The OSI Model 2 Role of a Reference Model
-
Upload
networkingcentral -
Category
Documents
-
view
122 -
download
2
description
Transcript of The OSI Model 2 Role of a Reference Model
![Page 1: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/1.jpg)
The OSI Model
![Page 2: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/2.jpg)
2
Role of a Reference Model
Networking is built on common framework Model clarifies process by breaking down
features and functionality into layers Easier to comprehend Helps with component compatibility
![Page 3: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/3.jpg)
3
OSI Reference Model
Provides useful way to describe and think about networking
Breaks networking down into series of related tasks
Each aspect is conceptualized as a layer Each task can be handled separately
![Page 4: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/4.jpg)
4
Seven Layers of OSI Reference Model
![Page 5: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/5.jpg)
5
OSI Reference Model Structure
Each layer of OSI model communicates and interacts with layers immediately above and below it
Each layer responsible for different aspect of data exchange
Each layer puts electronic envelope (DU) around data as it sends it down layers or removes it as it travels up layers for delivery
![Page 6: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/6.jpg)
6
Relationships Among OSI Layers
![Page 7: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/7.jpg)
7
Application Layer
Layer 7 is top layer of OSI reference model Provides general network access Includes set of interfaces for applications to
access variety of networked services such as: File transfer E-mail message handling Database query processing
May also include error recovery
![Page 8: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/8.jpg)
8
Presentation Layer
Layer 6 handles data formatting and protocol conversion
Converts outgoing data to generic networked format Does data encryption and decryption Handles character set issues and graphics
commands May include data compression Includes redirector software that redirects service
requests across network
![Page 9: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/9.jpg)
9
Session Layer
Layer 5 opens and closes sessions Performs data and message exchanges Monitors session identification and security
Performs name lookup and user login and logout Provides synchronization services on both ends Determines which side transmits data, when, and for
how long Transmits keep-alive messages to keep connection
open during periods of inactivity
![Page 10: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/10.jpg)
10
Transport Layer
Layer 4 conveys data from sender to receiver Breaks long data payloads into chunks called
segments Includes error checks Re-sequences chunks into original data on
receipt Handles flow control
![Page 11: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/11.jpg)
11
Network Layer
Layer 3 addresses messages for delivery Translates logical network address into physical MAC
address Decides how to route transmissions Handles packet switching, data routing, and
congestion control Through fragmentation or segmentation, breaks data
segments from Layer 4 into smaller data packets Reassembles data packets on receiving end
![Page 12: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/12.jpg)
12
Data Link Layer
Layer 2 creates data frames to send to Layer 1 On receiving side, takes raw data from
Layer 1 and packages into data frames Data frame is basic unit for network traffic on
the wire See Figure 5-3 for contents of typical data frame
Performs Cyclic Redundancy Check (CRC) to verify data integrity
Detects errors and discards frames containing errors
![Page 13: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/13.jpg)
13
Physical Layer
Layer 1 converts bits into signals for outgoing messages and signals into bits for incoming messages
Manages computer’s interface to medium Instructs driver software and network
interface to send data across medium Sets timing and interpretation of signals
across medium Translates and screens incoming data for delivery to
receiving computer
![Page 14: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/14.jpg)
14
Actions of Each layer of OSI Reference Model
![Page 15: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/15.jpg)
15
IEEE 802 Networking Specifications
Institute of Electrical and Electronic Engineers (IEEE) started Project 802 to define LAN standards
Set standards to ensure compatibility among network interfaces and cabling from different manufacturers
Concentrates on physical elements of network like NICs, cables, connectors, and signaling technologies
![Page 16: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/16.jpg)
16
IEEE 802 Standards
![Page 17: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/17.jpg)
17
IEEE 802 Extensions to the OSI Reference Model
Breaks Data Link layer into two sublayers Logical Link Control (LLC) for error recovery
and flow control Media Access Control (MAC) for access control
![Page 18: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/18.jpg)
18
IEEE 802 Standard with two Sublayers of OSI Data Link Layer
![Page 19: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/19.jpg)
19
IEEE 802 Extensions Logical Link Control (LLC) sublayer
Defines logical interface points, called Service Access Points (SAPs) that transfer information from the LLC sublayer to upper OSI layers; includes error detection and recovery
Media Access Control (MAC) sublayer Communicates with NIC to read physical address
from PROM; responsible for error-free data transmission
![Page 20: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/20.jpg)
20
IEEE 802.x Specification Map to OSI Reference Model
![Page 21: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/21.jpg)
21
Summary
From bottom up, the seven layers of the OSI reference model are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Most network products and technologies are positioned in terms of the layers they occupy
Layers help describe features and functions that products and technologies deliver
![Page 22: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/22.jpg)
22
