SlideShare une entreprise Scribd logo
1  sur  27
Guide to Networking Essentials,
6th
Edition
Chapter 6: Network Reference Models
and Standards
Copyright © 2012 Cengage Learning. All rights reserved. 2
Objectives
2
• Explain the OSI reference model layers and their
relationship to hardware and software
• Explain the IEEE 802 networking model and
related standards
Copyright © 2012 Cengage Learning. All rights reserved. 3
Introducing the OSI and IEEE 802
Networking Models
• Open Systems Interconnection (OSI) reference
model proposed by the International Organization
for Standardization (ISO) has become a key part of
networking because it provides a common
framework for developers and students of
networking to work with and learn from
• OSI model is not specific to any protocol suite and
can be applied to most networking protocols
• OSI model is a seven-layer organization of how
data travels from place to place on any given
network
Copyright © 2012 Cengage Learning. All rights reserved. 4
Role of a Reference Model
• To see the value of a layered model outside the field of
networking, look at this example of a letter being
created, sent, and delivered by the US Postal Service
– The letter has to be written
– The letter has to be placed in an envelope and addressed in the
correct format
– The local post office in the destination town has to sort the letter
correctly for the right part of town
– The local carrier has to deliver the letter to the correct house
– The recipient has to receive the letter, open it, and read it
• A layered approach to a complicated process reduces
its complexity and turns it into a series of
interconnected tasks
Copyright © 2012 Cengage Learning. All rights reserved. 5
Role of a Reference Model
• Each task of the previous example can be handled
separately without affecting the procedures of the
other tasks.
– For example, in the step where the local carrier delivers the
letter to the correct house:
• Let’s say he currently walks on his route, which takes a
considerable amount of time
• He gets an “upgrade” to a delivery truck so that he can perform his
task faster
• As you can see, one part of the process can change but the rest of
the process remains unchanged
Copyright © 2012 Cengage Learning. All rights reserved. 6
Structure of the OSI Model
Copyright © 2012 Cengage Learning. All rights reserved. 7
Structure of the OSI Model
• Each layer in the OSI model has its own set of
well-defined functions
– The functions of each layer communicate and interact with the
layers immediately above and below it
– Example: The Transport layer works with the Network layer
below it and the Session layer above it
• You were introduced to the TCP/IP model in
previous chapters so the next slide will compare
the two models
Copyright © 2012 Cengage Learning. All rights reserved. 8
OSI Model VS TCP/IP Model
Copyright © 2012 Cengage Learning. All rights reserved. 9
Structure of the OSI Model
 Each layer provides services to the next higher layer
until the data reaches the Application layer
 Application layer has the job of providing services to user applications
 Each layer on one computer behaves as though it were
communicating with the same layer on the other
computer
 This is known as peer communication between layers
 Simulation 11 – Peer communication with the OSI
model
Copyright © 2012 Cengage Learning. All rights reserved. 10
Structure of the OSI Model
Copyright © 2012 Cengage Learning. All rights reserved. 11
Structure of the OSI Model
• On data’s way down the protocol stack (model), it is
divided into data units called protocol data units (PDU)
• Some layers add their own formatting to the PDU,
which is called a header (encapsulation)
• When data arrives at the receiving end, it is passed up
the protocol stack
• At each layer, software reads its PDU data and strips its
header information (called deencapsulation) and
passes the PDU to the next higher layer
• When the packet leaves the Application layer, it is in a
format the receiving application can read
Copyright © 2012 Cengage Learning. All rights reserved. 12
Application Layer
• The Application layer (Layer 7) provides a set of
interfaces for applications to access network services
• Components at the Application layer have both a client
component and a server component
• Common protocols found at Layer 7 include HTTP, FTP,
SMB/CIFS, TFTP, and SMTP
• Possible problems at this layer include missing or
misconfigured client or server software and
incompatible or obsolete commands used to
communicate between a client and server
