Osi Model Notes

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

What are Inter-Networking Models?

*These models define the communication way between different devices


available at common place or different places. In other words, these
models define the end to end communication.

What are the types of Models?


*Model has two categories.
-Proprietary -Open Standard
OSI & TCP/IP are types of Open standard.

What is the need of Open Standard Models?


*When networks first came into being, computers could typically
communicate only with computers from the same manufacturer. For
example, companies ran either a complete DECnet solution or an IBM
solution, never both together. Hence, it was a big challenge.
The OSI model was meant to help vendors create interoperable network
devices and software in the form of protocols so that different vendor
networks could work in peaceable accord with each other.

OSI model is the primary architectural model for networks. It describes


howdata and network information are communicated from an
application on one computer through the network media to an
application on another computer.

OSI Model is divided into layers. It has seven layers:


7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data-Link
1.Physical.

What are the Advantages?


 It is divided to multiple layers, so it is easy to understand the
working of OSI model by examining individual layers.
 It removed the mono-political nature of vendor’s.
 It provides guidelines for researchers, vendors, implementers and
engineers.
 It is easy to troubleshoot by going through the layered approach.
 It allows various types of network hardware and software to
communicate.

OSI is a logical model, not a physical one. The OSI has seven different
layers, divided into two groups. The top three layers definehow the
applications within the end stations will communicate with each other as
well aswith users. The bottom four layers define how data is transmitted
end to end.

The upper layers: Upper layers are also called Software Layers.

 Application (Layer 7).

 Presentation (Layer 6).

 Session (Layer 5).

The Bottom layers: These layers are also calledNetwork Layers.


 Transport (Layer 4).
 Network (Layer 3).
 Data-Link (Layer 2).
 Physical. (Layer 1).
Application Layer: It provides user interaction. Protocols of this
layer are given:
 Http
 Https
 Ntp
 Dhcp
 Dns
 Ftp
 Tftp
 Telnet
 Ssh.

Presentation Layer: It also provides encryption & compression on


source side and de-encrypt& decompress on destination side.

Session Layer: This layer maintains the session between source &
destination. It keeps the different application data separate at single
workstation.

!!!!!!!!!

Transport Layer: It is responsible for end to end delivery. It is


responsible for connection establishment. It provides error detection &
correction. It also provides windowing & flow control. It has two
protocols:
TCP
UDP

Transmission Control Protocol: It is reliable protocol. It is connection


oriented protocol. It establishes connection before the startup of any data
communication.
 Connection Establishment:It creates connection between source
&destination by a process called Three Way Handshake.
 Flow Control: Flow control prevents a sending host on one side of
the connection from overflowing the buffers in the receiving host.
 Windowing: The quantity of data segments, measured in bytes,
that the transmitting machine is allowed to send without receiving
an acknowledgment is called a window.

TCP Header:

 Sequence number: A number used by TCP that puts the data back in the
correct order or retransmits missing or damaged data during a process called
sequencing.
 Source port:This is the port number of the application on the host sending
the data.
 Destination port:This is the port number of the application requested on
the destination host.
 Acknowledgment number: The value is the TCP octet that is expected
next.
 Code bits/flags: Controls functions used to set up and terminate a session.

 Window: The window size the sender is willing to accept, in octets.

 Checksum:The cyclic redundancy check (CRC), used because TCP


doesn’t trust the lower layers and checks everything. The CRC checks the
header and data fields.
 Data:The actual data which has been received from the upper layers.

User Datagram Protocol: It is connection less protocol. It doesn’t


create any session before data transmission. UDP does not sequence the
segments and does not care about the order in which the segments arrive
at the destination. UDP just sends the segments off and forgets about
them.

UDP Header:

 Source port: Port number of the application on the host sending the data.
 Destination port: Port number of the application requested on the
destination host.
 Length: Length of UDP header and UDP data.
 Checksum:Checksum of both the UDP header and UDP data fields.
 Data: Upper-layer data.

The PDU of this layer is called Datagram.

Network Layer: It is responsible for logical addressing, further these


logical addresses are used by devices like Routers for path
determination.
This layer has two types of protocols:
Routed Protocols: Theseare used to transport user data through the
internetwork.Protocols used to support data traffic are called routed
protocols. IPv4 & IPv6 are popular routed protocols.
Routing Protocols:Protocols that send route update
packetsarecalledroutingprotocols. The most popular at Ccna level are
RIP, OSPF, EIGRP.

 Version: IP version number.


 Identification: Unique IP-packet value used to differentiate fragmented
packets from different datagram’s.
 Flags: Specifies whether fragmentation should occur.
 Fragment offset: Provides fragmentation and reassembly if the packet is
too large to put in a frame. It also allows different maximum transmission
units (MTUs) on the Internet.
 Time To Live:The time to live (TTL) is set into a packet when it is
originally generated. If it doesn’t get to where it’s supposed to go before the
TTL expires, boom—it’s gone. This stops IP packets from continuously
circling the network looking for a home.
 Protocol: Port of upper-layer protocol; for example, TCP is port 6 or UDP
is port 17. Alsosupports Network layer protocols, like ICMP.
 Source IP address: 32-bit IP address of sending station.
 Destination IP address: 32bit IP Address of the station this packet is
destined for.
 Data:The data received from the upper layers.
ICMP: Internet Control Message Protocol is another protocol of
Network Layer.

The PDU of this layer is called PACKET.

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Data-Link Layer:It provides Physical addressing called MAC


address (Media Access Control).
It is also responsible for breaking frame into Bytes & Bytes into bits at
source side before transmitting and combining bits into bytes & bytes
into frame at destination side.

Preamble:
Source Address: The 48 bit hexa-decimal value address of the source
device.
Destination Address: The 48 bit hexa-decimal value address of the
destination device.
Type: This field is used to identify the Network layer protocol.
Data: This is a packet sent down to the Data Link layer from the
Network layer. The sizecan vary from 46 to 1,500 bytes.
Frame Check Sequence (FCS):FCS is a field at the end of the frame
that’s used to store thecyclic redundancy check (CRC) answer. The CRC
is a mathematical algorithm that’s runwhen each frame is built based on
the data in the frame. When a receiving host receives theframe and runs
the CRC, the answer should be the same. If not, the frame is
discarded,assuming errors have occurred.

The PDU of this layer is called FRAME.

ARP: It is another protocol of this layer. Address Resolution Protocol.

Physical Layer: It defines electrical signals, voltages, data transfer


rates, distances, Wires & connector types.

You might also like