0% found this document useful (0 votes)
17 views27 pages

2-Osi Model

Uploaded by

theeeclipse17
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views27 pages

2-Osi Model

Uploaded by

theeeclipse17
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

LAN DESIGN & IMPLEMENTATION

OSI AND TCP MODELS


THE OSI MODEL

• Open Standards Interconnection (OSI) was created by the International


Organization for Standardization (ISO)
• OSI model to helps vendors agree on a set of common standards.
• This involved dividing network functions into a set of logical levels or layers.
• Each layer performs a specific set of functions.
• Troubleshooting became easier because certain errors could be traced to a
certain OSI layer.
THE OSI MODEL

Get used to referring to each layer by its number because this


is how real-world network technicians use the OSI.
As data is passed down from the top layers to the bottom for
transportation across the physical network media, the data is
placed into different types of logical data boxes- “packets,”
that have different names depending upon the OSI layer.
THE OSI MODEL

The process of data moving down the


OSI model is referred to as
encapsulation. Moving back up and
having these boxes stripped of their
data is called de-encapsulation
LAYER 7 – APPLICATION LAYER

• This layer is the closest layer to the end-user, you and me.
• The Application Layer isn’t the operating system of the devices but usually
provides services such as e-mail (SNMP and POP3), web browsing (using
HTTP), and file transfer services (using FTP).
• The Application Layer determines resource availability
LAYER 6 – PRESENTATION LAYER

• The Presentation Layer presents data to the Application Layer.


• Multimedia works here, so think MP4, JPEG, GIF, etc. Encryption, decryption,
and data compression also take place at this layer.
LAYER 5 – SESSION LAYER

• The role of the Session Layer is to set up, manage, and terminate sessions or
dialogues between devices.
• These take place over logical links, and what is really happening is the joining
of two software applications.
• SQL, RPC, and NFS all work at the Session Layer.
LAYER 5 – SESSION LAYER

• The role of the Session Layer is to set up, manage, and terminate sessions or
dialogues between devices.
• These take place over logical links, and what is really happening is the joining
of two software applications. SQL, RPC, and NFS all work at the Session
Layer.
LAYER 4 – TRANSPORT LAYER

• The role of the Transport Layer is to break down the data from the higher
layers into smaller parts, which are referred to as segments (at this layer).
• Virtual circuits are set up here, which are required before devices can
communicate.
• Before the data can be passed across the network, the Transport Layer needs
to establish how much data can be sent to the remote device.
• This will depend upon the speed and reliability of the link from end to end.
LAYER 4 – TRANSPORT LAYER

• The three methods used to control data flow are as follows:


• Flow control
• Windowing
• Acknowledgements
LAYER 4 – TRANSPORT LAYER

Flow Control
• If the receiving system is being sent more information than it can process, it
will ask the sending system to stop for a short time.
LAYER 4 – TRANSPORT LAYER

Windowing
With windowing, each system agrees upon
how much data is to be sent before an
acknowledgment is required.
This “window” opens and closes as data
moves along in order to maintain a constant
flow.
LAYER 4 – TRANSPORT LAYER

Acknowledgements
• When a certain amount of segments is received, the fact that they all arrived
safely and in the correct order needs to be communicated to the sending
system.

Acknowledgements
Three-Way Handshake
LAYER 4 – TRANSPORT LAYER

The Transport Layer includes several protocols, and the most widely known are
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
• TCP is a reliable connection-oriented protocol.
• It uses the three-way handshake, windowing, and other techniques to
guarantee that the data gets to its destination safely.
• UDP is a connectionless protocol.
LAYER 3 – NETWORK LAYER

• The Network Layer takes the segments from the Transport Layer and
encapsulates them with IP addressing information to form PDUs called
packets.
• The Network Layer must determine the best path to take from one network to
another; for this reason, routers work at this layer.
LAYER 2 – DATA LINK LAYER