Copyright © 2012 Cengage Learning. All rights reserved. 13
Presentation Layer
• The Presentation layer (Layer 6) handles data
formatting and translation
• For outgoing messages
– Converts data into a format specified by the Application layer
• For incoming messages
– Reverses the conversion if required by the receiving application
• A software component known as a “redirector” operates
at this layer
– Intercepts requests for service from the computer; requests that can’t
be handled locally are redirected across the network to a network
resource that can handle the request
Copyright © 2012 Cengage Learning. All rights reserved. 14
Session Layer
• Session layer (Layer 5) permits two computers to hold
ongoing communications, called a “session”
• This layer handles communication setup ahead of data
transfers and session teardown when the session ends
• Common network functions at this layer:
– Name lookup, user logon and logoff
• Manages the mechanics of ongoing conversations
such as identifying which side can transmit data when
and for how long
• Checkpointing is performed at this layer
– Example: keeping the audio in sync with video
Copyright © 2012 Cengage Learning. All rights reserved. 15
Transport Layer
• The Transport layer (Layer 4) manages data transfer
from one application to another across a network by
breaking data down into smaller chunks called
“segments”
• Segmenting data is important because every
network technology has a maximum frame size
called the maximum transmission unit (MTU)
• Includes flow control and acknowledgments to
ensure reliability
• Handles resequencing segments into the original
data on receipt
Copyright © 2012 Cengage Learning. All rights reserved. 16
Network Layer
• The Network layer (Layer 3) handles logical addressing,
translates logical network addresses (IP addresses) into
physical addresses, and performs best path selection
and routing in an internetwork
• Access control is handled at this layer during the
routing process
– The router consults a list of rules before forwarding an
incoming packet to determine whether a packet meeting certain
criteria should be permitted through
• Software working at this layer include IP, ARP, and
ICMP
• Routers operate at this layer
Copyright © 2012 Cengage Learning. All rights reserved. 17
Data Link Layer
• The Data Link layer (Layer 2) works with frames and is the
intermediary between the Network layer and Physical layer
• Defines how computers access the network medium (also
called media access control)
– MAC address is defined at this layer
• The software component operating at this layer is in the NIC
driver
• Hardware components that operate at this layer include NICs
and switches
• Problems at this layer include collisions and invalid frames
• Simulation 9 – The changing frame header
Copyright © 2012 Cengage Learning. All rights reserved. 18
Physical Layer
• The Physical layer (Layer 1) converts bits into signals
for outgoing messages and signals into bits for
incoming messages
– Wire media uses electrical pulses, fiber-optic uses light pulses and
wireless media uses radio waves
• Details for creating a physical network connection are
specified at this layer
– Example: type of connectors used to attach the medium to the NIC
• Encoding (representing 0s and 1s by a physical signal)
happens at this layer
• Components at this layer include all the cable and
connectors used on the medium, repeaters and hubs
Copyright © 2012 Cengage Learning. All rights reserved. 19
Summary of the OSI Model
Copyright © 2012 Cengage Learning. All rights reserved. 20
IEEE 802 Networking Standards
• The Institute of Electrical and Electronics Engineers
(IEEE) defined LAN standards to ensure that network
interfaces and cabling from multiple manufacturers
would be compatible
– This effort was called Project 802 to indicate the year (1980)
and the month (Feb) of its inception
• IEEE 802 predates the OSI Model
• Most of the standards affect the elements from the
lower two levels of the OSI Model
• Describes how NICs can access and transfer data
across a variety of networking media and what’s
involved in attaching these devices in a network
Copyright © 2012 Cengage Learning. All rights reserved. 21
IEEE 802 Specifications
• The IEEE numbers the collections of 802
documents starting with 802.1, 802.2, etc…
• When a technology is enhanced, each
enhancement is specified by letters after the
number
– For example: 802.3 is the original Ethernet and 802.3u
specifies 100BaseT Ethernet
• The table on the next two slides lists the
major 802 categories
