SlideShare a Scribd company logo
1 of 79
Building a Network with the
        OSI Model




         Chapter 2
Objectives
• Describe models such as the OSI seven-layer
  model
• Explain the major functions of network
  hardware with OSI Layers 1-2
• Describe the functions of network software
  with OSI Layers 3-7
Overview
The CompTIA Network+ Challenge
• Understand every aspect of networking
  – Use the Open Systems Interconnect (OSI)
    model
  – Conceptualize the parts of a network
• The OSI Seven-Layer Model provides
  – A powerful tool for diagnosing
    problems
  – A common language to describe
    networks
Figure 2.1 Using the OSI terminology – Layer 3 –
in a typical setup screen
Working with Models
Biography of a Model
• What does “model” mean to you?
  – Computer models that predict weather
  – Plastic model airplane
  – Fashion model




                Figure 2.2 Types of Models
A model has all the major
functions of the real item




   Figure 2.3 Simple model airplane
The OSI seven-layer model
• What functions define all networks?
• What details can be omitted?
• ISO (International Organization for
  Standardization) proposed the OSI
  seven-layer model
Layer 7 - Application


  The Seven        Layer 6 - Presentation


Layers in Action     Layer 5 - Session

                    Layer 4 - Transport

                     Layer 3 - Network
  The OSI Model
                    Layer 2 - Data Link

                     Layer 1 - Physical
Welcome to MHTechEd!
A conceptual viewpoint
of networking
  – One of the workers has
    just completed a new
    employee handbook
  – She needs to transfer
    the Word document to     Figure 2.4 Janelle and Tiffany,
    the other worker for     hard at work
    review
She could…
• Copy the file to a flash drive and walk it
  over to the other person (sneakernet)
• Transfer the file using the network
Let’s Get Physical…
and examine the network hardware
components required for this transfer
Cabling
• Most networks use a cable,
  like this one, as a physical
  channel to move the bits of
  data

  Unshielded Twisted Pair
       (UTP) cable


                                 Figure 2.5 UTP cabling
Hubs
• Each computer system has
  a cable leading to a device
  called a hub
   – Usually located in a closet
• The hub sends the data
  received from one system
  to all the other systems
  attached to it
                                   Figure 2.6 Typical hub
Figure 2.7 The network so far, with the Physical layer
hardware
Network Interface Cards
• Network Interface Cards
  (NICs) are installed in
  PCs
• Network cables attach
  to the NICs

                            Figure 2.8 Typical NIC
NIC to Hub Connections
• Cables run from the NIC
  in the PC to a jack on
  the wall
• Cables run through the
  walls to the closet
  where they connect to
  a hub

                            Figure 2.9 NIC with cable
                            connect-ing the PC to the wall jack
Network Cabling System




    Figure 2.10 The MHTechEd network
The NIC                              MAC address printed on
                                      surface of chip – and burned
                                            inside the chip.
• Each system must
  have a unique
  identifier
• Media Access Control
  (MAC) address
  – A unique address burned
    into a ROM chip on the
    network card
  – Each MAC address is 12
    hex characters or 48 bits in
    length

                                   Figure 2.11 MAC address
MAC Addresses
• MAC addresses are 48-bits long
• Usually represented using hexadecimal characters
  (12 hex digits = 48 bits)
   – A typical MAC address:
             004005-607D49


Organizationally unique      Device ID
    identifier (OUI)

            No two MAC addresses are ever the same!
ipconfig /all


                                       MAC address




Figure 2.12 Output from IPCONFIG/ALL
Moving Data



Figure 2.13 Data moving along a wire
Moving Data




Figure 2-14: Oscilloscope of data
Moving Data




Figure 2.15 Data as ones and zeroes
Frames




Figure 2-16 Inside the NIC
Inside a frame
• Frames are made up of fields that contain
  information
• Frames contain the recipient’s MAC address, the
  sender’s MAC address, the data itself, and a cyclic
  redundancy check (CRC) for error checking



              Figure 2.17 Generic frame
Frame as a canister




   Figure 2.18 Frame as a canister
Frame Size
• Different networks use different sizes of
  frames
• Many frames hold about 1500 bytes of data
• The sending software breaks up large
  amounts of data into smaller chunks
• The receiving station must then put the
  chunks back together in the proper order
Processing Frames
• All devices on the network see the frame,
  but only the device that it is addressed to
  will process it
  – Every frame is received by every NIC
  – The MAC address is used to decide if the frame
    belongs to a given device
Getting Data on the Line
• Since the cable is shared, only one
  system may speak at a time
• Processes are used to keep two NICs
  from talking at the same time
Incoming Frame!




