SlideShare a Scribd company logo
Chapter 2 Communicating Over The Network
Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks must go out to Rick Graziani of Cabrillo College. His material and additional information was used as a reference in their creation. If anyone finds any errors or omissions, please let me know at:  [email_address]
Communicating Over the Network The Platform for Communications
Elements of Communication People communicate in many different ways. Vocal, a look, a hand signal, body language… All of the methods have  three things in common . There is   source  for the message or a  sender . There is a  destination  for the message or a  receiver . There is a  channel   that consists of the media that provides the pathway for the message.
Elements of Communication Devices communicate in exactly the same way.
Communicating the Messages In theory, a network communication could be sent as one continuous stream of 1’s and 0’s. No other device would be able to send or receive messages on the same network.  Significant delays Inefficient use of the channel A lost message entirely retransmitted.
Communicating the Messages A better approach is called Segmentation . The data stream is divided into smaller, more manageable segments. Segmentation has two benefits: Multiplexing: Different transmissions can be interleaved on the network. Reliability
Communicating the Messages Segmentation and Reliability: Increases the reliability of network communications.  Separate pieces  of each message can travel across  different paths  to destination.  Path fails  or congested,  alternate path  can be used.  Part of the message fails to make it to the destination,  only the missing parts need to be retransmitted . In a  packet switched network like the Internet.
Communicating the Messages Segmentation Disadvantage:   Added level of complexity. The label is a unique sequence number. Handled by protocols that format and address the message.
Components of the Network
End Devices Work Stations, Servers, Laptops, Printers, VoIP Phones, Security Cameras, PDAs...... Any device that allows us to interface with the network. End devices  are referred to as  hosts  and are either the source or destination of a message.
End Devices End Devices: A host can be a client, a server or both . The software installed on the device determines its role. Servers: Software that enables them to  provide information and services (E-mail, Web Pages)  to other hosts on the network. Client: Software installed that enables them to  request and display the information obtained from the server.   Servers Clients
Intermediary Devices Routers, Switches, Hubs, Wireless Access Points, Communication Servers, Security Devices. Any device that provides  connectivity to the network ,  connectivity to other networks  or  links between network segments .
Intermediary Devices Manage data as it flows through the network. Some use the  destination host address  and  network interconnection   information  to find the best path through the network.  Routers Access Points Switches Hubs Multiplexers Firewalls
Intermediary Devices Regenerate  and  retransmit  data signals. Maintain information  about what pathways exist through the network and internetwork. Notify other devices  of errors and communication failures. Direct data  along alternate pathways when there is a link failure. Classify and direct messages  according to QoS priorities. Permit or deny  the flow of data, based on security settings.
Media The medium  provides the channel  over which the messages travel from source to destination. Metallic wires within cables Glass or plastic fibers Wireless Transmission
Media The  signal encoding  that must occur is different for each type of media. Electrical impulses with specific patterns Pulses of light in the infrared or visible ranges Patterns of electromagnetic waves
Media Different network media have different features and benefits. Not all network media are appropriate for the same purpose. You must make the appropriate choice to provide the proper channel. Distance it can carry the signal Environment Bandwidth Cost of the media Installation costs Cost of connectors and devices
Communicating Over the Network LANs, WANs and Internetworks
Local Area Networks An individual network usually spans a single geographical area, providing services and applications to people within a common organizational structure, such as a single business, campus or region.
Wide Area Networks Networks that connect LANs in geographically separated locations.  Usually implemented with leased connections through a  telecommunications service provider (TSP)  network. A TSP traditionally transports voice and data on different networks.  Now, providers are offering  converged  network services. HDLC, PPP, T1, DS3, OC3, ISDN, Frame Relay
The Internet : A Network of Networks Internet Service Providers (ISPs)  connect their customers to the Internet through their network infrastructure. The Internet, then, is a collection of ISPs co-operating with each other to form one large  converged  internetwork.
Network Representations Specialized terminology is used to describe how these devices and media connect to one another.
Network Representations Network Interface Card (NIC): Provides the  physical connection to the network at the PC or other host device.  Physical Port: A  connector or outlet on a networking device  where the media is connected to a host or other networking device.