– The 802.3 and 802.11 are the most widely used
technologies as of this point
Copyright © 2012 Cengage Learning. All rights reserved. 22
IEEE 802 Specifications
Standard Name Explanation
802.1 Internetworking Covers routing, bridging, and internetwork communication
802.2 Logical Link Control Covers error control and flow control over data frames (inactive)
802.3 Ethernet LAN Covers all forms of Ethernet media and interfaces, from 10 Mbps to 10 Gbps
(10 Gigabit Ethernet)
802.4 Token Bus LAN Covers all forms of token bus media and interfaces (disbanded)
802.5 Token Ring LAN Covers all forms of token ring media and interfaces
802.6 Metropolitan Area Network Covers MAN technologies, addressing, and services (disbanded)
802.7 Broadband Technical Advisory Group Covers broadband networking media, interfaces, and other equipment
(disbanded)
802.8 Fiber-Optic Technical Advisory Group Covers use of fiber-optic media and technologies for various networking
types (disbanded)
802.9 Integrated Voice/Data Networks Covers integration of voice and data traffic over a single network medium
(disbanded)
802.10 Network Security Covers network access controls, encryption, certification, and other security
topics (disbanded)
Copyright © 2012 Cengage Learning. All rights reserved. 23
IEEE 802 Specifications
802.11 Wireless Networks Sets standards for wireless networking for many different broadcast
frequencies and techniques
802.12 High-Speed Networking Covers a variety of 100 Mbps-plus technologies, including 100VG-AnyLAN
(disbanded)
802.13 Unused
802.14 Cable modems Specifies data transport over cable TV (disbanded)
802.15 Wireless PAN Covers standards for wireless personal area networks
802.16 Wireless MAN (WiMAX) Covers wireless metropolitan area networks
802.17 Resilient Packet Ring Covers emerging standards for very high-speed, ring-based LANs and MANs
802.18 Wireless Advisory Group A technical advisory group that monitors radio-based wireless standards
802.19 Coexistence Advisory Group A group that addresses issues of coexistence with current and developing
standards
802.20 Mobile Broadband Wireless A group working to enable always-on multivendor mobile broadband wireless
access
802.21 Media Independent Handoff A group working to enable handoff between wireless networks of the same or
different types
802.22 Wireless Regional Area Network Working to bring broadband access to hard-to-reach low-population areas
802.23 Emergency Services Working Group A new group (March 2010) working to facilitate civil authority
communication systems
Copyright © 2012 Cengage Learning. All rights reserved. 24
IEEE 802 Extensions to the OSI
Reference Model
• The two lowest layers of the OSI model define how
computers attach to specific network media and specify
how more than one computer can access the network
without causing interference with other computers on
the network
• The IEEE 802 specification expanded the OSI model by
separating the Data Link layer into these sublayers:
– Logical Link Control (LLC) sublayer – controls data-link
communication and defines the use of logical interface points
used to communicate to the upper OSI layers
– Media Access Control (MAC) sublayer – manages access to
the physical medium and communicates with the Physical layer
Copyright © 2012 Cengage Learning. All rights reserved. 25
IEEE Extensions to the OSI Reference
Model
Copyright © 2012 Cengage Learning. All rights reserved. 26
Chapter Summary
• The OSI reference model and IEEE Project 802 define
a frame of reference for networking and specify the
operation of most networking technologies in current
use
• The OSI reference model separates networking into
seven layers, each with its own purposes and activities
• Following is a summary of the OSI Model layer
functions:
– Application: Provides access to network resources
– Presentation: Handles data formatting and translation
– Session: Manages ongoing conversations between two computers
– Transport: Breaks long data streams into smaller chunks (segments)
Copyright © 2012 Cengage Learning. All rights reserved. 27
Chapter Summary
• Summary of OSI Model layer functions (cont.):
– Network: Provides best path selection and IP addressing
– Data Link: Defines how computers access the media
– Physical: Converts bits into signals and defines media and connectors
• The IEEE 802 project defines a set of networking
standards to ensure that network interfaces and cabling
from multiple manufacturers would be compatible. The
IEEE 802.2 standard specifies a Logical Link Control
(LLC) and Media Access Control (MAC) sublayer