 Figure 2.19 Incoming frame!
Getting To Know You
• Usually two devices have talked before, so
  the destination MAC address is already
  known
• If the MAC address is not known, a broadcast
  message is sent over the network
  – The destination device will respond by sending
    its MAC address
  – A MAC broadcast address is FF-FF-FF-FF-FF-FF
Figure 2.20 Building the frame
Figure 2.21 Adding the data and CRC to the frame
Figure 2.22 Sending the frame
Figure 2.23 Reading an incoming frame
After the frame is received
• The receiving station checks the CRC value in
  the frame
  – If the value matches what it should, then the NIC
    sends the data portion to the network operating
    system for processing
  – If the value does not match, the frame has errors and
    must be resent
The Two Aspects
    of NICs




   Figure 2.24 Layer 1 and Layer 2 are now properly
                 applied to the network
Figure 2.25 LLC and MAC, the two parts of the Data Link Layer
Beyond the Single Wire –
   Network Software
    and Layers 3 – 7
Subnets




Figure 2.26 Large LAN complete (left),
   and broken into two subnets (right)
Network Protocols
• Network protocols define rules for how systems
  are addressed, how to chop data up into chunks,
  how to deal with routers, and so on
• As a network grows, a more universal address-
  ing method than MAC addresses is needed
• TCP/IP:
  – Transmission Control Protocol (TCP)
  – Internet Protocol (IP)
IP – Playing on Layer 3, the Network Layer
  • IP address: a unique numeric identifier
  • An IP address is a logical address while a
    MAC address is a physical address
  • IP uses a dotted-decimal notation
  • Each 8-bit number ranges from 0 to 255
    – Example: 192.168.4.232
  • No two systems on the same network share
    the same IP address
• Routers are used to
  chop large networks up
  into smaller ones
• Routers forward packets
  by logical address
• An IP router (most
  common) forwards IP
  packets
• Works at Layer 3, the
  Network layer


                            Figure 2.27 Typical small router
Figure 2.28 MHTechEd addressing
Figure 2.29 Router added to the OSI model for the network
Frames (packets) within Frames
  • Network software creates a packet that
    contains the sending and receiving IP
    addresses along with the data




             Figure 2.30 IP packet
Figure 2.31 IP packet in a frame (as a canister)
• The packet is enclosed within a frame that
  contains the sending and receiving MAC
  addresses
                      IP packet in a frame




           Figure 2.32 IP packet in a frame
Connecting to the Internet
• A router connects a local network to the Internet
• The local hub is connected to the router
• The router is connected to the Internet through a
  cable or phone line
• The cable or phone line uses a different kind of
  frame, so the router strips the frame and creates
  a new one
Figure 2.33 Adding a router to the network
Connecting
to the Internet




              Figure 2.34 Router removing network frame
                 and adding one for the cable line
Figure 2.35 Router in action (notice addresses)
• The router replaces the MAC address with the type
  of address used by the cable or phone company
• The frame uses the IP address to guide it to the
  receiving system
• The receiving router strips off the cable or phone
  company frame and adds the MAC address for the
  receiving system
• The NIC strips off the MAC header and hands the
  frame off to the NOS
Assembly and Disassembly – Layer 4,
   the Transport Layer
• Most data is much larger than a single frame
• Network protocols chop up the data into smaller
  packets, and give each one a sequence number
• The sequence numbers are used by the receiving system
  to put the packets back in order, and to assemble them
• This compares to the numbering of boxes by UPS
Figure 2.36 Labeling the boxes
• Transport layer is the assembler/disassembler
• Transport layer also initializes requests for packets
  that weren’t received in good order
Figure 2.37 OSI updated
Talking on a Network – Layer 5,
            the Session Layer
• One system may be talking to many other
  systems simultaneously
• The software that handles these processes is
  called session software, working at Layer 5
Figure 2.38 Handling multiple inputs
Figure 2.39 Each request becomes a session
Figure 2.40 OSI updated
Standardized Formats – or Why Layer 6,
       Presentation, Has No Friends