Network Representations Interface: Specialized ports on an internetworking device that  connect to individual networks .   Because  routers  are used to interconnect networks, the ports on a router are referred to as  network interfaces .
Communicating Over the Network Protocols
Rules That Govern Communications Protocols: Are the rules that govern communications. The format or structure of the message. How and when error and system messages are passed between devices. The setup and termination of data transfer sessions. The method by which networking devices share information about pathways with other networks.
Protocol Suites Protocol Suite: A  group of inter-related protocols  that are necessary to perform a communication function. Cannot function without a set of standards that network vendors can follow. Institute of Electrical and Electronics Engineers (IEEE):  Develops standards in  telecommunications, information technology and power generation . Examples:  802.3 (Ethernet), 802.11 (WLAN) Internet Engineering Task Force (IETF) Internet standards, RFCs  (Request for Comments) Example: TCP, IP, HTTP, FTP
Interaction of Protocols Each protocol at each layer of the protocol suite work together to make sure messages are received and understood by both devices.
Technology Independent Protocols Protocols are not dependent upon any specific technology. They describe  what  must be done to communicate but  not how  its is to be carried out.
Communicating Over the Network Using Layered Models
Layered Models Layered models separate the functions of specific protocols.
Benefits of a Layered Model Benefits of a Layered Model: Have  defined information  that they act upon and a  defined interface  to the layers above and below.  Fosters competition  because products from different vendors can work together.  Prevents technology or capability  changes in one layer from affecting other layers  above and below.  Provides a common language  to describe networking functions and capabilities.
Protocol and Reference Models Protocol Model: Closely matches the structure of a  particular protocol suite . The set of related protocols in a suite typically represents all the functionality required to interface the human network with the data network. The TCP/IP model is a  protocol model  because it describes the functions that occur at each layer of protocols  only   within the TCP/IP suite .
Protocol and Reference Models Reference Model: Provides a  common reference for maintaining consistency within all types of network protocols  and services. Not   intended to be an implementation specification. Primary purpose is to aid in clearer understanding of the functions and process involved.
TCP/IP Model Open Standard No one company controls it. Governed by IETF   Working Groups Standards proposed using  Request for Comments (RFCs) .
Request For Comments RFC
The Communication Process Segment and Encapsulate Generate on to the media Create Data Transport through the segment Pass data to application Receive from the media Decapsulate and Reassemble
Protocol Data Units and Encapsulation Header Header Data Header Trailer 0010100111011001010000011111010100010101 Segmentation and Encapsulation Email Message Data Data Data Data Data
Protocol Data Units and Encapsulation Header Header Header Trailer Decapsulation and Reassembly Data 0010100111011001010000011111010100010101 Email Message Data Data Data Data Data Data
Protocol Data Units and Encapsulation Header Header Header Trailer Email Message Data Data Data Protocol Data Units Data Segment Packet Frame
Protocol Data Units and Encapsulation The Diagram on Page 51 in the text is incorrect. This is the correct diagram .
Communicating Over the Network The OSI Model
OSI Model The   International Organization for Standardization  ( ISO )  released the  Open Systems Interconnection (OSI)  reference model in 1984. www.iso.org  for more information
OSI Model Breaks network communication  into smaller,  more manageable parts .  Makes learning it easier to understand. Prevents changes in one layer from affecting other layers. Standardizes network components to allow  multiple vendor  development and support.  Allows  different types  of network hardware and software  to communicate with each other. It is a  descriptive scheme .
