You are on page 1of 37

Computer Networks I

Dr:- Rania Abul Seoud


r-abulseoud@k-space.org
© 2004, Cisco Systems, Inc. All rights reserved. 1
Protocols of the OSI
Model

Lecture 5
© 2004, Cisco Systems, Inc. All rights reserved. 2
• http://www.tcpipguide.com/free/t_Connecti
onOrientedandConnectionlessProtocols.h
tm

© 2004, Cisco Systems, Inc. All rights reserved. 3


What is a Protocol?
• It is a set of rules which is used by computers to
communicate with each other across a network.
• In order for two computers to talk to each other,
they must be speaking the same language.
• It is a standard that controls or enables the
connection and data transfer between computing
endpoints.
• Protocols may be implemented by hardware,
software, or a combination of the two.

4
© 2004, Cisco Systems, Inc. All rights reserved.
4
What is a Protocol?
• Many different types of network protocols and
standards are required to ensure that your
computer (no matter which operating system,
network card, or application you are using) can
communicate with another computer located on
the next desk or half-way around the world.
• The purpose of a protocol is to provide a service
to the layer above.
• Peer layers communicate with each other with a
set of rule.

© 2004, Cisco Systems, Inc. All rights reserved. 5


Protocols in the OSI model
ECHO, ENRP, FTP, Gopher, HTTP, NFS, RTSP,
7 Application
SIP, SMTP, SNMP, SSH, Telnet, Whois, XMPP
6 Presentation XDR, ASN.1, SMB, AFP, NCP
ASAP, TLS, SSL, ISO 8327 / CCITT X.225,
5 Session
RPC, NetBIOS, ASP
4 Transport TCP, UDP, RTP, SCTP, SPX, ATP, IL
IP, ICMP, IGMP, IPX, OSPF, RIP, IGRP, EIGRP,
3 Network
ARP, RARP, X.25
Ethernet, Token ring, HDLC, Frame relay,
2 Data Link
ISDN, ATM, 802.11 WiFi, FDDI, PPP
10BASE-T, 100BASE-T, 1000BASE-T,
1 Physical SONET/SDH, G.709, T-carrier/E-carrier,
various 802.11 physical layers
http://wolfzaene.blogspot.com/2007/12/five-layer-tcpip-model.html
© 2004, Cisco Systems, Inc. All rights reserved. 6
Transport Layer Protocols
• Transport layer includes end-to-end message
transfer capabilities.
• End-to-end message transmission or connecting
applications can be categorized as either:
• Connection-oriented e.g. TCP
• Connectionless e.g. UDP
• The Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP) are two of the core
protocols of the Transport Layer Protocols.
© 2004, Cisco Systems, Inc. All rights reserved. 7
Connection-Oriented Protocols:

➢These protocols require that a (logical) connection


be established between two devices before
transferring data.
➢This is generally accomplished by following a
specific set of rules that specify how a connection
should be initiated, negotiated, managed and
eventually terminated.
➢Usually one device begins by sending a request to
open a connection, and the other responds.

© 2004, Cisco Systems, Inc. All rights reserved. 8


Connection-Oriented Protocols:

➢They pass control information to determine if and


how the connection should be set up.
➢If this is successful, data is sent between the
devices.
➢When they are finished, the connection is broken.

© 2004, Cisco Systems, Inc. All rights reserved. 9


Connectionless Protocols:

• These protocols do not establish a connection


between devices.
• As soon as a device has data to send to another, it
just sends it.

© 2004, Cisco Systems, Inc. All rights reserved. 10


Transmission Control Protocol (TCP)
• TCP (Transmission Control Protocol).
• TCP is transport layer protocol (layer 4 protocol).
• TCP is a Connection-oriented protocol.
• TCP is a reliable (no duplicated or losing data)- stream ordered delivery
service after first establishing a communication session.
• TCP is used by many application layer protocols and resulting
applications, including the E-mail, File Transfer Protocol (FTP), and
Secure Shell Protocol (SSH).
• TCP is optimized for accurate delivery rather than timely delivery, so it
is not particularly suitable for real-time applications such as Voice over
IP.
• E-mail is TCP based application.
• File Transfer Protocol (FTP) and Secure Shell Protocol (SSH) are TCP
based application layer protocol.
© 2004, Cisco Systems, Inc. All rights reserved. 11
User Datagram Protocol (UDP)
• UDP (User Datagram Protocol).
• UDP is transport layer protocol (layer 4 protocol).

