checkpoint or recovery)
Session layer
Protocol Reference Model of OSI

The OSI Layers


5. Session Layer

Session
establishment,
maintenance and
termination
(Deciding who sends,
and when.)
Session support
(security, name
recognition, logging )
Transport layer(Layer 4)
 Tracking the individual communication between applications on the
source and destination hosts
 Segmenting data and managing each piece
 Reassembling the segments into streams of application data
 Identifying the different applications – use of port numbers
 Conversation Multiplexing
 Segments
 Connection-oriented conversations
 Reliable delivery
 Ordered data reconstruction
 Flow control
 TCP – Web Browser
 UDP – Video Streaming Applications
Transport layer
Reliable process-to-process delivery of a message
Protocol Reference Model of OSI
The OSI Layers
4. Transport Layer

 Connectionless and
connection-oriented services
– TCP and UDP
 Process-Level Addressing
 Multiplexing and
Demultiplexing
 Segmentation, Packaging
and Reassembly
 Connection Establishment,
Management and
Termination
 Acknowledgments and
Retransmissions
 Flow Control
Network layer(Layer 3)
Addressing (IPV4)
Encapsulation (Inserts a header with source and
destination IPs)
Routing (Move a packet over the Internet)
Decapsulation (Open the packet and check the
destination host)
IP is connectionless
Network layer
Source-to-destination delivery
Protocol Reference Model of OSI
The OSI Layers
3. Network Layer

 Logical Addressing - IP
 Routing (where the packet
is addressed to)
 Datagram Encapsulation

 Fragmentation and
Reassembly (handling too
big packets )
 Error Handling and
Diagnostics ( using status
messages for example )
Protocol Reference Model of OSI
End to end packet delivery
Data link layer(Layer 2)
 It is the role of the OSI Data Link layer to prepare Network layer packets
for transmission and to control access to the physical media.
 Allows the upper layers to access the media using techniques such as
framing
 Controls how data is placed onto the media and is received from the media
using techniques such as media access control and error detection
 Frame - The Data Link layer PDU
 Node - The Layer 2 notation for network devices connected to a common
medium
 Media/medium - The physical means for the transfer of information
between two nodes
 Network - Two or more nodes connected to a common medium
 The Data Link layer is responsible for the exchange of frames between
nodes over the media of a physical network.
Data link layer
Hop-to-hop delivery
Protocol Reference Model of OSI
The OSI Layers
2. Data Link Layer
2.1. Logical Link Control (LLC )
 Establishment and control of logical links
between local devices on a network.
2.2. Media Access Control (MAC)
 The procedures used by devices to control
access to the network medium.

• Frame sequencing
• Frame acknowledgment
• Addressing
• Frame delimiting
• Frame error checking
• PDU: frame
Physical layer (Layer 1)
The role of the Physical layer is to encode the binary
digits that represent Data Link layer frames into
signals and to transmit and receive these signals
across the physical media that connect network
devices.
Copper cable
Fiber
Wireless
Physical layer
Protocol Reference Model of OSI
The OSI Layers
1. Physical Layer

• Definition of Hardware Specifications


(of cables, connectors, wireless radio
transceivers, network interface cards )
• Encoding and Signaling (bit
representation)
• Data Transmission and Reception
(half duplex, full duplex )
• Topology and Physical Network
Design (mesh, ring, bus)
• PDU: bit
Protocol Reference Model of OSI

OSI Summary
Application
E-Mail:
•Recipient
Presentation
•Message:
Subject
•Body
Recipient – CHAR(9)
Session Frame:
Session
•SubjectMessage:
– CHAR (17)
•Data Link Header
••Session Header
Body – CHAR (243)
Transport •Transport
Network Header
•Network
RecipientFrame:
Message:
•Transport
TransportHeader
Header
Network ••Subject
Network Header
•Session
Session Header
Header
••Body
Transport Header
Data link ••Recipient
Recipient
Session Header
••Subject
Subject
Recipient
Physical ••Body
Body
Subject
01001101111010010011001…
•Body Network
Summary of layers
TCP/IP PROTOCOL SUITE

The layers in the TCP/IP protocol suite do not exactly


match those in the OSI model.

