You are on page 1of 55

A Logical Explanation

The Business/IT Highway:


How Does IT Work?
Objectives

 Analyze the layered models


 Review common protocols
 Logical addressing
 Understand the encapsulation process
 Reliability issues
 How does my data get to its destination?
Part 1 – Overview of the OSI Model
Benefits of OSI Model

 Reduce complexity
 Standardize interfaces
 Facilitate modular engineering
 Ensure interoperable technologies
 Accelerate evolution
 Simplify teaching and learning
What is OSI Model ?

 Open System Interconnection (OSI) model is a set of


protocols that define and standardize the data
communications process
 The OSI model is set by the International Standards
Organization (ISO)
 The OSI model has the support of most major
computer and network vendors
 OSI model divides the process into seven groups,
called layers which are fitted with protocol standards
OSI Layers
The OSI Model

 Physical Layer (L1 or Layer 1)


– Connections and connector types
– Cables
– Wireless
– Fiber
– Signaling standards
– Voltages, attenuation, noise, etc
OSI Layers
OSI Layers

 Data Link Layer (L2 or Layer 2)


– Physical addressing – MAC
– Framing
– Network topology
– Error detection
– Access to media
– Sub-Layers MAC and LLC
– Ethernet
– LAN Switches are L2 devices
OSI Layers

 Data Link Layer Protocols


– SLIP – Serial Line Internet Protocol
– PPP – Point to Point Protocol
– HDLC – High Level data link control
OSI Layers

•Provides connectivity and path selection between two host


•Provides Logical address
•No error correction, best effort delivery.
OSI Layers

 Network Layer (L3 or Layer 3)


– Logical addressing – IP address
– Packets
– Connection-less, best effort
– Best path selection
– Routers are Layer 3 devices
OSI Layers
OSI Layers

 Transport Layer (L4 or Layer 4)


– Segmentation of Data
– Error correction
– Reliability
– End-to-end communication
– Windowing
– TCP and UDP
OSI Layers
OSI Layers

 Session Layer
– Two way alternate vs. two way simultaneous
– Synchronization between applications
– Some protocols: NFS & SQL

 This layer is part of the TCP/IP model’s Application layer


OSI Layers
OSI Layers

 Presentation Layer (L6 or Layer 6)


– Data format
 ASCII, TIFF, JPEG, MP3, MPEG, etc
– Data encryption
 SSL, 3DES, AES
– Data compression
 Making files smaller without losing information or
degrading the quality.

 This layer is part of the TCP/IP model’s Application layer


OSI Layers
OSI Layers

 Application Layer (L7 or Layer 7)


– Closest to the user
– This is NOT the application you interact with
– This is the underlying protocol of the application
 HTML for web browsers
 SMTP and POP3 for email

 This layer is part of the TCP/IP model’s Application layer


Peer-to-Peer Communication
Compare: OSI and TCP/IP models
PART 2 – The Details

 Let’s look at these layers a bit closer but lets


turn it around.
Layer 7 – Application Layer

 Identifying and establishing the availability of


intended communication partners
 Synchronizing cooperating applications
 Establishing agreement on procedures for
error recovery
 Controlling data integrity
Layer 7 – Application Layer

 Common Application layer protocols


– HTTP
– Telnet
– FTP
– SNMP
– DNS
– FTP and TFTP
– SMTP
DNS

 The Domain Name System (DNS) is a system


used for translating names into IP addresses.
 There are more than 200 top-level domains
on the Internet
 Uses port 53
.us – United States .gov – government sites
.uk – United Kingdom .org – non-profit sites
.edu – educational sites .net – network service
.com – commercial sites
FTP and TFTP

 FTP is a reliable, connection-oriented


service that uses TCP to transfer files
between systems that support FTP.
– Uses ports 20 and 21
 TFTP is a connectionless service that uses
User Datagram Protocol (UDP).
– TFTP is designed to be small and easy to
implement.
– Use port 69
HTTP

 Hypertext Transfer Protocol


 Uses port 80
SMTP

 E-mail servers communicate with each other


using the Simple Mail Transport Protocol
(SMTP) to send and receive mail (POP3).
 Uses port 25, 110
SNMP

 The Simple Network Management Protocol (SNMP) is an


application layer protocol that facilitates the exchange of
management information between network devices.
Telnet

 Telnet client software provides the ability to log


in to a remote Internet host that is running a
Telnet server application and then to execute
commands from the command line.
Layer 6 – Presentation Layer

 Responsible for
– Data format - ASCII, jpeg, mp3, etc.
– Compression
– Encryption
Layer 5 – Session Layer

 Establish, maintain and terminate sessions


between applications.
– Dialog control - the session layer decides whether
to use two-way simultaneous communication or
two-way alternate communication.
– Dialog separation - orderly initiate, terminate, and
manage transactions
Layer 4 – Transport Layer