• UDP is a Connectionless protocol.

• Messaged in UDP may arrive out of order, appear duplicated, or go


missing without notice.

• Avoiding the overhead of checking whether every packet actually


arrived makes UDP faster and more efficient, for applications that do
not need guaranteed delivery.

• Time-sensitive applications often use UDP because dropped packets


are preferable to delayed packets.

• Video chatting, live stream and Voice Over IP are UDP based real time
applications.
© 2004, Cisco Systems, Inc. All rights reserved. 12
data

© 2004, Cisco Systems, Inc. All rights reserved. 13


Network Layer Protocols
• Internet Protocol (IP) is the primary protocol in the
Network layer.
• It has the task of delivering packets from the
source host to the destination host solely based
on its address.
• For this purpose the Internet Protocol (IP) defines
addressing methods and structures for packets
encapsulation.
• The first major version of addressing structure,
now referred to as IPv4 is still the dominant
protocol of the Internet, although the successor,
IPv6 is being deployed actively worldwide.
© 2004, Cisco Systems, Inc. All rights reserved. 14
TCP/IP Model

Transmission Control
Protocol/Internet Protocol"

© 2004, Cisco Systems, Inc. All rights reserved. 15


TCP/IP Model
The U.S. Department Of Defense (DOD) created
the TCP/IP reference model because it wanted a
network that could survive any conditions, even a
nuclear war in a world connected by different
types of communication media.

Although the OSI reference model is universally


recognized, the historical and technical open
standard of the Internet is Transmission Control
Protocol / Internet Protocol (TCP/IP).

© 2004, Cisco Systems, Inc. All rights reserved. 16


TCP/IP Model
The TCP/IP reference model is created in the 1970s
and the TCP/IP protocol stack make data
communication possible between any two
computers, anywhere in the world, at nearly the
speed of light.

The TCP/IP reference model is a set of layers, each


layer solves a set of problems involving the
transmission of data, and provides a well-defined
service to the upper layer protocols based on
using services from some lower layers.
© 2004, Cisco Systems, Inc. All rights reserved. 17
Transmission Control Protocol/Internet
Protocol" - TCP/IP Model

• The TCP/IP reference model is a set of


communications protocols used for the Internet
and other similar networks.
• The TCP/IP reference model is named from two of
the most important protocols in it: the
Transmission Control Protocol (TCP) and the
Internet Protocol (IP), which were the first two
networking protocols defined in this standard.

© 2004, Cisco Systems, Inc. All rights reserved. 18


TCP/IP Model
• Although some of the layers in the TCP/IP model
have the same name as in the OSI model
they don’t correspond exactly.

© 2004, Cisco Systems, Inc. All rights reserved. 19


Layers with TCP/IP Model and OSI Model

• Compare OSI model and TCP/IP model

© 2004, Cisco Systems, Inc. All rights reserved. 20


2 Models Side-By-Side

Handles
7 Application representation of
data, encoding and
6 Presentation Application dialog control (chat)

5 Session
4 Transport Transport
3 Network Internet
2 Data Link Network
1 Physical Access

© 2004, Cisco Systems, Inc. All rights reserved. 21


The Application Layer

© 2004, Cisco Systems, Inc. All rights reserved. 22


Application Layer Protocols

• FTP:- File Transfer protocol


• Protocols designed to permit the transfer of all types of
files from one device to another.
• HTTP:- Hypertext transfer protocol
• Transfers hypertext documents between hosts;
implements the World Wide Web.
• Telnet:- Telnet Protocol
•Allows a user on one machine to establish a remote
terminal session on another (remote login).