The original TCP/IP protocol suite was defined as


having four layers: host-to-network, internet, transport,
and application.

However, when TCP/IP is compared to OSI, we can say


that the TCP/IP protocol suite is made of five layers:
physical, data link, network, transport, and application.
TCP/IP model development
In the late-60s The Defense Advance Research Projects
Agency (DARPA) originally developed Transmission
Control Protocol/Internet Protocol (TCP/IP) to
interconnect various defense department computer
networks.
The Internet, an International Wide Area Network, uses
TCP/IP to connect networks across the world.
4 layers of the TCP/IP model
Layer 4: Application
Layer 3: Transport
Layer 2: Internet
Layer 1: Network access

It is important to note that some of the


layers in the TCP/IP model have the same
name as layers in the OSI model.
Do not confuse the layers of the two models.
The network access layer
Concerned with all of the issues that an IP packet
requires to actually make the physical link. All the details
in the OSI physical and data link layers.
Electrical, mechanical, procedural and functional
specifications.
Data rate, Distances, Physical connector.
Frames, physical addressing.
Synchronization, flow control, error control.
The Internet layer
Send source packets from any network on the
internetwork and have them arrive at the destination
independent of the path and networks they took to get
there.
Packets, Logical addressing.
Internet Protocol (IP).
Route , routing table, routing protocol.
The transport layer
The transport layer deals with the quality-of-service
issues of reliability, flow control, and error correction.
Segments, data stream, datagram.
Connection oriented and connectionless.
Transmission control protocol (TCP).
User datagram protocol (UDP).
End-to-end flow control.
Error detection and recovery.
TCP/IP Reference Model
3. Transport layer (layer 3)
Allows end-to-end communication
Connection establishment, error control,
flow control
Two main protocols at this level
Transmission control protocol (TCP),
 Connection oriented
 Connection established before sending data
 Reliable

user datagram protocol (UDP)


 Connectionless
 Sending data without establishing connection
 Fast but unreliable
The application layer
Handles high-level protocols, issues of representation,
encoding, and dialog control.
The TCP/IP combines all application-related issues into
one layer, and assures this data is properly packaged for
the next layer.
FTP, HTTP, SMNP, DNS ...
Format of data, data structure, encode …
Dialog control, session management …
TCP/IP protocol stack
TCP/IP Reference Model

Layer Protocols

Application HTTP TELNET FTP SMTP SNMP

Transport TCP UDP

Internet IP ICMP

Network Access
ETHERNET PACKET RADIO
(Host-to-network)
Protocols at the application layer
 HTTP:
 browser and web server communication
 FTP :
 file transfer protocol
 TELNET:
 remote login protocol
 POP3: Retrieve email
 POP3 is designed to delete mail on the server as soon as the user has downloaded it

 IMAP (Internet Message Access Protocol )


 Retrieve emails,
 retaining e-mail on the server and for organizing it in folders on the server
Protocols at the transport layer
 Transmission control protocol (TCP),
 Connection oriented

 Connection established before sending data

 Reliable

 user datagram protocol (UDP)


 Connectionless

 Sending data without establishing connection

 Fast but unreliable


Protocol at the network layer
IP
Path selection ,
routing and addressing
ICMP (Internet Control Message Protocol )
sends error messages relying on IP
 a requested service is not available
 a host or router could not be reached
Protocols at the link layer
Ethernet
Uses CSMA/CD
Token Ring
Data Formats
Application data message
application
layer

transport TCP TCP TCP segment


layer header data header data header data

network IP TCP packet


layer header header data

data link Ethernet IP TCP Ethernet frame


layer header header header data trailer
Packet Encapsulation (TCP/IP)
 The data is sent down the protocol stack
 Each layer adds to the data by prepending headers

