Professional Documents
Culture Documents
Unit 2 - Osi Model and Network Protocols
Unit 2 - Osi Model and Network Protocols
Unit 2 - Osi Model and Network Protocols
Client computers
Servers (computers)
Network Devices
Application
(Layer 7)
Presentation
(Layer 6)
SESSION
(Layer 5)
TRANSPORT
(Layer 4)
NETWORK
(Layer 3)
DATA LINK
(Layer 2)
Physical
(Layer 1)
Manages signaling to
and form physical
network connections
Summary
into frames.
Each layer will remove their corresponding header
while the data flows up the OSI model until it is
converted back to data and presented to the user.
Frame Specifications
You have learned that frames are composed of several
frames, and the two will not interact with each other
on a network.
In fact, most LANs do not support more than one
frame type, because devices cannot support more
than one frame type per physical interface, or NIC.
(NICs can, however, support multiple protocols.)
Although you can conceivably transmit both token
ring and Ethernet frames on a network, Ethernet
interfaces cannot interpret token ring frames, and
vice versa.
Normally, LANs use either Ethernet or token ring,
and almost all contemporary LANs use Ethernet.
NOTE :
The terms frame, packet, datagram, and protocol data unit
2 Types of Address
Network Address
Physical Address
Network Address
Network addresses follow a hierarchical addressing
PHYSICAL ADDRESS
LOGICAL ADDRESS
31
Summary
Standards are documented agreements containing
Summary (continued)
Presentation layer protocols serve as translators
Summary (continued)
Data Link layer protocols organize data they receive
application.
Introduction to Protocols
Protocols vary according to purpose, speed,
40
Protocol (TCP/IP)
b) Internetwork Packet Exchange/ Sequenced
Packet Exchange (IPX/SPX)
c) NetBIOS and NetBEUI
d) AppleTalk
1.Physical
Wireless LAN
(802.11b, a, g)
Internet
(DSL, Cable Modem)
MAN / WAN
(poTS, ISDNT1, SONET,
ATM, Frame Relay
Backbone
(Ethernet, ATM, FDDI)
LAN
(Ethernet)
7.Application
6.Presentation
APPLICATION
LAYER
5.Session
4.Transport
3.Network
INTERNETWORK
LAYER
2.Data Link
HARDWARE
LAYER
Internetwork Layer
Internetwork layer connect the application
TCP/IP
Transmission Control Protocol/Internet Protocol
Consist of dozens of difference protocols, but
TCP/IP
Suite of specialized subprotocols
TCP, IP, UDP, ARP, and many others
routable
Can run on virtually any combination of NOSs or
network media
TCP/IP core protocols operate in Transport or
Network layers
46
TCP
Transmission Control Protocol
50
54
attempts to connect with a server, the server must first bind to a port to open
it up for connections: this is called a passive open. Once the passive open is
established, a client may initiate an active open. To establish a connection, the
three-way (or 3-step) handshake occurs:
SYN: The active open is performed by the client sending a SYN to the server.
The client sets the segment's sequence number to a random value A.
SYN-ACK: In response, the server replies with a SYN-ACK. The
acknowledgment number is set to one more than the received sequence
number (A + 1), and the sequence number that the server chooses for the
packet is another random number, B.
ACK: Finally, the client sends an ACK back to the server. The sequence
number is set to the received acknowledgement value i.e. A, and the
acknowledgement number is set to one more than the received sequence
number i.e. B.
At this point, both the client and server have received an acknowledgment of
the connection.
music or video.
60
IP
Internet Protocol
should be delivered
Datas source and destination addresses
67
IP (continued)
IP (continued)
(TTL) expired
Cannot correct errors it detects
71
multicasting
Transmission method allowing one node to send data to defined
group of nodes
Point-to-multipoint method
Teleconferencing or videoconferencing over Internet
74
IP address in reply
If device doesnt know own IP address, cannot use ARP
associated IP addresses
76
77
DHCP (continued)
80
http://pic.dhe.ibm.com/infocenter/zos
/v2r1/index.jsp?topic=%2Fcom.ibm.zo
s.v2r1.hala001%2Fitctcpipcon.htm
TCP Transmission Control Protocol is a transport protocol providing a reliable, full-duplex byte
stream. Most TCP/IP applications use the TCP transport protocol. UDP User Datagram Protocol is
a connectionless protocol providing datagram services. UDP is less reliable because there is no
guarantee that a UDP datagram ever reaches its intended destination, or that it reaches its
destination only once and in the same condition as it was passed to the sending UDP layer by a UDP
application. ICMP Internet Control Message Protocol is used to handle error and control
information at the IP layer. The ICMP is most often used by network control applications that are
part of the TCP/IP software product itself, but ICMP can be used by authorized user processes as
well. PING and TRACEROUTE are examples of network control applications that use the ICMP
protocol. IP Internet Protocol provides the packet delivery services for TCP, UDP, and ICMP. The
IP layer protocol is unreliable (called a best-effort protocol). There is no guarantee that IP packets
arrive, or that they arrive only once and are error-free. Such reliability is built into the TCP
protocol, but not into the UDP protocol. If you need reliable transport between two UDP
applications, you must ensure that reliability is built into the UDP applications. ARP/ND The IPv4
networking layer uses the Address Resolution Protocol (ARP) to map an IP address into a hardware
address. In the IPv6 networking layer, this mapping is performed by the Neighbor Discovery (ND
function). On local area networks (LANs), such an address would be called a media access control
(MAC) address. RARP Reverse Address Resolution Protocol is used to reverse the operation of the
ARP protocol. It maps a hardware address into an IPv4 address. Note that both ARP packets and
RARP packets are not forwarded in IP packets, but are themselves media level packets. ARP and
RARP are not used on all network types, as some networks do not need these protocols
222.32.1.1
____
179.21.9.0
____
90.43.2.1
____
220.11.6.6
____
43.55.45.0
____
126.32.1.0
____
111.45.3.2
____
information
ifconfig on Unix and Linux
97
octet
Separated by period
binary equivalent
98
Subnet Mask
Every device on TCP/IP-based network identified by subnet
mask
99
1
1
Assigning IP Addresses
Nodes on a network must have unique IP
addresses
Static IP address: manually assigned
Can easily result in duplication of addresses
116
65535
Well Known Ports: in range 0 to 1023
administrative privileges
65535
http://en.wikipedia.org/wiki/Internet_port
TCP Segment
123
IP datagram
124
Addressing in IPv6
IPv6 slated to replace current IP protocol, IPv4
More efficient header, better security, better prioritization
Billions of additional IP addresses
Differences:
Address size
Representation
125
domain name
Domain names must be registered with an Internet
naming authority that works on behalf of ICANN
127
Host Files
ASCII text file called HOSTS.TXT
Associate host names with IP addresses
Growth of Internet made this arrangement impossible to maintain
http://compnetworking.about.com/od/dns_domainnamesystem/f/dns_servers.htm
http://blog.datakl.com/tag/dns-resolver/