 Segments data
 Adds a logical identifier (port number)
 Provides for reliability by ensuring segments
delivered are acknowledged
 Provides for retransmission of segments no
acknowledged
 Reassembles segments at destination
 Provides for congestion avoidance and
control
Layer 4 – Transport Layer

 Primary Transport Layer Protocols


– TCP
 Connection oriented
 Reliable
– UDP
 Connection-less
 Unreliable
 Best effort like IP
Layer 4 – Transport Layer
 Both TCP and UDP use port (socket) numbers to pass
information to the upper layers.
 Port numbers identify specific “Application” layer
protocols.
– Numbers below 1024 are considered well-known
ports numbers.
– Numbers above 1024 are dynamically assigned
ports numbers.
– Registered port numbers are those registered for
vendor-specific applications. Most of these are
above 1024.
 Well known ports: 80 = HTTP, 23 = telnet
Layer 3 – Network Layer

 Layer 3 is responsible for:


– Logical addressing – (IP and others)
– Routing
 Path selection
 Packet switching
– Encapsulation of Segments into PACKETS
Layer 3 – Network Layer

 Internet Protocol
– IP is a connectionless, best-effort protocol
– Unreliable
– It relies on TCP for reliability
– It provides the ability for a logical address
 Network (and subnetwork)
 Node
– A mask is used to distinguish between net & node
Layer 3 – Network Layer

 What is an IP address?
– Logical address
– Two parts: network id and host id
– 32 bit address
– Written in dotted decimal notation
 4 sets of 8 bits written as decimal numbers
192.168.1.1
205.200.3.24
10.3.5.254
Layer 3 – Network Layer

 Private and reserved IP addresses


– Some addresses are reserved for special
purposes.
 Some identify the Network ID and some Identify the
broadcast address for the entire network.
 Some are considered Private and do not traverse the
internet
Layer 3 – Network Layer

 Private and reserved IP addresses (cont.)


 Some are for multicasting
– 224.0.0.0 through 239.255.255.255
 Some are for testing purposes
– 127.0.0.0
 Some are link-local
– 169.254.0.0
 Some are reserved for no good reason
– 240.0.0.0 – 255.255.255.255
Layer 3 – Network Layer

 IP version 6
– Do I need to know this? Be aware of it.
 An IPv6 address is a 128 bit address
 Written in hexadecimal notation
2001:1234:0000:fb5d:0000:0000:0abc:def0/64
Can be shortened to:
2001:1234:0:fb5d::abc:def0/64
Layer 3 – Network Layer

 Ah….the IP PACKET
Layer 3 – Network Layer

 The Router
Layer 3 – Network Layer

 The Router – a network layer device


– Used to connect different logical networks
– Determines best path (routing protocols)
– Switches packets (routed protocols) from
incoming interface to outgoing interfaces
Layer 3 – Network Layer

 The router is responsible for determining bets path


Layer 2 – Data Link

Layer 2 deals with the limitations of Layer 1


 Layer 1  Layer 2
– Cannot communicate with – Communicates with upper-
the upper-layer protocols layer protocols using
logical link control (LLC)
– Cannot name or identify – Provides an addressing (or
computers naming) process
– Can describe only streams – Uses framing to organize
of bits or group the bits
– Cannot decide which – Uses a system called
computer will transmit data Media Access Control
from a group in which all are (MAC) to control
trying to transmit at the same transmissions
time
Layer 2 – Data Link

 LLC – Logical Link Control


– LLC is specified in IEEE 802.2
– It is the upper sub-layer of layer 2.
– It provides a logical service to the Network layer
– It is independent of topology
– It is independent of technology
Layer 2 – Data Link

 MAC – Media Access Control


– This is the lower sub-layer of Layer 2
– Topology dependent
– Media dependent
– Technology dependent
– Physical addressing (naming)
– Encapsulating Packets into FRAMES
Layer 2 – Data Link

 The LAN switch – a layer 2 device*


L3 vs. L2

 Comparing layer 3 and layer 2 devices


Layer 1

 Layer 1 (We spoke in detail about layer one in the Let’s Get Physical workshop)

– Bits and signaling


– Cabling
– Connectors and connection standards
– Electricity
Putting it together

 Each layer accepts whatever is passed into it


from the upper layer.
 It then encapsulates that information.
 Each layer’s encapsulation has a name, this
is called a Protocol Data Unit or PDU.
Putting it together

 Data flow example


Summary

 We use layers to simplify learning and


understanding of data flow
 Data is encapsulated into packets then
frames before being transmitted as bits
 Routing protocols are used to determine the
best path to a destination
 TCP/IP is the protocol suite of the internet
– IP is connectionless and unreliable
– TCP provides connection-oriented service and
reliability

You might also like