22Bytes 20Bytes 20Bytes 4Bytes


What is the length of
the data packet? 64 to 1500 Bytes
Comparing TCP/IP with OSI
OSI Model TCP/IP Hierarchy Protocols

7th
Application Layer

6th
Presentation Layer Application Layer

5th
Session Layer

4th
Transport Layer
Transport Layer

3rd
Network Layer
Network Layer

2nd
Link Layer
Link Layer
1st
Physical Layer

Link Layer : includes device driver and network interface card


Network Layer : handles the movement of packets, i.e. Routing
Transport Layer : provides a reliable flow of data between two hosts
Application Layer : handles the details of the particular application
How the OSI and TCP/IP Models Relate in a Networking Environment

OSI
OSI Model Equipment Words to TCP/IP
Model Pneumonic Equipment Data Protocols
Name Purpose Remember Model
Layer
Redirector,
Layer 7 Application All FTP, Telnet, Browsers Application
Regular Computer SMTP,
or A Special SNMP, Common Data
Layer 6 Presentation People Computer Data Application
Gateway. Used to Netware Format
combine networks Core
using different NFS, SQL, Dialogues and
Layer 5 Session Seem communication RPC, X-Win
Application
Conversations
protocols Quality of
Layer 4 Transport To Computer Segment TCP and UDP Service, and Transport
Reliability
Segment Network Routable
Path Selection,
into Smaller Protocols.
Layer 3 Network Need Router Packet (IP, IPX,
Routing, and Internet
Broadcast Addressing
AppleTalk)
Domains
Bridge (2
Data Link Segment Network NDIS, ODI, Frames and
Ports) or Network
Layer 2 -MAC Data into Smaller Frame MAC Address, Media Access
Switch and Ether Talk Control (MAC) Access
-LLC Collision Domains
NIC
Repeater,
One Collision AND
Hub (Multi- Signals and Network
Layer 1 Physical Processing One Broadcast Bit Physical
Media
port), Access
Domain
Cabling
Internet applications
TCP/IP takes care of the hard problems
 Location of the destination host
 Making sure the data is received in the correct order and error
free

Coding Internet applications


 Turns out to be straightforward.

The key concept of Internet programming is


 The client-server model
Client-Server model
 Client and server processes operate on machines which are able to communicate through a network:

The Server waits for requests from client


When a request is received
The server lookup for the requested data
And send a response the client
 Sockets and ports

A socket is an end-point of any communication link


between two programs
A port number bound to a socket specifies the
protocol to be used at the receiving end
 Example of servers
 File servers
 Web servers
 Example of client applications
 Browsers
 Email clients
What is a socket?
An interface between application and network.
Create a socket
 Socket(Protocolfamily, type-of-communicatio, specific- protocol);
The application creates a socket
The socket type dictates the style of communication
 reliable vs. best effort
 connection-oriented vs. connectionless
Port 0

Port 1

Ports Port 65535

 Each host has 65,536 ports


 20,21: FTP
 23: Telnet
 80: HTTP
 A socket provides an interface
to send data to/from the
network through a port
Application
E-Mail:
•Data Bytes
Transport
Transport Packet:
•IP Datagrams:
TCP Header
Internet ••Data
IP Header
Bytes
•TCP Header
Network •Data Bytes
Network Frame:
Interface •IP Header
•TCP Header
Hardware •Data Bytes
01001101111010010011001… Network
TCP/IP and OSI model
ADDRESSING

Four levels of addresses are used in an Internet employing


the TCP/IP protocols: physical, logical, port, and specific.

Physical Addresses
Logical Addresses
Port Addresses
Specific Addresses
Addresses in TCP/IP
Relationship of layers and addresses in TCP/IP
Example 1

A node with physical address 10 sends a frame to a node


with physical address 87. The two nodes are connected
by a link (bus topology LAN). As the figure shows, the
computer with physical address 10 is the sender, and the
computer with physical address 87 is the receiver.
Example 1 Physical addresses
Example 2

Most local-area networks use a 48-bit (6-byte) physical


address written as 12 hexadecimal digits; every byte (2
hexadecimal digits) is separated by a colon, as shown
below:

07:01:02:01:2C:4B

A 6-byte (12 hexadecimal digits) physical address.


