Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 28

INF 403

OSI Model/TCP Model


Learning Outcome:
The students should be able to:
 Describe OSI Model and TCP/IP Model
 Define fundamental concepts of TCP/IP architecture
 Know the protocols, with emphasis on the network layer, transport layer,
and application layer of the suite.
 Describe the applications of TCP/IP to the Internet.
OSI Model
 The OSI (Open System Interconnection) Reference Model is the
comprehensive set of standards and rules for hardware manufacturers and
software developers.
 By following these standards, they can build the networking components and
software applications which work in dissimilar environments.
 In 1984, the ISO (International Organization for Standardization) published this
Model.
 The OSI model not only provides a framework for creating and implementing
networking standards, devices, and internetworking schemes but also explains
the networking from a modular perspective, making it easier to
understand and troubleshoot.
Seven layers of OSI Model
The OSI model has seven different layers, divided into two groups.

Group Layer Layer Name Description


Number
Top Layers 7 Application Provide user interface to send and receive the
data
6 Presentation Encrypt, format and compress the data for
transmission
5 Session Initiate and terminate session with remote
system
Bottom Layers 4 Transport Break data stream in smaller segments and
provide reliable and unreliable data delivery

3 Network Provide logical addressing


2 Data Link Prepare data for transmission
1 Physical Move data between devices
The Application Layer
 It provides the protocols and services that are required by the network-
aware applications to connect with the network.
 FTP, TFTP, POP3, SMTP and HTTP, HTTPS are the few examples of
standards and protocols used in this layer.

The Presentation Layer


 Convert, compress and encrypt are the main functions which
presentation layer performs in sending computer while in receiving
computer there are reconvert, decompress and decrypt.
 ASCII, BMP, GIF, JPEG, WAV, AVI, and MPEG are the few examples
of standards and protocols which work in this layer.
The Session Layer
 The session layer is responsible establishing, managing, and terminating
communications between two computers.
 RPCs and NFS (Network File System) are the examples of the session
layer (Remote Procedure Call (RPC) is a protocol that one program can
use to request a service from a program located in another computer on a
network without having to understand the network's details)

The Transport Layer


 Main functionalities of transport layer are segmentation, data
transportation and connection multiplexing.
 For data transportation, it uses TCP and UDP protocols. TCP is a
connection-oriented protocol. It provides reliable data delivery.
The Network Layer
 Defining logical addresses and finding the best path to reach the destination are the main
functions of this layer.
 Router works in this layer. Routing also takes place in this layer. IP, IPX and AppleTalk
are the examples of this layer.
The Data Link Layer
 Defining physical addresses, finding host in local network, specifying standards and
methods to access the media are the primary functions of this layer. Switching takes
place in this layer.
 Switch and Bridge work in this layer. HDLC, PPP and Frame Relay are the examples of
this layer.
The Physical Layer
 The Physical Layer mainly defines standards for media and devices that are used to
move the data across the network.
 10BaseT, 10Base100, CSU/DSU, DCE and DTE are the few examples of the standards
used in this layer
Layer Name Protocols
SMTP, HTTP, FTP,
Layer 7 Application
POP3, SNMP
MPEG, ASCH, SSL,
Layer 6 Presentation
TLS
Layer 5 Session NetBIOS, SAP
Layer 4 Transport TCP, UDP
IPV5, IPV6, ICMP,
Layer 3 Network
IPSEC, ARP, MPLS.
RAPA, PPP, Frame
Layer 2 Data Link Relay, ATM, Fiber
Cable, etc.
RS232, 100BaseTX,
Layer 1 Physical
ISDN, 11.

Protocols supported at various levels


TCP/IP
Introduction
History of TCP/IP Suite
 The most popular network protocol in the
world, TCP/IP protocol suite, was designed in
1970s by 2 DARPA (Defense Advanced
Research Projects Agency) scientists—Vint
Cerf and Bob Kahn, persons most often
called the fathers of the Internet.
 This protocol allow two or more computers to
communicate.
 It was developed by The Defense Data
Network, part of the Department of Defense,
for widespread industry use across its
Advanced Research Projects Agency
Network (ARPANet). ARPANET is the
predecessor to the INTERNET.
 TCP/IP, or Transmission Control Protocol/Internet Protocol, is a suite of
communication protocols used to interconnect network devices on the
internet.
 TCP/IP can also be used as a communications protocol in a private
computer network (an intranet or extranet).