© 2004, Cisco Systems, Inc. All rights reserved. 23


Application Layer Protocols
• TFTP:- Trivial File Transfer protocol
• TFTP is used to read files from, or write files to, a
remote server.
• Have to know what you want and where it is on the
server, no directory browsing, no user authentication
• Due to the lack of security, it is dangerous over
the open Internet. Thus, TFTP is generally only
used on private, local networks.
• DHCP :- Dynamic Host Configuration Protocol
• A complete protocol for configuring TCP/IP
devices and managing IP addresses.
© 2004, Cisco Systems, Inc. All rights reserved. 24
Application Layer Protocols
• DNS:- Domain Name System protocol
• Provides the ability to refer to IP devices using
names instead of just numerical IP addresses.
• Allows machines to resolve these names into
their corresponding IP addresses.
• SMTP:- Simple mail Transfer protocol
• SMTP is used to send mail between mail servers.
• POP-3 :- Post Office Protocol, version 3
• It enables users to pick up email across the
network from a central server.
© 2004, Cisco Systems, Inc. All rights reserved. 25
The Transport Layer

Connection oriented protocol, reliable service

Connectionless protocol, unreliable service

•It provides end-to-end transport services.


•It deals with the quality of service issues of
reliability, flow control, and error correction.
•Transport protocols segment and
reassemble upper-layer applications into
the same data stream.
© 2004, Cisco Systems, Inc. All rights reserved. 26
The Internet Layer
• It divides segments into packets.
• Each packet can go in different route.
• It chooses the best path for each packet
and packet switching.

27
© 2004, Cisco Systems, Inc. All rights reserved. 27
Internet Protocol (IP)

• Regardless of which network application


service is provided and which transport
protocol is used there is only one IP.

• IP serves as a universal protocol that allows


any computer anywhere to communicate at
any time.

© 2004, Cisco Systems, Inc. All rights reserved. 28


The Network Access Layer

•L2 LAN technologies :


Ethernet , TokenRing , FDDI
•L2 WAN technologies :
Point-to-Point (HDLC , PPP)
, Frame relay , X.25 ,ATM
•ARP, RARP, Proxy ARP
© 2004, Cisco Systems, Inc. All rights reserved. 29
Network Access layer
• It is concerned with all of the issues that an IP
packet requires to actually make a physical link to
the network media.
• It includes all the details of the network technology.
• It includes the details of physical and
data link layers in the OSI model.

© 2004, Cisco Systems, Inc. All rights reserved. 30


Application Layer Protocols
FTP HTTP SMTP DNS DNS TFTP

Transport Layer
TCP Protocols UDP

Internet Layer
Protocols IP

Network Access layer


Internet LAN Many LANs and WANs
Network technology
© 2004, Cisco Systems, Inc. All rights reserved. 31
DNS Name Resolution

© 2004, Cisco Systems, Inc. All rights reserved. 32


Similarities between OSI and TCP\IP models

• Both models have layers.


• Both models have application layers.
• Both models have comparable transport and
network layers.
• Both models need to be known by networking
professionals.
• Both models assume packets are switched and
individual packets may take different paths to
reach the same destination (packet switching).

© 2004, Cisco Systems, Inc. All rights reserved. 33


Differences between OSI and TCP\IP models

• Different number of layers (OSI model have seven layers


and TCP/IP model have four layers).
• TCP/IP model appears simple because it has fewer layers.
• TCP/IP model combines presentation and session layers
into the application layer.
• TCP/IP model combines data link and physical layers into
the network Access layer.

© 2004, Cisco Systems, Inc. All rights reserved. 34


Differences between OSI and TCP\IP models

reference
• TCP/IP model protocols are the standard around
which the internet developed, so it gains
credibility just because its protocols because it
has two of the most important protocols in it: the
Transmission Control Protocol (TCP) and the
Internet Protocol (IP), which were the first two
networking protocols defined in this standard.

© 2004, Cisco Systems, Inc. All rights reserved. 35


Advantages of OSI model over TCP\IP model

• It is a generic protocol-independent standard.


• It has more details which make it more helpful
for teaching and learning.
• It has more details which can be helpful when
troubleshooting.

© 2004, Cisco Systems, Inc. All rights reserved. 36


Final Remarks
• The Internet is developed by the standards of the
TCP/IP protocols. The TCP/IP model gains
credibility because of its protocols.
• In contrast, networks typically are not built on the
OSI protocol. The OSI model is used as a guide for
understanding the communication process.
• Networking professionals differ in their opinions
on which model to use.
• Due to the nature of the industry it is necessary to
become familiar with both.
© 2004, Cisco Systems, Inc. All rights reserved. 37

You might also like