Example 3

Example 3 shows a part of an Internet with two routers


connecting three LANs. Each device (computer or
router) has a pair of addresses (logical and physical) for
each connection. In this case, each computer is
connected to only one link and therefore has only one
pair of addresses. Each router, however, is connected to
three networks (only two are shown in the figure). So
each router has three pairs of addresses, one for each
connection.
Example 3 IP addresses
Example 4

Example 4 shows two computers communicating via the


Internet. The sending computer is running three
processes at this time with port addresses a, b, and c. The
receiving computer is running two processes at this time
with port addresses j and k. Process a in the sending
computer needs to communicate with process j in the
receiving computer. Note that although physical
addresses change from hop to hop, logical and port
addresses remain the same from the source to
destination.
Example 4 Port addresses
Example 5

A port address is a 16-bit address represented by one


decimal number as shown.

753

A 16-bit port address represented


as one single number.
Specific Addresses
Application layer Addressing

Email addresses

Universal Resource Locator (URL)


TCP/IP Service Model: Overview
Major differences between OSI and TCP/IP:
 TCP/IP has no presentation layer
 The applications must agree on a data format (how many
bytes for a floating point, etc)
 Thus, presentation/encoding is handled by the application

layer
 TCP/IP has no session layer
 Not significant: It does little in modern networks
 In TCP/IP a session is typically managed by the application

layer
The TCP/IP Protocol in Action
Consider the following simplified network route
The source (S) and destination (D) are separated by
two routers (R1, R2)

S R1 R2 D
The TCP/IP Protocol in Action
Let’s consider a web browser, using HTTP (Hypertext
Transfer Protocol)
 The web browser on S sends a packet to the web server on D
 The application layer (i.e. the browser) provides the logical
(IP) addresses for S (IPS) and D (IPD)
 The application layer also provides the port numbers for the
source (PortS) and destination (PortD) – usual ports 80 or
8080

S R1 R2 D
HTTP Req
The TCP/IP Protocol in Action
The Transport layer (TCP) uses the port numbers
(e.g. 2765 and 80) to create a TCP packet
(sometimes called a segment):

S R1 R2 D
Source Port: 2765
Destination Port: 80

HTTP Req
The TCP/IP Protocol in Action
The Internet (i.e. IP) layer uses the IP addresses
specified by the application layer to create an IP
datagram
e.g. 137.207.140.71, 24.87.204.16
Next, a route is determined for the packet, using S’s
routing table
 S only needs one router’s address (R1)

S R1 R2 D
Source IP: 137.207.140.71
Dest IP: 24.87.204.16
TCP Segment

HTTP Req
The TCP/IP Protocol in Action
The MAC addresses of S and R1 (MACS and MACR1)
are used to create a network frame
If the MAC address of R1 is not known, ARP (Address
Resolution Protocol) is used

S R1 R2 D
Source MAC: MACS
Dest MAC: MACR1
IP Datagram

TCP Segment
HTTP Req
The TCP/IP Protocol in Action
Let’s simplify the picture (for clarity)
In subsequent steps the IP datagram and its contents
will not change very much

S R1 R2 D
Source MAC: MACS
Dest MAC: MACR1
IP Datagram
The TCP/IP Protocol in Action
The network frame is transmitted on the network
to R1
This is possible since S and R1 are both members of
the same network

S R1 R2 D
Source MAC: MACS
Dest MAC: MACR1
IP Datagram
The TCP/IP Protocol in Action
R1 will extract the IP datagram from the payload of
the network frame
R1 looks up the destination IP address (IP ) in it’s
D
routing table, to determine which router should get
the datagram next (R2)