• The Data Link Layer encapsulates packets with physical addressing into PDUs
referred to as frames.
• Layer 2 switches work at this layer and use hardware or MAC addresses, so
they can switch traffic much faster because there is no need to check IP
addresses and routing tables.
• WAN protocols work at Layer 2, including Ethernet, HDLC, ISDN, and PPP.
LAYER 1 – PHYSICAL LAYER

• At this layer, frames are converted into bits for placing on the wire.
• These bits consist of electrical pulses, which are read as “on” and “off” bits, or
in binary 1s and 0s, respectively.
• Hubs work at this layer, and here is where you will find cable specifications,
such as RJ45.
OSI TROUBLESHOOTING

• Using a layered approach can be very effective when you’re troubleshooting


your network.
• Determine which way you want to use the OSI stack – top-down, bottom-up, or
divide-and-conquer method.
• It is recommended for beginners in NW troubleshooting, you start at the
bottom layer and work your way up.
OSI TROUBLESHOOTING-BOTTOM-UP APPROACH
Layer 1 Troubleshooting
• Are all the cables inserted into the ports correctly, or have they come loose?
• Are the cable ends bent or worn out?
If cables are the problem, you will usually see an amber light showing
on the device, else if cables are OK, it should be green.
• Has somebody forgotten to add the correct speed to the interface?
• Has the speed of the Ethernet port been set correctly?
• Has the interface been opened for use by the network administrator?
OSI TROUBLESHOOTING-BOTTOM-UP APPROACH

• Layer 2 Troubleshooting– Has the correct protocol been applied to the


interface so it agrees with the other side, such as Ethernet/PPP/HDLC, etc.?
• Layer 3 Troubleshooting – Is the interface using the correct IP address and
subnet mask?
• Layer 4 Troubleshooting– Is the correct routing protocol being used, and is the
correct network being advertised from the router?
THE TCP/IP, OR DOD, MODEL

• The TCP/IP model is another framework and an alternative to the OSI model.
• The TCP/IP model is a four or five-layered model created by an association
known as DARPA.
• It is also known as the Department of Defense (DoD) model.
TCP-IP (4 LAYER MODEL)

The four layers from the top down are as follows:


4 – Application [Telnet/FTP/DNS/RIP]
3 – Transport/Host-to-Host [UDP/TCP/ICMP]
2 – Internet or Internetwork [IPSec/IP]
1 – Physical [Frame Relay/Ethernet/ATM]
TCP-IP 5 LAYER MODEL
The TCP/IP model has been updated from four to five layers, as below:
• 5 – Application [Telnet/FTP/DNS/RIP/HTTP]
• 4 – Transport/Host-to-Host [UDP/TCP/ICMP]
• 3 – Network [IPSec/IP]
• 2 – Data Link [Ethernet/Frame Relay/PPP]
• 1 –Physical [Bits on the wire]
This course shall focus on the 5-layer model
TCP-IP 5 LAYER MODEL

• Data is encapsulated as it travels down from the Application Layer to the


Physical Layer
MAPPING THE TCP/IP MODEL TO THE OSI MODEL

Layer # OSI MODEL TCP-IP MODEL


1 APPLICATION APPLICATION
2 PRESENTATION
3 SESSION
4 TRANSPORT TRANSPORT
5 NETWORK INTERNET
6 DATALINK DATALINK
7 PHYSICAL PHYSICAL
TRANSMISSION CONTROL PROTOCOL (TCP)
• TCP operates at the Transport Layer of the OSI model.
• It provides a connection-oriented service for reliable transfer of data
between network devices.
• TCP also provides flow control, sequencing, windowing, and error detection.
• It attaches a 32-bit header to the Application Layer data, which is in turn
encapsulated in an IP header.
• TCP is described in RFC 793.
COMMON TCP PORTS

FTP Data – 20 FTP Control – 21 SSH-22 Telnet – 23


SMTP – 25 DNS – 53 (also uses UDP) HTTP – 80
POP3 – 110

You might also like