• Presentation layer tasks solved an old problem
• Macintoshes and PCs use very different formats
• Standardized formats have been created that
  allow very different operating systems to
  exchange data
Figure 2.41 Different data formats were
   often unreadable between systems
Figure 2.42 Everyone recognized PDF files!
Figure 2.43 OSI updated
Network Applications – Layer 7,
        the Application Layer
• Users use Application layer network applications
  to exchange data on a network
   – Network in Windows Vista (My Network Places in
     earlier Windows)
   – Web browser like Internet Explorer or Netscape
     Navigator
   – Outlook Express for e-mail
• All operating systems have APIs at the Application
  layer for network-aware applications
Figure 2.44 Network applications at work
Figure 2.45 OSI updated
How Tiffany Gets Her Document

• The next few slides illustrate a typical process
  that takes place to copy a file from one machine
  to another over a network
Figure 2.46 Network application showing computers
              on the MHTechEd network
Figure 2.47 Copying the Word document
Figure 2.48 Chopping the Word document
Figure 2.49 Creating and addressing packets
Figure 2.50 Creating frames
Figure 2.51 Tiffany’s system grabbing a frame
• The OSI seven-layer model is a troubleshooting
  tool
• Example: Jane can’t print to the networked
  printer
  – Layer 1 and 2: NIC shows activity?
  – Layer 3: Does computer have a proper IP
    address?
  – Move up through the layers to discover problem
    area

More Related Content

What's hot

Computer network switching
Computer network switchingComputer network switching
Computer network switchingShivani Godha
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUSiddharaj Junnarkar
 
Chapter1 computer introduction note
Chapter1  computer introduction note Chapter1  computer introduction note
Chapter1 computer introduction note arvind pandey
 
Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)VrundaBhavsar
 
Cisco packet tracer router
Cisco packet tracer  routerCisco packet tracer  router
Cisco packet tracer routerrishi ram khanal
 
Data Representation in Data Communication (1).pptx
Data Representation in Data Communication (1).pptxData Representation in Data Communication (1).pptx
Data Representation in Data Communication (1).pptxmoviebro1
 
Chapter 1 introduction to computer networks
Chapter 1 introduction to computer networksChapter 1 introduction to computer networks
Chapter 1 introduction to computer networksViku1985
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer networkTrinity Dwarka
 
Networking Slides
Networking SlidesNetworking Slides
Networking Slidesiarthur
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & NetworkMaulen Bale
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masksswascher
 
wired and wireless networks
wired and wireless networkswired and wireless networks
wired and wireless networksKavitha Ravi
 

What's hot (20)

Packet tracer
Packet tracerPacket tracer
Packet tracer
 
Subnetting
SubnettingSubnetting
Subnetting
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTU
 
Chapter1 computer introduction note
Chapter1  computer introduction note Chapter1  computer introduction note
Chapter1 computer introduction note
 
Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)
 
MAC & IP addresses
MAC & IP addressesMAC & IP addresses
MAC & IP addresses
 
Cisco packet tracer router
Cisco packet tracer  routerCisco packet tracer  router
Cisco packet tracer router
 
Pan seminar
Pan seminarPan seminar
Pan seminar
 
Data Representation in Data Communication (1).pptx
Data Representation in Data Communication (1).pptxData Representation in Data Communication (1).pptx
Data Representation in Data Communication (1).pptx
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Chapter 1 introduction to computer networks
Chapter 1 introduction to computer networksChapter 1 introduction to computer networks
Chapter 1 introduction to computer networks
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
 
Networking Slides
Networking SlidesNetworking Slides
Networking Slides
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
wired and wireless networks
wired and wireless networkswired and wireless networks
wired and wireless networks
 
Chap 16 bootp & dhcp
Chap 16 bootp & dhcpChap 16 bootp & dhcp
Chap 16 bootp & dhcp
 

Viewers also liked

Networking Chapter 8
Networking Chapter 8Networking Chapter 8
Networking Chapter 8mlrbrown
 