S R1 R2 D
IP Datagram
The TCP/IP Protocol in Action
R1 uses its own MAC address (MACR1) and R2’s
MAC address (MACR2) to create another network
frame

S R1 R2 D
Source MAC: MACR1
Dest MAC: MACR2
IP Datagram
The TCP/IP Protocol in Action
The network frame is received by R2, and the IP
datagram is extracted from it’s payload
R2 uses its routing table to lookup IPD
In this case, R2 is directly connected to D
 This is called direct routing

S R1 R2 D
Source MAC: MACR1
Dest MAC: MACR2
IP Datagram
The TCP/IP Protocol in Action
Most likely, R2 does not have the MAC address of D
(MACD)
The address resolution protocol (ARP) is used to
determine the MAC address:

S R1 R2 ARP Request
D
IP: 24.87.204.16
IP Datagram
MAC: ?
The TCP/IP Protocol in Action
D recognizes it’s IP address and responds with its
MAC address (MACD)
e.g. 08-7F-3C-90-0C-DF

S R1 R2 ARP Response
D
IP: 24.87.204.16
IP Datagram
MAC: 08-7F-3C-90-0C-DF
The TCP/IP Protocol in Action
A network frame is created by R2 now that the
MAC address is known
The frame is sent directly to D

S R1 R2 D
Source MAC: MACR2
Dest MAC: MACD
IP Datagram
The TCP/IP Protocol in Action
D extracts the IP datagram from the network frame
(which is discarded)
The IP datagram’s payload is passed to the
transport layer

S R1 R2 D
Source MAC: MACR2
Dest MAC: MACD
IP Datagram
The TCP/IP Protocol in Action
The Transport layer (within D’s operating system),
will use the port numbers specified in the TCP
segment to determine to which application it
should send the segment
In this case, to the application bound to port 80 (the
web server)

S R1 R2 D
Source Port: 2765
Destination Port: 80

HTTP Req
The TCP/IP Protocol in Action
Now, the web server on D has the HTTP request,
and it processes it
An HTTP response is sent back using the same
process
The web server uses the same IP addresses and
logical addresses as the last message

S R1 R2 D
HTTP Req
The Postal Analogy
How would the OSI compare to the regular Post Office

 A- Write a 20 page letter to a foreign country.


Application
 P- Translate the letter so the receiver can read it.
Presentation
 S- Insure the intended recipient can receive letter.
Session
 T- Separate and number pages. Like registered mail,
Transport tracks delivery and requests another package if one is
“lost” or “damaged” in the mail.
Network  N- Postal Center sorting letters by zip code to route them
closer to destination.
 D- Local Post Office determining which vehicles to
Data-Link deliver letters.
 P- Physical Trucks, Planes, Rail, autos, etc which carry
Physical letter between stations.
Remembering the 7 Layers

7 - Application All
6 - Presentation People
5 - Session Seem
4 - Transport To
3 - Network Need
2 - Data Link Data
1 - Physical Processing
Protocol Stack
Connecting Networks
Repeater: physical layer
Bridge: data link layer
Router: network layer
Gateway: network layer and above.

Many workstations can operate as routers or gateways


Repeater
Copies bits from one network to another
Does not look at any bits
Allows the extension of a network beyond physical
length limitations
typically hardware devices.

REPEATER
Bridge
Copies frames from one network to another
Can operate selectively - does not copy all frames
(must look at data-link headers).
Extends the network beyond physical length
limitations.
can be implemented in hardware or software

BRIDGE
Router
Copies packets from one network to another.
Makes decisions about what route a packet should take
(looks at network headers).
typically implemented in software so that they can be
extended to handle new protocols

ROUTER
ROUTER
Gateway
Operates as a router
Data conversions above the network layer.
Conversions:
encapsulation - use an intermediate network
translation - connect different application protocols
encrpyption - could be done by a gateway
typically implemented in software so that they can be
extended to handle new protocols
Encapsulation Example