Summary
IEEE 802 project elaborates on functions of Physical and Data Link layers
Data Link Layer is broken into two sublayers: Logical Link Control (LLC) and Media Access Control (MAC)
Together, these sublayers handle media access, addressing, control (through MAC sublayer) and provide reliable error-free delivery of data frames from one computer to another (through the LLC sublayer)
![Page 23: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/23.jpg)
23
Protocols
Rules and procedures for communicating To communicate, computers must agree
on protocols Many kinds of protocols:
Connectionless Connection-oriented Routable Nonroutable
![Page 24: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/24.jpg)
24
The Function of Protocols
Each protocol has different purpose and function Protocols may work at one or more layers More sophisticated protocols operate at higher
layers of OSI model Protocol stack or protocol suite is set of
protocols that work cooperatively Most common protocol stacks are TCP/IP used
by the Internet and IPX/SPX used by Novell NetWare
![Page 25: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/25.jpg)
25
Connectionless Versus Connection-Oriented Protocols
Two methods for delivering data across network: Connectionless – no verification that datagrams
were delivered; fast protocols with little overhead Connection-oriented – more reliable and slower
protocols that include verification that data was delivered; packets resent if errors occur
![Page 26: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/26.jpg)
26
Routable Versus Nonroutable Protocols
Network Layer 3 moves data across multiple networks using routers
Routable – protocols that function at Network layer, such as TCP/IP or IPX/SPX, essential for large-scale networks or enterprise networks
Nonroutable – protocols that do not include Network layer routing capabilities, such as NetBEUI, work well in small network
Consider current size and future expansion possibilities when choosing protocol suite
![Page 27: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/27.jpg)
27
Protocols in a Layered Architecture
Most protocols can be positioned and explained in terms of layers of OSI model
Protocol stacks may have different protocols for each player
See Figure 6-4 for review of functions of each layer of OSI model
See Figure 6-5 for three major protocol types Application protocols at Layers 5-7 Transport protocols at Layer 4 Network protocols at Layers 1-3
![Page 28: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/28.jpg)
28
Functions of OSI Model Layers
![Page 29: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/29.jpg)
29
Three Main Protocol Types
![Page 30: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/30.jpg)
30
Network Protocols
Provide addressing and routing information, error checking, and retransmission requests
Services provided by network protocols are called link services
Popular network protocols include: Internet Protocol (IP) Internetwork Packet Exchange (IPX) and NWLink NetBEUI Delivery Datagram Protocol (DDP) Data Link Control (DLC)
![Page 31: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/31.jpg)
31
Transport Protocols
Handle data delivery between computers May be connectionless or connection-oriented Transport protocols include:
Transmission Control Protocol (TCP) Sequenced Packet Exchange (SPX) and NWLink AppleTalk Transaction Protocol (ATP) and
Name Binding Protocol (NBP) NetBIOS/NetBEUI
![Page 32: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/32.jpg)
32
Application Protocols
Operate at upper layers of OSI model to provide application-to-application service
Some common application protocols are: Simple Mail Transport Protocol (SMTP) File Transfer Protocol (FTP) Simple Network Management Protocol (SNMP) NetWare Core Protocol (NCP) AppleTalk File Protocol (AFP)
![Page 33: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/33.jpg)
33
Common Protocol Suites
TCP/IP NWLink (IPX/SPX) NetBIOS/NetBEUI AppleTalk
DLC XNS DECNet X.25
Combination of protocols that work cooperatively to accomplish network communicationsSome of the most common protocol suites are:
![Page 34: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/34.jpg)
34
Transmission Control Protocol/ Internet Protocol (TCP/IP
Called the Internet Protocol (IP) Most commonly used protocol suite for networking TP/IP used by US Department of Defense’s Advanced
Research Projects Agency (ARPA) Excellent scalability and superior functionality Able to connect different types of computers and networks Default protocol for Novell NetWare, Windows 2000/XP,
and Windows NT See Figure 6-6 for relationship to OSI model
![Page 35: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/35.jpg)
35
TCP/IP Compared to OSI Model
![Page 36: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/36.jpg)
36
TCP/IP
Includes highly compartmentalized and specialized protocols, including: Internet Protocol (IP) – Connectionless Network layer
protocol that provides source and destination routing; fast, but unreliable
Internet Control Message Protocol (ICMP) – Network layer protocol that sends control messages; PING uses ICMP
Address Resolution Protocol (ARP) – Network layer protocol that associates logical (IP) address to physical (MAC) address
![Page 37: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/37.jpg)
37
More TCP/IP Protocols
Transmission Control Protocol (TCP) – primary Internet transport protocol; connection-oriented; provides reliable delivery; fragments and reassembles messages
User Datagram Protocol (UDP) - connectionless Transport layer protocol; fast, unreliable
Domain Name System (DNS) – Session layer name-to-address resolution protocol
File Transfer Protocol (FTP) – performs file transfer, works at Session, Presentation, and Application layers
![Page 38: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/38.jpg)
38
More TCP/IP Protocols
Telnet – remote terminal emulation protocol; operates at three upper layers; provides connectivity through dissimilar systems
Simple Mail Transport Protocol (SMTP) – operates at three upper layers to provide messaging; allows e-mail to travel on Internet
Routing Information Protocol (RIP) – Network layer distance-vector protocol used for routing; not suitable for large networks