OSI Model - Example -  FYI Descriptive Scheme:   Can be used to describe the functionality and interaction of different protocol suites. IBM’s SNA Physical Data Link Network Transport Session Presentation Application WAN SDLC LAN DLSW SNA NETBIOS SMB IBMNM LLC RPL
OSI Model – Example -  FYI Descriptive Scheme:   Can be used to describe the functionality and interaction of different protocol suites. ISO Physical Data Link Network Transport Session Presentation Application LAN / Wan Physical Media LLC Layer Type 1 and 2 Protocols CLNP ISO-TP  (TP0, TP1, TP2, TP3, TP4) NETBIOS ISO-SP ISO-PP ROSE ACSE RTSE VTP FTAM X.400 X.500 ES-IS IS-IS IDRP
OSI Model – Example -  FYI Descriptive Scheme:   Can be used to describe the functionality and interaction of different protocol suites. TCP/IP Physical Data Link Network Transport Session Presentation Application LAN / Wan Physical Media ARP / RARP LLC IP ICMP RIP IGMP TCP UDP NETBIOS DNS FTP, Telnet, SMTP, POP3, IMAP4, HTTP, X-Windows SNMP, TFTP, BOOTP, DHCP
OSI Model Layers CISCO MICROSOFT 7 Application A ll A way 6 Presentation P eople P izza 5 Session S eem S ausage 4 Transport T o T hrow 3 Network N eed N ot 2 Data Link D ata D o 1 Physical P rocessing P lease Usually referenced by layer number These two layers are not commonly referred to in most instances.
OSI Model Primary concern:  Communications between applications Primary concern:  Moving raw data cross the network Layers CISCO MICROSOFT 7 Application A ll A way 6 Presentation P eople P izza 5 Session S eem S ausage 4 Transport T o T hrow 3 Network N eed N ot 2 Data Link D ata D o 1 Physical P rocessing P lease
Communicating Over the Network Network Addressing
OSI Model OSI Model Layer Addressing Application Encoded Application Data (Usually referred to as the  Upper Layers ) Presentation Session Transport Source and Destination:  Process Address Network Source and Destination:  Logical Network Address Data Link Source and Destination:  Device Physical Address Physical Timing and Synchronization Bits
Getting Data to the End Device Header Header Header Trailer Email Message Data Data Data Encoded Data Process Logical Physical Encapsulation Process and Addressing 1. 2. 3. 4. 5. 6. 7. Addressing always includes both the Source and Destination Addresses.
Getting Data to the End Device Delivery on a  single local network . Unique on the network and represents the device. Codes placed on the  NIC  by the manufacturer. Referred to as the  physical address or the  MAC address . 1. 2. 3. 4. 5. 6. 7. Layer 2 Addressing Header Trailer Data Source and Destination Physical or MAC Address
Getting Data to the End Device Layer 2 Header Destination MAC Address Source MAC Address Data
Getting Data Through The Network Move data from one local network to another local network. Addresses must identify both the network and the host on that network. Used by routers to determine the best path to the destination host. 1. 2. 3. 4. 5. 6. 7. Layer 3 Addressing Header Data Source and Destination Logical Network Address (IP, IPX, etc.)
Getting Data Through the Network Layer 2 Header Layer 3 Header Destination MAC Address Source MAC Address Destination Logical Address Source Logical Address Data
Getting Data to the Right Application Identifies the  specific process  or service running on the destination host  that will act on the data . Multiple, simultaneous applications . 1. 2. 3. 4. 5. 6. 7. Layer 4 Addressing Header Data Process Under TCP/IP, a  port number  to identify the application. Port 80:  HTTP (Web Browser) Port 25:  SMTP (Email) Port 194:  IRC (Internet Relay Chat)
Getting Data to the Right Application Layer 2 Header Layer 3 Header Layer 4 Header Destination MAC Address Source MAC Address Destination Logical Address Source Logical Address Destination Process Address Source Process Address Data
Putting It All Together Logical MAC Port MAC Destination MAC Address Source MAC Address Destination Logical Address Source Logical Address Destination Process Address Source Process Address Data
Comparing the OSI and TCP/IP Models OSI Model  Layer Function Protocol Data Unit Device TCP/IP Model 7 Application User Functionality Character Application 6 Presentation Character Representation 5 Session Manage Data Exchange 4 Transport Services to segment, transfer and reassemble the data Segment Transport 3 Network Network addressing and best path determination  Packet Router Internet 2 Data Link Methods for reliable frame exchange over a common media Frame Switch Network Access 1 Physical Describe physical characteristics to transmit bits over a common media Bit Hub
Brain a little fuzzy? You need to learn to crawl before you can walk and walk before you can run. We are starting with the theory and concepts and will move on to the actual design and implementation of networks.