 TCP/IP specifies how data is exchanged over the internet by providing


end-to-end communications that identify how it should be broken
into packets, addressed, transmitted, routed and received at the
destination.
 TCP/IP requires little central management and is designed to make
networks reliable with the ability to recover automatically from the failure
of any device on the network.
  TCP defines how applications can create channels of communication
across a network. It also manages how a message is assembled into
smaller packets before they are then transmitted over the internet and
reassembled in the right order at the destination address.
 IP defines how to address and route each packet to make sure it reaches the
right destination. Each gateway computer on the network checks this IP
address to determine where to forward the message.
 A subnet mask is what tells a computer, or other network device, what portion
of the IP address is used to represent the network and what part is used to
represent hosts, or other computers, on the network.
 Network address translation (NAT) is the virtualization of IP addresses. NAT
helps improve security and decrease the number of IP addresses an
organization needs.

Common TCP/IP protocols include the following:


 HTTP (Hypertext Transfer Protocol), which handles the communication
between a web server and a web browser;
 HTTPS (HTTP Secure), which handles secure communication between a web
server and a web browser; and
 FTP (File Transfer Protocol), which handles transmission of files between
computers.
The TCP/IP Model
 Prerequisite – Layers of OSI Model
 TCP/IP model, it was designed and developed by Department of Defense (DoD) in
1960s and is based on standard protocols.
Network Access Layer
 This layer corresponds to the combination of Data Link Layer and Physical Layer of
the OSI model. It looks out for hardware addressing and the protocols present in this
layer allows for the physical transmission of data.
Internet Layer
 This layer parallels the functions of OSI’s Network layer. It defines the protocols which
are responsible for logical transmission of data over the entire network. The main
protocols residing at this layer are :
 IP – stands for Internet Protocol and it is responsible for delivering packets from the
source host to the destination host by looking at the IP addresses in the packet headers.
IP has 2 versions: IPv4 and IPv6. IPv4 is the one that most of the websites are using
currently. But IPv6 is growing as the number of IPv4 addresses are limited in number
when compared to the number of users.
 ICMP – stands for Internet Control Message Protocol. It is encapsulated within IP
datagrams and is responsible for providing hosts with information about network
problems.
 ARP – stands for Address Resolution Protocol. Its job is to find the hardware address of
a host from a known IP address. It is an error reporting protocol and is used by
routers, hosts and network devices to generate error messages when there are
problems delivering IP packets. ARP has several types: Reverse ARP, Proxy ARP,
Gratuitous ARP and Inverse ARP.
Transport Layer / Host-to-Host
 This layer is analogous to the transport layer of the OSI model. It is responsible for end-
to-end communication and error-free delivery of data. It shields the upper-layer
applications from the complexities of data. The two main protocols present in this layer
are :
 Transmission Control Protocol (TCP) – It is known to provide reliable and error-free
communication between end systems. It performs sequencing and segmentation of data.
It also has acknowledgment feature and controls the flow of the data through flow control
mechanism. It is a very effective protocol but has a lot of overhead due to such features.
Increased overhead leads to increased cost.
 User Datagram Protocol (UDP) – On the other hand does not provide any such
features. It is the go-to protocol if your application does not require reliable transport
as it is very cost-effective. Unlike TCP, which is connection-oriented protocol, UDP is
connectionless.
Application Layer –
 This layer performs the functions of top three layers of the OSI model: Application, Presentation
and Session Layer. It is responsible for node-to-node communication and controls user-
interface specifications. Some of the protocols present in this layer are: HTTP, HTTPS, FTP,
TFTP, Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS, X Window, LPD.
 HTTP and HTTPS – HTTP stands for Hypertext transfer protocol. It is used by the World Wide
Web to manage communications between web browsers and servers. HTTPS stands for HTTP-
Secure. It is a combination of HTTP with SSL(Secure Socket Layer). It is efficient in cases
where the browser need to fill out forms, sign in, authenticate and carry out bank transactions.
 SSH – SSH stands for Secure Shell. It is a terminal emulations software similar to Telnet.
The reason SSH is more preferred is because of its ability to maintain the encrypted
connection. It sets up a secure session over a TCP/IP connection.
 NTP – NTP stands for Network Time Protocol. It is used to synchronize the clocks on our
computer to one standard time source. It is very useful in situations like bank
transactions. Assume the following situation without the presence of NTP. Suppose you
carry out a transaction, where your computer reads the time at 2:30 PM while the server
records it at 2:28 PM. The server can crash very badly if it’s out of sync.
 OSI vs TCP/IP
OSI Model TCP/IP Model
It stands for Open System Interconnection. It stands for Transmission Control Protocol.

