Internetworking Models
Internetworking Models
Internetworking Models
When networks first came into being, computers could typically communicate only with computers from
the same manufacturer. For example: Companies ran either a complete DECnet solution or an IBM
solution, never both together.
In the late 1970s, the Open System Interconnection (OSI) reference model was created by the
International Organization for Standardization (ISO) to break through this barrier.
OSI reference model is a conceptual blueprint of how communication should take place. It addresses all
the processes required for effective communication and divides them into logical groupings called layers
Top three layers define how the application within end stations will communicate with each other
The bottom four layers define data is transmitted end to end
Page 1 of 4
The bottom layers:
Department of Defense (DoD) model because the development of the networking method was funded
by the United States Department of Defense through DARPA. Its implementation is a protocol stack.
Application
Process/
Presentation
Application
Session
Transport Host-to-Host
Network Internet
The Internet protocol (IP) suite provides end-to-end data communication specifying how data should be
packetized, addressed, transmitted, routed, and received.
Layer Protocols
Process/Application Telnet, TFTP, FTP, SMTP, LPD, NFS, SNMP, X Windows, SSH,
HTTP, HTTPS, NTP, DNS, DHCP, BootP
Host-to-Host TCP, UDP
Internet ICMP, ARP, RARP, IP
Network Access Ethernet, Fast Ethernet, Gigabit Ethernet, 10 Gig Ethernet
Page 2 of 4
Transmission Control Protocol vs. User Datagram Protocol:
TCP UDP
Sequenced Unsequenced
Reliable Unreliable
Connection-oriented Connectionless
Virtual circuit Low overhead
Acknowledgement No acknowledgement
Window flow control No window flow control
A protocol is a set of rules and guidelines for communicating data. Rules are defined for each step and
process during communication between two or more computers. Networks have to follow these rules to
successfully transmit data.
A port number is a unique identifier used with an IP address. A port is a 16-bit unsigned integer, and the
total number of ports available in the TCP/IP model is 65,535 ports. Therefore, the range of port
numbers is 0 to 65535
Flow Control: Since floods and losing data can both be tragic; we have a fail-safe solution in place known
as flow control. Flow control prevents a sending host on one side of the connection from overflowing
the buffers in the receiving host. It uses connection-oriented with following characteristics:
Windowing: The quantity of data segments, measured in bytes, that the transmitting machine is allowed
to send without receiving an acknowledgement is called a window. Windows are used to control the
amount of outstanding, unacknowledged data segment.
Page 3 of 4
If the window size is set to 1, sending will wait for and acknowledgement for each data segment it
transmits before transmitting but will allow three to be transmitted before receiving an acknowledgement if
the window size I set to 3.
Page 4 of 4