Chapter_2_CCNA2
Chapter_2_CCNA2Chapter_2_CCNA2
Chapter_2_CCNA2sunabozu
 
Complete Osi Model Explained
Complete Osi Model ExplainedComplete Osi Model Explained
Complete Osi Model ExplainedVivek chan
 
LTM essentials
LTM essentialsLTM essentials
LTM essentialsbharadwajv
 
Chapter 06 - Static Routing
Chapter 06 - Static RoutingChapter 06 - Static Routing
Chapter 06 - Static RoutingYaser Rahmati
 
F5 study guide
F5 study guideF5 study guide
F5 study guideshimera123
 
Physical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and DevicesPhysical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and DevicesShahid Khan
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocolselvakumar_b1985
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
Step by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet TracerStep by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet TracerSorath Asnani
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers1000 Ccna Questions And Answers
1000 Ccna Questions And AnswersCCNAResources
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1CAVC
 
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1   configuring basic routing and switching (with answer) Lab practice 1   configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer) Arz Sy
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configurationyasir1122
 
Routing Information Protocol (RIP)
Routing Information Protocol(RIP)Routing Information Protocol(RIP)
Routing Information Protocol (RIP)waqasahmad1995
 

Viewers also liked (20)

Networking Chapter 8
Networking Chapter 8Networking Chapter 8
Networking Chapter 8
 
Chapter_2_CCNA2
Chapter_2_CCNA2Chapter_2_CCNA2
Chapter_2_CCNA2
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Complete Osi Model Explained
Complete Osi Model ExplainedComplete Osi Model Explained
Complete Osi Model Explained
 
LTM essentials
LTM essentialsLTM essentials
LTM essentials
 
Chapter 06 - Static Routing
Chapter 06 - Static RoutingChapter 06 - Static Routing
Chapter 06 - Static Routing
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
F5 study guide
F5 study guideF5 study guide
F5 study guide
 
Physical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and DevicesPhysical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and Devices
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Step by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet TracerStep by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet Tracer
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers1000 Ccna Questions And Answers
1000 Ccna Questions And Answers
 
Presentation on router
Presentation on routerPresentation on router
Presentation on router
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
 
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1   configuring basic routing and switching (with answer) Lab practice 1   configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer)
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
 
Routing Information Protocol (RIP)
Routing Information Protocol(RIP)Routing Information Protocol(RIP)
Routing Information Protocol (RIP)
 

Similar to OSI Model Networking Layers

Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Travis Leong Ping
 
Communication using network
Communication using networkCommunication using network
Communication using networkOnline
 
CS101- Introduction to Computing- Lecture 27
CS101- Introduction to Computing- Lecture 27CS101- Introduction to Computing- Lecture 27
CS101- Introduction to Computing- Lecture 27Bilal Ahmed
 
Networking (CCNA 1st Chapter)
Networking (CCNA 1st Chapter)Networking (CCNA 1st Chapter)
Networking (CCNA 1st Chapter)Yasir Bashir
 
Explaination of Computer Network start to end
Explaination of Computer Network start to endExplaination of Computer Network start to end
Explaination of Computer Network start to endRanaJunaid48
 
ccna is the best certification in the industry
ccna is the best certification in the industryccna is the best certification in the industry
ccna is the best certification in the industryArifAhmad647254
 
Unit 1
Unit 1Unit 1
Unit 1sasi
 
Internetworking fundamentals(networking)
Internetworking fundamentals(networking)Internetworking fundamentals(networking)
Internetworking fundamentals(networking)welcometofacebook
 
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptxKaythry P
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49myrajendra
 
Basics concept of network and internet mansi
Basics concept of network and internet   mansiBasics concept of network and internet   mansi
Basics concept of network and internet mansiMansiGupta298
 

Similar to OSI Model Networking Layers (20)

Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013
 
Communication using network
Communication using networkCommunication using network
Communication using network
 
lecture 2.pptx
lecture 2.pptxlecture 2.pptx
lecture 2.pptx
 
CS101- Introduction to Computing- Lecture 27
CS101- Introduction to Computing- Lecture 27CS101- Introduction to Computing- Lecture 27
CS101- Introduction to Computing- Lecture 27
 
Understanding local area networking
Understanding local area networkingUnderstanding local area networking
Understanding local area networking
 