Contenu connexe

Tendances

Net essentials6e ch11
Net essentials6e ch11Net essentials6e ch11
Net essentials6e ch11APSU
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7APSU
 
Net essentials6e ch1
Net essentials6e ch1Net essentials6e ch1
Net essentials6e ch1APSU
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10APSU
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9APSU
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemVaughan Olufemi ACIB, AICEN, ANIM
 
Introduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptIntroduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptOsama Yousaf
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communicationsKhan Yousafzai
 
networking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationnetworking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationHerson Franz Ugale
 
Configure and administer server
Configure and administer serverConfigure and administer server
Configure and administer serverAbenezer Abiti
 
A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)Tuan Yang
 
Information system for you Chapter 15
Information system for you Chapter 15Information system for you Chapter 15
Information system for you Chapter 15Chakamru Pak
 
Computer Networking
Computer NetworkingComputer Networking
Computer NetworkingRanjan K.M.
 
Chapter 4 computer network and the internet2
Chapter 4 computer network and the internet2Chapter 4 computer network and the internet2
Chapter 4 computer network and the internet2Melaku Bayih Demessie
 

Tendances (20)

Net essentials6e ch11
Net essentials6e ch11Net essentials6e ch11
Net essentials6e ch11
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7
 
Net essentials6e ch1
Net essentials6e ch1Net essentials6e ch1
Net essentials6e ch1
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
 
Introduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptIntroduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides ppt
 
Chap1
Chap1Chap1
Chap1
 
Ch07
Ch07Ch07
Ch07
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
 
networking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationnetworking hypherlink Group 2 presentation
networking hypherlink Group 2 presentation
 
Configure and administer server
Configure and administer serverConfigure and administer server
Configure and administer server
 
A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)
 
Chapter10
Chapter10Chapter10
Chapter10
 
Information system for you Chapter 15
Information system for you Chapter 15Information system for you Chapter 15
Information system for you Chapter 15
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Ch04
Ch04Ch04
Ch04
 
9781111306366 ppt ch8
9781111306366 ppt ch89781111306366 ppt ch8
9781111306366 ppt ch8
 
Chapter 4 computer network and the internet2
Chapter 4 computer network and the internet2Chapter 4 computer network and the internet2
Chapter 4 computer network and the internet2
 
Ch09
Ch09Ch09
Ch09
 

Similaire à Net essentials6e ch6

7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.Kanishk Raj
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenĐô GiẢn
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenĐô GiẢn
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptmohanravi1986
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcpAgrippa Mungazi
 
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptxKaythry P
 
Computer Network - Introduction to Networks
Computer Network - Introduction to NetworksComputer Network - Introduction to Networks
Computer Network - Introduction to NetworksSwapnil Agrawal
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2Sohail Gohir
 
Ajal 7 osi layers
Ajal 7 osi layersAjal 7 osi layers
Ajal 7 osi layersAJAL A J
 
INTERNET ARCHITECTURE.pptx
INTERNET ARCHITECTURE.pptxINTERNET ARCHITECTURE.pptx
INTERNET ARCHITECTURE.pptxShanthini28
 

Similaire à Net essentials6e ch6 (20)

7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.
 
OSI Reerence Model
OSI Reerence ModelOSI Reerence Model
OSI Reerence Model
 
Iso osi
Iso osiIso osi
Iso osi
 
Iso osi
Iso osiIso osi
Iso osi
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chen
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chen
 
Iso layer detail
Iso layer detailIso layer detail
Iso layer detail
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.ppt
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
class 3
class 3class 3
class 3
 
Clean sw 3_architecture
Clean sw 3_architectureClean sw 3_architecture
Clean sw 3_architecture
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcp
 
Osi31
Osi31Osi31
Osi31
 
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptx
 
Computer Network - Introduction to Networks
Computer Network - Introduction to NetworksComputer Network - Introduction to Networks
Computer Network - Introduction to Networks
 
Pankaj YADAV
Pankaj YADAVPankaj YADAV
Pankaj YADAV
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2
 