More Related Content

PPT
934 Ch1 Networks
PPT
Lecture 04
PPT
Chapter 3
PPT
Chapter 4ver2
PPT
Chapter1
PPT
PDF
Dc assignment
PPT
Chapter7
934 Ch1 Networks
Lecture 04
Chapter 3
Chapter 4ver2
Chapter1
Dc assignment
Chapter7

What's hot (17)

PPT
Dcn introduction
PPT
Itmg360 chapter one_v05
PDF
Data communication assingment.docx (1)
PPT
PDF
1 computer networks basic
DOCX
Networking online assignment
PDF
Computer network unit 1 notes
PPTX
Computer_Network
PPT
IRM GROUP 2 CHAPTER 2
PPTX
Cn 04,32,36-Cn all chapters1- computer networks- gtu
PDF
fmxhnkmcjbg,lBasics of network
PPTX
Presentation7
DOCX
Basic networking tutorial
PPT
Lecture 02
PDF
Networking tutorial
DOCX
Computer communication
PDF
I Introduction To Data Communications
Dcn introduction
Itmg360 chapter one_v05
Data communication assingment.docx (1)
1 computer networks basic
Networking online assignment
Computer network unit 1 notes
Computer_Network
IRM GROUP 2 CHAPTER 2
Cn 04,32,36-Cn all chapters1- computer networks- gtu
fmxhnkmcjbg,lBasics of network
Presentation7
Basic networking tutorial
Lecture 02
Networking tutorial
Computer communication
I Introduction To Data Communications
Ad

Viewers also liked (7)

PDF
20 Ideas for your Website Homepage Content
PPTX
50 Essential Content Marketing Hacks (Content Marketing World)
PDF
Prototyping is an attitude
PDF
10 Insightful Quotes On Designing A Better Customer Experience
PPTX
How to Build a Dynamic Social Media Plan
PDF
Learn BEM: CSS Naming Convention
PDF
SEO: Getting Personal
20 Ideas for your Website Homepage Content
50 Essential Content Marketing Hacks (Content Marketing World)
Prototyping is an attitude
10 Insightful Quotes On Designing A Better Customer Experience
How to Build a Dynamic Social Media Plan
Learn BEM: CSS Naming Convention
SEO: Getting Personal
Ad

Similar to Chapter 2 (20)

PPT
Ccna exploration network fundamentals
PPT
PPT
Exploration network chapter2
PPT
chapter_2
PPT
Chapter2
PDF
Protocols guide data flow and enable system communication.
PPT
Class_notes_InternetTechnology
PPT
Network technology introduction_lecture_2
PPTX
Computer Network Module 1 (Complete).pptx
PPTX
Module_1 Final.pptx _Behrouz A. Forouzan, Data Communications and Networking,...
PDF
Module 2 - Protocols and Models.pdf (cisco)
PPT
Ccna day1
PPT
Ccna day1
PPT
C C N A Day1
PPT
PPT
Network fundamental
PPTX
Data communications module 1 for ece students
PDF
Introduction to Networks_v0.2
PPTX
Data computer networks from rajeev institute of technology
PDF
Exploration_Network_Chapter_ 2.pbvcxd vfrg njhgydf
Ccna exploration network fundamentals
Exploration network chapter2
chapter_2
Chapter2
Protocols guide data flow and enable system communication.
Class_notes_InternetTechnology
Network technology introduction_lecture_2
Computer Network Module 1 (Complete).pptx
Module_1 Final.pptx _Behrouz A. Forouzan, Data Communications and Networking,...
Module 2 - Protocols and Models.pdf (cisco)
Ccna day1
Ccna day1
C C N A Day1
Network fundamental
Data communications module 1 for ece students
Introduction to Networks_v0.2
Data computer networks from rajeev institute of technology
Exploration_Network_Chapter_ 2.pbvcxd vfrg njhgydf

Chapter 2

  • 1. Chapter 2 Communicating Over The Network
  • 2. Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks must go out to Rick Graziani of Cabrillo College. His material and additional information was used as a reference in their creation. If anyone finds any errors or omissions, please let me know at: [email_address]
  • 3. Communicating Over the Network The Platform for Communications
  • 4. Elements of Communication People communicate in many different ways. Vocal, a look, a hand signal, body language… All of the methods have three things in common . There is source for the message or a sender . There is a destination for the message or a receiver . There is a channel that consists of the media that provides the pathway for the message.