OSI model has been developed by ISO It was developed by ARPANET (Advanced
(International Standard Organization). Research Project Agency Network).

It is an independent standard and generic It consists of standard protocols that lead to the
protocol used as a communication gateway development of an internet. It is a communication
between the network and the end user. protocol that provides the connection among the
hosts.
In the OSI model, the transport layer provides a The transport layer does not provide the surety
guarantee for the delivery of the packets. for the delivery of packets. But still, we can say
that it is a reliable model.

This model is based on a vertical approach. This model is based on a horizontal approach.

In this model, the session and presentation layers In this model, the session and presentation layer
are separated, i.e., both the layers are different. are not different layers. Both layers are included
in the application layer.
It is also known as a reference model through It is an implemented model of an OSI model.
which various networks are built. For example,
the TCP/IP model is built from the OSI model. It
is also referred to as a guidance tool.

In this model, the network layer provides both The network layer provides only connectionless
connection-oriented and connectionless service. service.
Protocols in the OSI model are hidden and can In this model, the protocol cannot be easily
be easily replaced when the technology replaced.
changes.
It consists of 7 layers. It consists of 4 layers.
OSI model defines the services, protocols, and In the TCP/IP model, services, protocols, and
interfaces as well as provides a proper interfaces are not properly separated. It is
distinction between them. It is protocol protocol dependent.
independent.
The usage of this model is very low. This model is highly used.

It provides standardization to the devices like It does not provide the standardization to the
router, motherboard, switches, and other devices. It provides a connection between
hardware devices. various computers.
Similarities between the OSI and TCP/IP model
Share common architecture
 Both the models are the logical models and having similar architectures as both the models are
constructed with the layers.
Define standards
 Both the layers have defined standards, and they also provide the framework used for implementing the
standards and devices.
Simplified troubleshooting process
 Both models have simplified the troubleshooting process by breaking the complex function into simpler
components.
Pre-defined standards
 The standards and protocols which are already pre-defined; these models do not redefine them; they
just reference or use them. For example, the Ethernet standards were already defined by the IEEE
before the development of these models; instead of recreating them, models have used these pre-
defined standards.
Both have similar functionality of 'transport' and 'network' layers
 The function which is performed between the 'presentation' and the 'network' layer is similar to the
function performed at the transport layer.
The advantages of using the TCP/IP model include the following:
 Helps establish a connection between different types of computers;
 Works independently of the OS;
 Supports many routing protocols;
 Uses client-server architecture that is highly scalable;
 Can be operated independently;
 Supports several routing protocols; and
 Is lightweight and doesn't place unnecessary strain on a network or computer.
The disadvantages of TCP/IP include the following
 Complicated to set up and manage.
 Transport layer doesn't guarantee delivery of packets.
 Isn't easy to replace protocols in TCP/IP.
 Doesn't clearly separate the concepts of services, interfaces and
protocols so it isn't suitable for describing new technologies in new
networks.
 Is especially vulnerable to a SYN (synchronization) attack, which is a
type of denial-of-service (DoS) attack in which a bad actor uses
TCP/IP.

You might also like