Ajal 7 osi layers
Ajal 7 osi layersAjal 7 osi layers
Ajal 7 osi layers
 
INTERNET ARCHITECTURE.pptx
INTERNET ARCHITECTURE.pptxINTERNET ARCHITECTURE.pptx
INTERNET ARCHITECTURE.pptx
 
Lecture 1.pdf
Lecture 1.pdfLecture 1.pdf
Lecture 1.pdf
 

Plus de APSU

Module 2 patient transfers
Module 2 patient transfersModule 2 patient transfers
Module 2 patient transfersAPSU
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9APSU
 
Chapter 9.access to judicial review
Chapter 9.access to judicial reviewChapter 9.access to judicial review
Chapter 9.access to judicial reviewAPSU
 
Chapter 8.administrative agency hearings
Chapter 8.administrative agency hearingsChapter 8.administrative agency hearings
Chapter 8.administrative agency hearingsAPSU
 
Chapter 7.informal proceedings
Chapter 7.informal proceedingsChapter 7.informal proceedings
Chapter 7.informal proceedingsAPSU
 
Chapter 6.investigations and information planning
Chapter 6.investigations and information planningChapter 6.investigations and information planning
Chapter 6.investigations and information planningAPSU
 
Chapter 5.agency rules and regulations(1)
Chapter 5.agency rules and regulations(1)Chapter 5.agency rules and regulations(1)
Chapter 5.agency rules and regulations(1)APSU
 
Chapter 4 pp
Chapter 4 ppChapter 4 pp
Chapter 4 ppAPSU
 
Chapter 3.agency discretion
Chapter 3.agency discretionChapter 3.agency discretion
Chapter 3.agency discretionAPSU
 
Chapter2.development of administrative law
Chapter2.development of administrative lawChapter2.development of administrative law
Chapter2.development of administrative lawAPSU
 
Chapter1.admin law&adminagency
Chapter1.admin law&adminagencyChapter1.admin law&adminagency
Chapter1.admin law&adminagencyAPSU
 
Chapter1
Chapter1Chapter1
Chapter1APSU
 
Logi pp 1
Logi pp 1Logi pp 1
Logi pp 1APSU
 
Unit 1
Unit 1Unit 1
Unit 1APSU
 
Time management
Time managementTime management
Time managementAPSU
 
Research
ResearchResearch
ResearchAPSU
 
21st century learner
21st century learner21st century learner
21st century learnerAPSU
 
21st century learner
21st century learner21st century learner
21st century learnerAPSU
 

Plus de APSU (18)

Module 2 patient transfers
Module 2 patient transfersModule 2 patient transfers
Module 2 patient transfers
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
 
Chapter 9.access to judicial review
Chapter 9.access to judicial reviewChapter 9.access to judicial review
Chapter 9.access to judicial review
 
Chapter 8.administrative agency hearings
Chapter 8.administrative agency hearingsChapter 8.administrative agency hearings
Chapter 8.administrative agency hearings
 
Chapter 7.informal proceedings
Chapter 7.informal proceedingsChapter 7.informal proceedings
Chapter 7.informal proceedings
 
Chapter 6.investigations and information planning
Chapter 6.investigations and information planningChapter 6.investigations and information planning
Chapter 6.investigations and information planning
 
Chapter 5.agency rules and regulations(1)
Chapter 5.agency rules and regulations(1)Chapter 5.agency rules and regulations(1)
Chapter 5.agency rules and regulations(1)
 
Chapter 4 pp
Chapter 4 ppChapter 4 pp
Chapter 4 pp
 
Chapter 3.agency discretion
Chapter 3.agency discretionChapter 3.agency discretion
Chapter 3.agency discretion
 
Chapter2.development of administrative law
Chapter2.development of administrative lawChapter2.development of administrative law
Chapter2.development of administrative law
 
Chapter1.admin law&adminagency
Chapter1.admin law&adminagencyChapter1.admin law&adminagency
Chapter1.admin law&adminagency
 