  • 5. Elements of Communication Devices communicate in exactly the same way.
  • 6. Communicating the Messages In theory, a network communication could be sent as one continuous stream of 1’s and 0’s. No other device would be able to send or receive messages on the same network. Significant delays Inefficient use of the channel A lost message entirely retransmitted.
  • 7. Communicating the Messages A better approach is called Segmentation . The data stream is divided into smaller, more manageable segments. Segmentation has two benefits: Multiplexing: Different transmissions can be interleaved on the network. Reliability
  • 8. Communicating the Messages Segmentation and Reliability: Increases the reliability of network communications. Separate pieces of each message can travel across different paths to destination. Path fails or congested, alternate path can be used. Part of the message fails to make it to the destination, only the missing parts need to be retransmitted . In a packet switched network like the Internet.
  • 9. Communicating the Messages Segmentation Disadvantage: Added level of complexity. The label is a unique sequence number. Handled by protocols that format and address the message.
  • 10. Components of the Network
  • 11. End Devices Work Stations, Servers, Laptops, Printers, VoIP Phones, Security Cameras, PDAs...... Any device that allows us to interface with the network. End devices are referred to as hosts and are either the source or destination of a message.
  • 12. End Devices End Devices: A host can be a client, a server or both . The software installed on the device determines its role. Servers: Software that enables them to provide information and services (E-mail, Web Pages) to other hosts on the network. Client: Software installed that enables them to request and display the information obtained from the server. Servers Clients
  • 13. Intermediary Devices Routers, Switches, Hubs, Wireless Access Points, Communication Servers, Security Devices. Any device that provides connectivity to the network , connectivity to other networks or links between network segments .
  • 14. Intermediary Devices Manage data as it flows through the network. Some use the destination host address and network interconnection information to find the best path through the network. Routers Access Points Switches Hubs Multiplexers Firewalls
  • 15. Intermediary Devices Regenerate and retransmit data signals. Maintain information about what pathways exist through the network and internetwork. Notify other devices of errors and communication failures. Direct data along alternate pathways when there is a link failure. Classify and direct messages according to QoS priorities. Permit or deny the flow of data, based on security settings.
  • 16. Media The medium provides the channel over which the messages travel from source to destination. Metallic wires within cables Glass or plastic fibers Wireless Transmission
  • 17. Media The signal encoding that must occur is different for each type of media. Electrical impulses with specific patterns Pulses of light in the infrared or visible ranges Patterns of electromagnetic waves
  • 18. Media Different network media have different features and benefits. Not all network media are appropriate for the same purpose. You must make the appropriate choice to provide the proper channel. Distance it can carry the signal Environment Bandwidth Cost of the media Installation costs Cost of connectors and devices
  • 19. Communicating Over the Network LANs, WANs and Internetworks
  • 20. Local Area Networks An individual network usually spans a single geographical area, providing services and applications to people within a common organizational structure, such as a single business, campus or region.
  • 21. Wide Area Networks Networks that connect LANs in geographically separated locations. Usually implemented with leased connections through a telecommunications service provider (TSP) network. A TSP traditionally transports voice and data on different networks. Now, providers are offering converged network services. HDLC, PPP, T1, DS3, OC3, ISDN, Frame Relay
  • 22. The Internet : A Network of Networks Internet Service Providers (ISPs) connect their customers to the Internet through their network infrastructure. The Internet, then, is a collection of ISPs co-operating with each other to form one large converged internetwork.
  • 23. Network Representations Specialized terminology is used to describe how these devices and media connect to one another.
  • 24. Network Representations Network Interface Card (NIC): Provides the physical connection to the network at the PC or other host device. Physical Port: A connector or outlet on a networking device where the media is connected to a host or other networking device.
  • 25. Network Representations Interface: Specialized ports on an internetworking device that connect to individual networks . Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces .
  • 26. Communicating Over the Network Protocols
  • 27. Rules That Govern Communications Protocols: Are the rules that govern communications. The format or structure of the message. How and when error and system messages are passed between devices. The setup and termination of data transfer sessions. The method by which networking devices share information about pathways with other networks.
  • 28. Protocol Suites Protocol Suite: A group of inter-related protocols that are necessary to perform a communication function. Cannot function without a set of standards that network vendors can follow. Institute of Electrical and Electronics Engineers (IEEE): Develops standards in telecommunications, information technology and power generation . Examples: 802.3 (Ethernet), 802.11 (WLAN) Internet Engineering Task Force (IETF) Internet standards, RFCs (Request for Comments) Example: TCP, IP, HTTP, FTP
  • 29. Interaction of Protocols Each protocol at each layer of the protocol suite work together to make sure messages are received and understood by both devices.
  • 30. Technology Independent Protocols Protocols are not dependent upon any specific technology. They describe what must be done to communicate but not how its is to be carried out.
  • 31. Communicating Over the Network Using Layered Models
  • 32. Layered Models Layered models separate the functions of specific protocols.
  • 33. Benefits of a Layered Model Benefits of a Layered Model: Have defined information that they act upon and a defined interface to the layers above and below. Fosters competition because products from different vendors can work together. Prevents technology or capability changes in one layer from affecting other layers above and below. Provides a common language to describe networking functions and capabilities.
  • 34. Protocol and Reference Models Protocol Model: Closely matches the structure of a particular protocol suite . The set of related protocols in a suite typically represents all the functionality required to interface the human network with the data network. The TCP/IP model is a protocol model because it describes the functions that occur at each layer of protocols only within the TCP/IP suite .
  • 35. Protocol and Reference Models Reference Model: Provides a common reference for maintaining consistency within all types of network protocols and services. Not intended to be an implementation specification. Primary purpose is to aid in clearer understanding of the functions and process involved.
  • 36. TCP/IP Model Open Standard No one company controls it. Governed by IETF Working Groups Standards proposed using Request for Comments (RFCs) .
  • 38. The Communication Process Segment and Encapsulate Generate on to the media Create Data Transport through the segment Pass data to application Receive from the media Decapsulate and Reassemble
  • 39. Protocol Data Units and Encapsulation Header Header Data Header Trailer 0010100111011001010000011111010100010101 Segmentation and Encapsulation Email Message Data Data Data Data Data
  • 40. Protocol Data Units and Encapsulation Header Header Header Trailer Decapsulation and Reassembly Data 0010100111011001010000011111010100010101 Email Message Data Data Data Data Data Data
  • 41. Protocol Data Units and Encapsulation Header Header Header Trailer Email Message Data Data Data Protocol Data Units Data Segment Packet Frame
  • 42. Protocol Data Units and Encapsulation The Diagram on Page 51 in the text is incorrect. This is the correct diagram .
  • 43. Communicating Over the Network The OSI Model
  • 44. OSI Model The International Organization for Standardization ( ISO ) released the Open Systems Interconnection (OSI) reference model in 1984. www.iso.org for more information
  • 45. OSI Model Breaks network communication into smaller, more manageable parts . Makes learning it easier to understand. Prevents changes in one layer from affecting other layers. Standardizes network components to allow multiple vendor development and support. Allows different types of network hardware and software to communicate with each other. It is a descriptive scheme .