Open Shortest Path First (OSPF) – link-state routing protocol; uses variety of factors to determine best path
![Page 39: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/39.jpg)
39
IP Addressing
Logical addresses, 32-bits or 4 bytes long Four octets separated by periods, each with
decimal value from 0-255 First part of address identifies network Second part of address identifies host or
individual computer IP addresses broken into classes Number of IP address registries under control of
Internet Assigned Numbers Authority (IANA)
![Page 40: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/40.jpg)
40
IP Address Classes
Three classes of IP addresses for normal networking: Class A – addresses between 1-126; first octet
identifies network and last three identify host; over 16 million hosts per network
Class B – addresses between 128-191; first two octets identify network and last two identify host; over 65,000 hosts per network
Class C – addresses between 192-223; first three octets identify network and last one identifies host; limited to 254 hosts per network
![Page 41: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/41.jpg)
41
IP Address Classes
Two classes of IP addresses have special purposes: Class D – addresses range from 224-239;
reserved for multicasting; used for videoconferencing and streaming media
Class E – addresses range from 240-255; reserved for experimental use
![Page 42: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/42.jpg)
42
Special Service IP Addresses
Some addresses used for special services: IP addresses beginning with 127 are loopback
addresses; also called localhost
Reserved addresses for private networks include: Class A addresses beginning with 10 Class B addresses from 172.16 to 172.31 Class C addresses from 192.168.0 to 192.168.255
![Page 43: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/43.jpg)
43
IPv6
Current four byte version is IPv4 Now reaching limit of 4-byte addresses
IETF working on new implementation of TCP/IP, designated IPv6 Uses 16 byte addresses Retains backward compatibility with IPv4
4-byte addresses Will provide limitless supply of addresses
![Page 44: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/44.jpg)
44
Classless Inter-Domain Routing (CIDR)
Internet uses CIDR Demarcation between network and host not
always based on octet boundaries May be based on specific number of bits
from beginning of address Called subnetting, the process involves “stealing”
bits from host portion of address for use in network address Provides fewer hosts on each networks but
more networks overall
![Page 45: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/45.jpg)
45
Subnet Masks
Part of IP address identifies network and part identifies host
IP uses subnet mask to determine what part of address identifies network and what part identifies host Network section identified by binary 1 Host section identified by binary 0
![Page 46: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/46.jpg)
46
Subnet Masks
Each class of addresses has default subnet mask Class A default subnet mask is 255.0.0.0 Class B default subnet mask is 255.255.0.0 Class C default subnet mask is 255.255.255.0
All devices on single physical network or network segment must share same network address and use same subnet mask
![Page 47: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/47.jpg)
47
Some Simple Binary Arithmetic
Four kinds of binary calculations: Converting between binary and decimal Converting between decimal and binary Understanding how setting high-order bits to value of 1 in
8-bit binary numbers corresponds to specific decimal numbers
Recognizing decimal values for numbers that correspond to low-order bits when they’re set to value of 1
Keep in mind that any number raised to zero power equals one
![Page 48: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/48.jpg)
48
Converting and Understanding High- and Low- Bit Patterns
Converting Decimal to Binary Divide number by 2 and write down remainder which
must be 1 or 0 Converting Binary to Decimal
Use exponential notation High-Order Bit Patterns
See Table 6-1 Low-Order Bit Patterns
See Table 6-2
![Page 49: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/49.jpg)
49
High-Order Bit Patterns
![Page 50: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/50.jpg)
50
Low-Order Bit Patterns
![Page 51: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/51.jpg)
51
Calculating a Subnet Mask
Follow these steps to build subnet mask: Decide how many subnets you need Add two to number of subnets needed (one for
network address and other for broadcast address). Then jump to next highest power of 2
Reserve bits from top of host portion of address down Be sure enough host addresses to be usable are
left over Use formula 2b – 2 to calculate number of usable
subnets, where b is number of bits in subnet mask
![Page 52: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/52.jpg)
52
Calculating Supernets
Supernetting “steals” bits from network portion of IP address
Supernets permit multiple IP network addresses to be combined and function as a single logical network
Permit more hosts to be assigned on supernet Improves network access efficiency
![Page 53: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/53.jpg)
53
Network Address Translation (NAT)
Allows organization to use private IP addresses while connected to the Internet
Performed by network device such as router that connects to Internet
See Figure 6-7 for example of NAT
![Page 54: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/54.jpg)
54
Network Address Translation (NAT)
![Page 55: The OSI Model 2 Role of a Reference Model](https://reader033.fdocuments.us/reader033/viewer/2022061223/54c5a6584a7959613c8b45cc/html5/thumbnails/55.jpg)
55
Dynamic Host Configuration Protocol (DHCP)
DHCP server receives block of available IP addresses and their subnet masks
When computer needs address, DHCP server selects one from pool of available addresses Address is “leased” to computer for designated length
and may be renewed Can move computers with ease; no need to
reconfigure IP addresses Some systems, such as Web servers, must have
static IP address