0% found this document useful (0 votes)
6 views

Lecture 4

The document provides an overview of computer networking, focusing on the OSI (Open Systems Interconnection) model, which standardizes network communication across different vendors. It details the seven layers of the OSI model, including the Physical, Data Link, Network, Transport, Session, Presentation, and Application layers, and contrasts it with the TCP/IP model. Additionally, it discusses the importance of communication protocols, port numbers, and introduces Wireshark as a tool for monitoring network traffic.

Uploaded by

shehnazali888
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Lecture 4

The document provides an overview of computer networking, focusing on the OSI (Open Systems Interconnection) model, which standardizes network communication across different vendors. It details the seven layers of the OSI model, including the Physical, Data Link, Network, Transport, Session, Presentation, and Application layers, and contrasts it with the TCP/IP model. Additionally, it discusses the importance of communication protocols, port numbers, and introduces Wireshark as a tool for monitoring network traffic.

Uploaded by

shehnazali888
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 42

Computer Network

Network in detail
Layered Tasks
We use the concept of layers in our daily life. As
an example, let us consider two friends who
communicate through postal mail. The process
of sending a letter to a friend would be complex
if there were no services available from the post
office.
Tasks involved in sending a
letter
The OSI (Open Systems
Interconnection) -Model
In the beginning the development of networks was
messy. Each vendor had its own restricted solution.

The bad part was that one vendor’s solution was not
compatible with another vendor’s solution.

This is where the idea for the OSI-model was born, having
a layered approach to networks our hardware vendors
would design hardware for the network, and others could
develop software for the application layer.
The OSI-Model
International Organization for Standardization (ISO)
researched different network models and the result is the
OSI-model which was released in 1984.

“All People Seem To Need Data


Processing”
The OSI-Model
The OSI-Model
The OSI-Model
The OSI-Model
The OSI-Model - Physical Layer
This layer describes stuff like voltage levels, timing,
physical data rates, physical connectors and so on.
Everything you can “touch” since it’s physical.
The OSI-Model – Data Link Layer
This layer makes sure data is formatted the correct way,
takes care of error detection and makes sure data is
delivered reliably. This might sound a bit ambiguous
now, for now try to remember this is where “Ethernet”
lives. MAC Addresses and Ethernet frames are on the
Data Link layer.
The OSI-Model – Data Link Layer
Ethernet frames
The OSI-Model – Network Layer
This layer takes care of connectivity and path selection
(routing). This is where IPv4 and IPv6 live. Every
network device needs a unique address on the network.
The OSI-Model – Network Layer
IP packets
The OSI-Model – Transport Layer
The transport layer takes care of transport, when you
downloaded this book from the Internet the file was sent
in segments and transported to your computer.
The OSI-Model – Transport Layer
TCP segments
The OSI-Model – Transport Layer
TCP lives here; it’s a protocol which send data in a
reliable way.
UDP lives here; it’s a protocol which sends data in an
unreliable way.
The OSI-Model – Transport Layer
UDP

No guarantee for delivery Unreliability


The OSI-Model – Transport Layer
TCP vs. UDP
The OSI-Model – Session Layer
The session layer takes care of establishing, managing
and termination of sessions between two hosts. When
you are browsing a website on the internet you are
probably not the only user of the webserver hosting that
website. This webserver needs to keep track of all the
different “sessions”.
The OSI-Model – Session Layer
The OSI-Model – Presentation
Layer
This one will make sure that information is readable for
the application layer by formatting and structuring the
data. Most computers use the ASCII table for characters.
If another computer would use another character like
EBCDIC than the presentation layer needs to “reformat”
the data so both computers agree on the same
characters.
The OSI-Model – Presentation
Layer
The OSI-Model – Application Layer
Here are your applications. E-mail, browsing the web
(HTTP), FTP and many more.
TCP/IP-Model
The Internet protocol suite is the conceptual model and
set of communications protocols used in the Internet
and similar computer networks.

It is commonly known as TCP/IP because the foundational


protocols in the suite are the Transmission Control
Protocol (TCP) and the Internet Protocol (IP).

During its development, versions of it were known as the


Department of Defense (DoD) model because the
development of the networking method was funded by the
United States Department of Defense through Defense
Advanced Research Projects Agency (DARPA).
TCP/IP-Model

The physical and data link layer are


combined into the network access
layer. The network layer is now the
internet layer and the session,
presentation and application layer
are combined into a single
application layer.
Different Models in Literature
OSI and TCP/IP-Model
OSI and TCP/IP-Model
OSI and TCP/IP-Model
Why to use a model?
Why to use a model?
A model captures ideas in a problem domain, while a
conceptual model represents 'concepts' (entities) and
relationships between them.

A conceptual model is a representation of a system, made of


the composition of concepts which are used to help people
know, understand, or simulate a subject the model
represents.

Some models are physical objects; for example, a toy


model which may be assembled, and may be made to work
like the object it represents.
Protocol
In telecommunication, a communication protocol
is a system of rules that allow two or more
entities of a communications system to transmit
information via any kind of variation of a
physical quantity.

The protocol defines the rules, syntax, and


synchronization of communication and possible
error recovery methods.

Protocols may be implemented by hardware,


software, or a combination of both.
Devices and Protocols
Data Format
Port Number
In computer networking, a port is a communication
endpoint.

At the software level, within an operating system, a


port is a logical construct that identifies a specific
process or a type of network service.

A port number is a 16-bit unsigned integer, thus


ranging from 0 to 65535.
IANA Port Number
Service names and port numbers are used to
distinguish between different services that run over
transport protocols such as TCP and UDP.
Service names are assigned on a first-come, first-
served process, as documented in [RFC6335].
Port numbers are assigned in various ways, based on
three ranges:
▪ System Ports (0-1023)
▪ User Ports (1024-49151)
▪ Dynamic and/or Private Ports (49152-65535)
Real time tool

Wireshark

Wireshark is a protocol sniffer which will show you all the


data that is being sent and received on your network card.

You can download Wireshark (it’s free) from http://wireshark.org.


The example in the picture above is a capture of a computer requesting a
webpage from a webserver.
You can see there are ten IP packets here, with the source IP
address and the destination IP address. It also shows you which
protocol this IP packet is carrying.
Frame 1 / Ethernet II: This is the Data Link layer.
Internet Protocol: This is the Network layer.
Transmission Control Protocol: This is the Transport layer.
Thank you

You might also like