13
NETWORKING (1) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security

NETWORKING (1) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security

Embed Size (px)

DESCRIPTION

OSI Layers 3

Citation preview

Page 1: NETWORKING (1) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security

NETWORKING (1)

Dr. Andy Wu

BCIS 4630 Fundamentals of IT Security

Page 2: NETWORKING (1) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security

2

OSI Model• Network communications protocols are developed using the

Open System Interconnection (OSI) model.• An ISO standard for worldwide communications. • The OSI model defines a framework for implementing

protocols in seven distinct layers.• Each layer makes use of the services of the layer below it to

provide a set of specific services to the layer above it. • Adjacent layers communicate with each other through a well-

defined interface, so that in principle, we could change one layer or even completely rewrite it without affecting the others.

Page 3: NETWORKING (1) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security

3

OSI LayersLayer Function Examples

Application User interfaceProgram level communication

HTTP, SMTP

Presentation Presentation format of dataData conversion if needed

ASCII, JPEG, MP3, Encryption

Session Establish and maintain communication channels OS, Application access scheduling

Transport Reliable or unreliable end-to-end communicationIdentifies upper layer processes that will receive data

TCP, UDP, SPX

Network Logical addressing and routingDelivering packets from source to destination

IP, IPX

Data Link Transforming physical layer into a reliable link and presenting it to upper layersIncludes MAC (802.3) and LLC (802.2) sublayers

Ethernet

Physical Transmission of bit stream over physical mediumSignaling

EIA/TIA 568B

Page 4: NETWORKING (1) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security

4

OSI Mnemonic

Away Application

Pizza Presentation

Sausage Session

Throw Transport

Not Network

Do Data Link

Please Physical

Page 5: NETWORKING (1) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security

5

Encapsulation• When data is passed down from higher

layers to lower ones, each layer creates its header and places the data given to it by the next-higher layer behind its own header, thereby encapsulating the higher layer’s data.

• The Data Link layer also creates a trailer.

Page 6: NETWORKING (1) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security

6

Encapsulation – Layer 4

Page 7: NETWORKING (1) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security

7

Encapsulation – Layer 3

Page 8: NETWORKING (1) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security

8

Encapsulation – Layer 2

Page 9: NETWORKING (1) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security

9

Network Communication

Page 10: NETWORKING (1) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security

10

Decomposition – Layer 2

Page 11: NETWORKING (1) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security

11

Decomposition – Layer 3

Page 12: NETWORKING (1) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security

12

Decomposition – Layer 4

Page 13: NETWORKING (1) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security

13

Protocol Data Unit• A term that describes a set of bytes that includes the layer’s header and

trailer (if any) and all data encapsulated.• From Layer X’s perspective, the higher-layer headers and the user data

form one large data field.

Layer(s) PDU

Application, Presentation, Session Data

TransportTCP SegmentUDP Datagram

Network IP Packet

Data Link Frame

Physical Bit