Gateway Gateway

Provides service connectivity even


though intermediate network does not
support protocols.
Communication Between
Layers
7. Application

Data
Encapsulation

6. Presentation

Data
Stripping

5. Session
Data Encapsulation In TCP/IP
 At each layer in the TCP/IP protocol stack
 Outgoing data is packaged and identified for delivery to the layer underneath
 PDU – Packet Data Unit – the “envelop” information attached to a packet at
a particular TCP/IP protocol
 e.g. header and trailer
 Header
 PDU’s own particular opening component
 Identifies the protocol in use, the sender and intended recipient
 Trailer (or packet trailer)
 Provides data integrity checks for the payload
Encapsulation example: E-mail
Encapsulation
Packet Encapsulation
 The data is sent down the protocol stack
 Each layer adds to the data by prepending headers

22Bytes 20Bytes 20Bytes 4Bytes

64 to 1500 Bytes
What Each Layer Does

2
 Gives end-user applications access to
network resources

 Where is it on my computer?
 Workstation or Server Service in
MS Windows

3
Presentation Layer

3
Session Layer
 Allows applications to
maintain an ongoing session

 Where is it on my computer?
 Workstation and Server
Service (MS)
 Windows Client for
NetWare (NetWare)

3
Transport Layer
 Provides reliable data
delivery
 It’s the TCP in TCP/IP

 Receives info from upper


layers and segments it into
packets

 Can provide error detection


and correction 3
Transport layer

The transport layer is responsible for


the delivery of a message from one
process to another.
Network Layer

 Provides network-wide addressing and


a mechanism to move packets between
networks (routing)

 Responsibilities:
 Network addressing
 Routing

 Example:
 IP from TCP/IP 3
Network layer

The network layer is responsible for


the delivery of individual packets from
the source host to the destination host.
Network Addresses
Network-wide addresses
Used to transfer data across subnets
Used by routers for packet forwarding
Example:
 IP Address

Where is it on my computer?
 TCP/IP Software
Data Link Layer

 Places data and retrieves it


from the physical layer and
provides error detection
capabilities

3
Data link layer

The data link layer is responsible for


moving frames from one hop (node) to
the next.
Sub-layers of the Data Link Layer
MAC (Media Access Control)
 Gives data to the NIC
 Controls access to the media through:
 CSMA/CD Carrier Sense Multiple Access/Collision
Detection
 Token passing

LLC (Logical Link Layer)


 Manages the data link interface (or Service Access Points
(SAPs))
 Can detect some transmission errors using a Cyclic
Redundancy Check (CRC). If the packet is bad the LLC will
request the sender to resend that particular packet.
Physical Layer
Determines the specs for all
physical components
 Cabling
 Interconnect methods (topology /
devices)
 Data encoding (bits to waves)
 Electrical properties
Examples:
 Ethernet (IEEE 802.3)
 Token Ring (IEEE 802.5)
3
 Wireless (IEEE 802.11b)
Physical layer

The physical layer is responsible


for the movement of individual bits
from one hop (node) to the next.
Physical Layer
What are the Physical Layer components on my
computer?
NIC
 Network Interface Card
 Has a unique 12 character Hexadecimal number permanently
burned into it at the manufacturer.
 The number is the MAC Address/Physical address of a
computer
Cabling
 Twister Pair
 Fiber Optic
 Coax Cable
How Does It All Work Together

 Each layer contains a Protocol Data Unit (PDU)


 PDU’s are used for peer-to-peer contact between
corresponding layers.

 Data is handled by the top three layers, then


Segmented by the Transport layer.

 The Network layer places it into packets and the


Data Link frames the packets for transmission.

 Physical layer converts it to bits and sends it out


over the media.

 The receiving computer reverses the process using


the information contained in the PDU. 2
Translation
Gateway

Translate from green protocol to brown protocol


Encryption gateway
Secure Secure
Network Encryption/Decryption Network
Gateways

GW ? GW
?
?

Insecure Network

You might also like