  • 46. OSI Model - Example - FYI Descriptive Scheme: Can be used to describe the functionality and interaction of different protocol suites. IBM’s SNA Physical Data Link Network Transport Session Presentation Application WAN SDLC LAN DLSW SNA NETBIOS SMB IBMNM LLC RPL
  • 47. OSI Model – Example - FYI Descriptive Scheme: Can be used to describe the functionality and interaction of different protocol suites. ISO Physical Data Link Network Transport Session Presentation Application LAN / Wan Physical Media LLC Layer Type 1 and 2 Protocols CLNP ISO-TP (TP0, TP1, TP2, TP3, TP4) NETBIOS ISO-SP ISO-PP ROSE ACSE RTSE VTP FTAM X.400 X.500 ES-IS IS-IS IDRP
  • 48. OSI Model – Example - FYI Descriptive Scheme: Can be used to describe the functionality and interaction of different protocol suites. TCP/IP Physical Data Link Network Transport Session Presentation Application LAN / Wan Physical Media ARP / RARP LLC IP ICMP RIP IGMP TCP UDP NETBIOS DNS FTP, Telnet, SMTP, POP3, IMAP4, HTTP, X-Windows SNMP, TFTP, BOOTP, DHCP
  • 49. OSI Model Layers CISCO MICROSOFT 7 Application A ll A way 6 Presentation P eople P izza 5 Session S eem S ausage 4 Transport T o T hrow 3 Network N eed N ot 2 Data Link D ata D o 1 Physical P rocessing P lease Usually referenced by layer number These two layers are not commonly referred to in most instances.
  • 50. OSI Model Primary concern: Communications between applications Primary concern: Moving raw data cross the network Layers CISCO MICROSOFT 7 Application A ll A way 6 Presentation P eople P izza 5 Session S eem S ausage 4 Transport T o T hrow 3 Network N eed N ot 2 Data Link D ata D o 1 Physical P rocessing P lease
  • 51. Communicating Over the Network Network Addressing
  • 52. OSI Model OSI Model Layer Addressing Application Encoded Application Data (Usually referred to as the Upper Layers ) Presentation Session Transport Source and Destination: Process Address Network Source and Destination: Logical Network Address Data Link Source and Destination: Device Physical Address Physical Timing and Synchronization Bits
  • 53. Getting Data to the End Device Header Header Header Trailer Email Message Data Data Data Encoded Data Process Logical Physical Encapsulation Process and Addressing 1. 2. 3. 4. 5. 6. 7. Addressing always includes both the Source and Destination Addresses.
  • 54. Getting Data to the End Device Delivery on a single local network . Unique on the network and represents the device. Codes placed on the NIC by the manufacturer. Referred to as the physical address or the MAC address . 1. 2. 3. 4. 5. 6. 7. Layer 2 Addressing Header Trailer Data Source and Destination Physical or MAC Address
  • 55. Getting Data to the End Device Layer 2 Header Destination MAC Address Source MAC Address Data
  • 56. Getting Data Through The Network Move data from one local network to another local network. Addresses must identify both the network and the host on that network. Used by routers to determine the best path to the destination host. 1. 2. 3. 4. 5. 6. 7. Layer 3 Addressing Header Data Source and Destination Logical Network Address (IP, IPX, etc.)
  • 57. Getting Data Through the Network Layer 2 Header Layer 3 Header Destination MAC Address Source MAC Address Destination Logical Address Source Logical Address Data
  • 58. Getting Data to the Right Application Identifies the specific process or service running on the destination host that will act on the data . Multiple, simultaneous applications . 1. 2. 3. 4. 5. 6. 7. Layer 4 Addressing Header Data Process Under TCP/IP, a port number to identify the application. Port 80: HTTP (Web Browser) Port 25: SMTP (Email) Port 194: IRC (Internet Relay Chat)
  • 59. Getting Data to the Right Application Layer 2 Header Layer 3 Header Layer 4 Header Destination MAC Address Source MAC Address Destination Logical Address Source Logical Address Destination Process Address Source Process Address Data
  • 60. Putting It All Together Logical MAC Port MAC Destination MAC Address Source MAC Address Destination Logical Address Source Logical Address Destination Process Address Source Process Address Data
  • 61. Comparing the OSI and TCP/IP Models OSI Model Layer Function Protocol Data Unit Device TCP/IP Model 7 Application User Functionality Character Application 6 Presentation Character Representation 5 Session Manage Data Exchange 4 Transport Services to segment, transfer and reassemble the data Segment Transport 3 Network Network addressing and best path determination Packet Router Internet 2 Data Link Methods for reliable frame exchange over a common media Frame Switch Network Access 1 Physical Describe physical characteristics to transmit bits over a common media Bit Hub
  • 62. Brain a little fuzzy? You need to learn to crawl before you can walk and walk before you can run. We are starting with the theory and concepts and will move on to the actual design and implementation of networks.