Chapter1
Chapter1Chapter1
Chapter1
 
Logi pp 1
Logi pp 1Logi pp 1
Logi pp 1
 
Unit 1
Unit 1Unit 1
Unit 1
 
Time management
Time managementTime management
Time management
 
Research
ResearchResearch
Research
 
21st century learner
21st century learner21st century learner
21st century learner
 
21st century learner
21st century learner21st century learner
21st century learner
 

Dernier

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 

Dernier (20)

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 

Net essentials6e ch6

  • 1. Guide to Networking Essentials, 6th Edition Chapter 6: Network Reference Models and Standards
  • 2. Copyright © 2012 Cengage Learning. All rights reserved. 2 Objectives 2 • Explain the OSI reference model layers and their relationship to hardware and software • Explain the IEEE 802 networking model and related standards
  • 3. Copyright © 2012 Cengage Learning. All rights reserved. 3 Introducing the OSI and IEEE 802 Networking Models • Open Systems Interconnection (OSI) reference model proposed by the International Organization for Standardization (ISO) has become a key part of networking because it provides a common framework for developers and students of networking to work with and learn from • OSI model is not specific to any protocol suite and can be applied to most networking protocols • OSI model is a seven-layer organization of how data travels from place to place on any given network
  • 4. Copyright © 2012 Cengage Learning. All rights reserved. 4 Role of a Reference Model • To see the value of a layered model outside the field of networking, look at this example of a letter being created, sent, and delivered by the US Postal Service – The letter has to be written – The letter has to be placed in an envelope and addressed in the correct format – The local post office in the destination town has to sort the letter correctly for the right part of town – The local carrier has to deliver the letter to the correct house – The recipient has to receive the letter, open it, and read it • A layered approach to a complicated process reduces its complexity and turns it into a series of interconnected tasks
  • 5. Copyright © 2012 Cengage Learning. All rights reserved. 5 Role of a Reference Model • Each task of the previous example can be handled separately without affecting the procedures of the other tasks. – For example, in the step where the local carrier delivers the letter to the correct house: • Let’s say he currently walks on his route, which takes a considerable amount of time • He gets an “upgrade” to a delivery truck so that he can perform his task faster • As you can see, one part of the process can change but the rest of the process remains unchanged
  • 6. Copyright © 2012 Cengage Learning. All rights reserved. 6 Structure of the OSI Model
  • 7. Copyright © 2012 Cengage Learning. All rights reserved. 7 Structure of the OSI Model • Each layer in the OSI model has its own set of well-defined functions – The functions of each layer communicate and interact with the layers immediately above and below it – Example: The Transport layer works with the Network layer below it and the Session layer above it • You were introduced to the TCP/IP model in previous chapters so the next slide will compare the two models
  • 8. Copyright © 2012 Cengage Learning. All rights reserved. 8 OSI Model VS TCP/IP Model
  • 9. Copyright © 2012 Cengage Learning. All rights reserved. 9 Structure of the OSI Model  Each layer provides services to the next higher layer until the data reaches the Application layer  Application layer has the job of providing services to user applications  Each layer on one computer behaves as though it were communicating with the same layer on the other computer  This is known as peer communication between layers  Simulation 11 – Peer communication with the OSI model
  • 10. Copyright © 2012 Cengage Learning. All rights reserved. 10 Structure of the OSI Model
  • 11. Copyright © 2012 Cengage Learning. All rights reserved. 11 Structure of the OSI Model • On data’s way down the protocol stack (model), it is divided into data units called protocol data units (PDU) • Some layers add their own formatting to the PDU, which is called a header (encapsulation) • When data arrives at the receiving end, it is passed up the protocol stack • At each layer, software reads its PDU data and strips its header information (called deencapsulation) and passes the PDU to the next higher layer • When the packet leaves the Application layer, it is in a format the receiving application can read
