You are on page 1of 42

Introduction to OSI & TCP/IP Model

Nur Iqbal Muliawan


OSI Model

2
Why need model?

Perinician fungsi yang lebih spesifik

Standart untuk vendor yang berbeda

Membuat troubleshoot lebih mudah

Agar vendor dapat membuat perangkat di area yang
spesifik

ISO rilis OSI Model di tahun 1984

3
OSI Model

4
Introduction to OSI & TCP/IP Model


Membutuhkan inisiasi

User Interface

Program yang secara khusus di
buat untuk bekerja di network

Data Unit : Message

Ex: telnet, ssh, ftp, http, https

5
Introduction to OSI & TCP/IP Model


Fungsinya menterjemahkan

Menterjemahkan data dari layer
Aplikasi menjadi format yang
dapat dipahami oleh layer lain

Enkripsi dan kompresi

Data Unit : Message

6
Introduction to OSI & TCP/IP Model


Initiate, maintain dan end
session

Check Points

Data Unit : Message

7
Introduction to OSI & TCP/IP Model


Segmentasi

8
Introduction to OSI & TCP/IP Model


Segmentation

Flow control

Error handling

Segment sequencing

Service addressing

Data Unit : segment

9
Introduction to OSI & TCP/IP Model

Transport Protocol ada 2



TCP ( Transmit Control
Protocol) → connection oriented

UDP ( User Datagram Protocol)
→ connectionless

10
Introduction to OSI & TCP/IP Model


Addressing

Routing

IP addressing

Routers

Data Unit : packet

11
Introduction to OSI & TCP/IP Model


Physical addressing

Mac address

Error checking

Data Unit : packet

12
Introduction to OSI & TCP/IP Model


Hardware

Bit

13
OSI Model

14
Introduction to OSI & TCP/IP Model
Apa yang di maksud Encapsulation?

Encapsulation: Proses penambahan kontrol


informasi saat melewati setiap layer

15
Introduction to OSI & TCP/IP Model

16
TCP/IP Model

17
TCP/IP or DoD Model

18
TCP/IP Model: Application Layer

19
Process / Application layer

Telnet ●
HTTPS

Ssh ●
NTP

FTP ●
DNS

TFTP ●
DHCP / BootP

SNMP ●
APIPA

HTTP

20
Telnet (Telecommunication Network)

Terminal base

Remote application

No encryption

Simple

Easy to use

Very low overhead

21
Ssh(Secure Shell)

Terminal base

Remote application

Encrypted connection

22
FTP (File Transfer Protocol)

Use to transfer files

An application but operating as
protocol

Allow access and list directory

Login authentication

Listing and manipulating directory

Copy beetween host

Can’t execute remote file as
program

23
TFTP (Trivial File Transfer Protocol)

Fast and easy use

No directory browsing ability

Sending smaller block than FTP

No authentication

Insecure

24
SNMP (Simple Network Management Protocol)

Collect and manipulating
valuable network information

Sending data to NMS (Network
Management System)

Version SNMP : v1, v2 dan v3

25
HTTPS (Hypertext Transport Protocol Secure)

Secure version of http

Use Secure Socket Layer (ssl)

Encrypt an http message

26
NTP (Network Time Protocol)

Use to synchronize time
between server and client

Simple but important

27
DNS (Domain Name Service)

Use to resolve hostnames

28
Dynamic Host Configuration Protocol (DHCP)/Bootstrap
Protocol (BootP)

DHCP, assign ip address to ●
BootP, assign ip address
hosts automatically automatically but have to

DHCP just sent configuration configure mac-address
to host manually

BootP can send OS that a
host can boot from

29
Dynamic Host Configuration Protocol (DHCP)

Type of information a DHCP Server can provide:



IP address

Subnet Mask

Domain name

Default gateway

DNS Server

WINS Server

30
Dynamic Host Configuration Protocol (DHCP)

A client that sends out a DHCP Discover message in order to


receive an IP address sends out a broadcast at both layer 2 and
layer 3:

Layer 2 Broadcast => ff:ff:ff:ff:ff:ff

Layer 3 Broadcast => 255.255.255.255 ( all network )

31
Dynamic Host Configuration Protocol (DHCP)

DHCP Process:

Discover

Offer

Receive

Acknowledge

32
Dynamic Host Configuration Protocol (DHCP)

DHCP Conflict:

Occur when two host use the same IP

If happens, conflict address must be removed

Only can be solve manually

33
APIPA (Automatic Private IP Address)

Use when host cannot find DHCP Server

Windows feature

Range IP used : 169.254.0.1 – 169.254.255.254

Subnetmask used : 255.255.0.0 (class B)

34
HTTP (Hypertext Transport Protocol)

Can accessed from web
browser

Insecure

Use URL (Uninform User
Locator)

35
TCP/IP Model: Host to host Layer /
Transportation Layer

36
Host to host Layer
Two common protocol:

Transmission Control Protocol (TCP)

User Datagram Protocol (UDP)

37
Transmission Control Protocol (TCP)
TCP Segment Format

38
User Datagram Protocol (UDP)

UDP Segment

39
TCP vs UDP
TCP UDP

Sequenced ●
Un-sequenced

Reliable ●
Unreliable

Connection- oriented ●
Connectionless

Virtual Circuit ●
Low Overhead

Acknowledgment ●
No Acknowledgement

Windowing flow control ●
No Windowing Flow Control

40
Port Number for TCP and UDP
TCP and UDP must use port numbers to communicate with the upper layers
because these are what keep track of different conversations crossing the
network simultaneously.
Originating-source port numbers are dynamically assigned by the source host and
will equal some number starting at 1024. Port number 1023 and below are defi
ned in RFC 3232 (or just see www.iana.org ), which discusses what we call well-
known port numbers.

41
Port Number for TCP and UDP
TCP UDP
Telnet, 23 SNMP, 161
Ssh, 22 TFTP, 69
SMTP, 25 DNS, 53
HTTP, 80 BootP/DHCP, 67
HTTPS, 443 NTP, 123
FTP, 20 & 21
DNS, 53
POP3, 110
IMAP4 , 143

42

You might also like