  • 12. Copyright © 2012 Cengage Learning. All rights reserved. 12 Application Layer • The Application layer (Layer 7) provides a set of interfaces for applications to access network services • Components at the Application layer have both a client component and a server component • Common protocols found at Layer 7 include HTTP, FTP, SMB/CIFS, TFTP, and SMTP • Possible problems at this layer include missing or misconfigured client or server software and incompatible or obsolete commands used to communicate between a client and server
  • 13. Copyright © 2012 Cengage Learning. All rights reserved. 13 Presentation Layer • The Presentation layer (Layer 6) handles data formatting and translation • For outgoing messages – Converts data into a format specified by the Application layer • For incoming messages – Reverses the conversion if required by the receiving application • A software component known as a “redirector” operates at this layer – Intercepts requests for service from the computer; requests that can’t be handled locally are redirected across the network to a network resource that can handle the request
  • 14. Copyright © 2012 Cengage Learning. All rights reserved. 14 Session Layer • Session layer (Layer 5) permits two computers to hold ongoing communications, called a “session” • This layer handles communication setup ahead of data transfers and session teardown when the session ends • Common network functions at this layer: – Name lookup, user logon and logoff • Manages the mechanics of ongoing conversations such as identifying which side can transmit data when and for how long • Checkpointing is performed at this layer – Example: keeping the audio in sync with video
  • 15. Copyright © 2012 Cengage Learning. All rights reserved. 15 Transport Layer • The Transport layer (Layer 4) manages data transfer from one application to another across a network by breaking data down into smaller chunks called “segments” • Segmenting data is important because every network technology has a maximum frame size called the maximum transmission unit (MTU) • Includes flow control and acknowledgments to ensure reliability • Handles resequencing segments into the original data on receipt
  • 16. Copyright © 2012 Cengage Learning. All rights reserved. 16 Network Layer • The Network layer (Layer 3) handles logical addressing, translates logical network addresses (IP addresses) into physical addresses, and performs best path selection and routing in an internetwork • Access control is handled at this layer during the routing process – The router consults a list of rules before forwarding an incoming packet to determine whether a packet meeting certain criteria should be permitted through • Software working at this layer include IP, ARP, and ICMP • Routers operate at this layer
  • 17. Copyright © 2012 Cengage Learning. All rights reserved. 17 Data Link Layer • The Data Link layer (Layer 2) works with frames and is the intermediary between the Network layer and Physical layer • Defines how computers access the network medium (also called media access control) – MAC address is defined at this layer • The software component operating at this layer is in the NIC driver • Hardware components that operate at this layer include NICs and switches • Problems at this layer include collisions and invalid frames • Simulation 9 – The changing frame header
  • 18. Copyright © 2012 Cengage Learning. All rights reserved. 18 Physical Layer • The Physical layer (Layer 1) converts bits into signals for outgoing messages and signals into bits for incoming messages – Wire media uses electrical pulses, fiber-optic uses light pulses and wireless media uses radio waves • Details for creating a physical network connection are specified at this layer – Example: type of connectors used to attach the medium to the NIC • Encoding (representing 0s and 1s by a physical signal) happens at this layer • Components at this layer include all the cable and connectors used on the medium, repeaters and hubs
  • 19. Copyright © 2012 Cengage Learning. All rights reserved. 19 Summary of the OSI Model
  • 20. Copyright © 2012 Cengage Learning. All rights reserved. 20 IEEE 802 Networking Standards • The Institute of Electrical and Electronics Engineers (IEEE) defined LAN standards to ensure that network interfaces and cabling from multiple manufacturers would be compatible – This effort was called Project 802 to indicate the year (1980) and the month (Feb) of its inception • IEEE 802 predates the OSI Model • Most of the standards affect the elements from the lower two levels of the OSI Model • Describes how NICs can access and transfer data across a variety of networking media and what’s involved in attaching these devices in a network
  • 21. Copyright © 2012 Cengage Learning. All rights reserved. 21 IEEE 802 Specifications • The IEEE numbers the collections of 802 documents starting with 802.1, 802.2, etc… • When a technology is enhanced, each enhancement is specified by letters after the number – For example: 802.3 is the original Ethernet and 802.3u specifies 100BaseT Ethernet • The table on the next two slides lists the major 802 categories – The 802.3 and 802.11 are the most widely used technologies as of this point
  • 22. Copyright © 2012 Cengage Learning. All rights reserved. 22 IEEE 802 Specifications Standard Name Explanation 802.1 Internetworking Covers routing, bridging, and internetwork communication 802.2 Logical Link Control Covers error control and flow control over data frames (inactive) 802.3 Ethernet LAN Covers all forms of Ethernet media and interfaces, from 10 Mbps to 10 Gbps (10 Gigabit Ethernet) 802.4 Token Bus LAN Covers all forms of token bus media and interfaces (disbanded) 802.5 Token Ring LAN Covers all forms of token ring media and interfaces 802.6 Metropolitan Area Network Covers MAN technologies, addressing, and services (disbanded) 802.7 Broadband Technical Advisory Group Covers broadband networking media, interfaces, and other equipment (disbanded) 802.8 Fiber-Optic Technical Advisory Group Covers use of fiber-optic media and technologies for various networking types (disbanded) 802.9 Integrated Voice/Data Networks Covers integration of voice and data traffic over a single network medium (disbanded) 802.10 Network Security Covers network access controls, encryption, certification, and other security topics (disbanded)
  • 23. Copyright © 2012 Cengage Learning. All rights reserved. 23 IEEE 802 Specifications 802.11 Wireless Networks Sets standards for wireless networking for many different broadcast frequencies and techniques 802.12 High-Speed Networking Covers a variety of 100 Mbps-plus technologies, including 100VG-AnyLAN (disbanded) 802.13 Unused 802.14 Cable modems Specifies data transport over cable TV (disbanded) 802.15 Wireless PAN Covers standards for wireless personal area networks 802.16 Wireless MAN (WiMAX) Covers wireless metropolitan area networks 802.17 Resilient Packet Ring Covers emerging standards for very high-speed, ring-based LANs and MANs 802.18 Wireless Advisory Group A technical advisory group that monitors radio-based wireless standards 802.19 Coexistence Advisory Group A group that addresses issues of coexistence with current and developing standards 802.20 Mobile Broadband Wireless A group working to enable always-on multivendor mobile broadband wireless access 802.21 Media Independent Handoff A group working to enable handoff between wireless networks of the same or different types 802.22 Wireless Regional Area Network Working to bring broadband access to hard-to-reach low-population areas 802.23 Emergency Services Working Group A new group (March 2010) working to facilitate civil authority communication systems
  • 24. Copyright © 2012 Cengage Learning. All rights reserved. 24 IEEE 802 Extensions to the OSI Reference Model • The two lowest layers of the OSI model define how computers attach to specific network media and specify how more than one computer can access the network without causing interference with other computers on the network • The IEEE 802 specification expanded the OSI model by separating the Data Link layer into these sublayers: – Logical Link Control (LLC) sublayer – controls data-link communication and defines the use of logical interface points used to communicate to the upper OSI layers – Media Access Control (MAC) sublayer – manages access to the physical medium and communicates with the Physical layer
  • 25. Copyright © 2012 Cengage Learning. All rights reserved. 25 IEEE Extensions to the OSI Reference Model
  • 26. Copyright © 2012 Cengage Learning. All rights reserved. 26 Chapter Summary • The OSI reference model and IEEE Project 802 define a frame of reference for networking and specify the operation of most networking technologies in current use • The OSI reference model separates networking into seven layers, each with its own purposes and activities • Following is a summary of the OSI Model layer functions: – Application: Provides access to network resources – Presentation: Handles data formatting and translation – Session: Manages ongoing conversations between two computers – Transport: Breaks long data streams into smaller chunks (segments)
  • 27. Copyright © 2012 Cengage Learning. All rights reserved. 27 Chapter Summary • Summary of OSI Model layer functions (cont.): – Network: Provides best path selection and IP addressing – Data Link: Defines how computers access the media – Physical: Converts bits into signals and defines media and connectors • The IEEE 802 project defines a set of networking standards to ensure that network interfaces and cabling from multiple manufacturers would be compatible. The IEEE 802.2 standard specifies a Logical Link Control (LLC) and Media Access Control (MAC) sublayer