MVA slides lesson 1
MVA slides lesson 1MVA slides lesson 1
MVA slides lesson 1
 
Networking (CCNA 1st Chapter)
Networking (CCNA 1st Chapter)Networking (CCNA 1st Chapter)
Networking (CCNA 1st Chapter)
 
Chapter1ccna
Chapter1ccnaChapter1ccna
Chapter1ccna
 
Explaination of Computer Network start to end
Explaination of Computer Network start to endExplaination of Computer Network start to end
Explaination of Computer Network start to end
 
ccna is the best certification in the industry
ccna is the best certification in the industryccna is the best certification in the industry
ccna is the best certification in the industry
 
Unit 1
Unit 1Unit 1
Unit 1
 
Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
 
Internetworking fundamentals(networking)
Internetworking fundamentals(networking)Internetworking fundamentals(networking)
Internetworking fundamentals(networking)
 
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptx
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49
 
Basics concept of network and internet mansi
Basics concept of network and internet   mansiBasics concept of network and internet   mansi
Basics concept of network and internet mansi
 
chapter_1.pdf
chapter_1.pdfchapter_1.pdf
chapter_1.pdf
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 

More from mlrbrown

Cso gaddis java_chapter15
Cso gaddis java_chapter15Cso gaddis java_chapter15
Cso gaddis java_chapter15mlrbrown
 
Cso gaddis java_chapter14
Cso gaddis java_chapter14Cso gaddis java_chapter14
Cso gaddis java_chapter14mlrbrown
 
Cso gaddis java_chapter13
Cso gaddis java_chapter13Cso gaddis java_chapter13
Cso gaddis java_chapter13mlrbrown
 
Cso gaddis java_chapter12
Cso gaddis java_chapter12Cso gaddis java_chapter12
Cso gaddis java_chapter12mlrbrown
 
Cso gaddis java_chapter11
Cso gaddis java_chapter11Cso gaddis java_chapter11
Cso gaddis java_chapter11mlrbrown
 
Cso gaddis java_chapter10
Cso gaddis java_chapter10Cso gaddis java_chapter10
Cso gaddis java_chapter10mlrbrown
 
Cso gaddis java_chapter9ppt
Cso gaddis java_chapter9pptCso gaddis java_chapter9ppt
Cso gaddis java_chapter9pptmlrbrown
 
Cso gaddis java_chapter8
Cso gaddis java_chapter8Cso gaddis java_chapter8
Cso gaddis java_chapter8mlrbrown
 
Cso gaddis java_chapter7
Cso gaddis java_chapter7Cso gaddis java_chapter7
Cso gaddis java_chapter7mlrbrown
 
Cso gaddis java_chapter6
Cso gaddis java_chapter6Cso gaddis java_chapter6
Cso gaddis java_chapter6mlrbrown
 
Cso gaddis java_chapter5
Cso gaddis java_chapter5Cso gaddis java_chapter5
Cso gaddis java_chapter5mlrbrown
 
Cso gaddis java_chapter4
Cso gaddis java_chapter4Cso gaddis java_chapter4
Cso gaddis java_chapter4mlrbrown
 
Cso gaddis java_chapter3
Cso gaddis java_chapter3Cso gaddis java_chapter3
Cso gaddis java_chapter3mlrbrown
 
Cso gaddis java_chapter2
Cso gaddis java_chapter2Cso gaddis java_chapter2
Cso gaddis java_chapter2mlrbrown
 
Cso gaddis java_chapter1
Cso gaddis java_chapter1Cso gaddis java_chapter1
Cso gaddis java_chapter1mlrbrown
 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16mlrbrown
 
Networking Chapter 15
Networking Chapter 15Networking Chapter 15
Networking Chapter 15mlrbrown
 
Networking Chapter 14
Networking Chapter 14Networking Chapter 14
Networking Chapter 14mlrbrown
 
Networking Chapter 13
Networking Chapter 13Networking Chapter 13
Networking Chapter 13mlrbrown
 
Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12mlrbrown
 

More from mlrbrown (20)

Cso gaddis java_chapter15
Cso gaddis java_chapter15Cso gaddis java_chapter15
Cso gaddis java_chapter15
 
Cso gaddis java_chapter14
Cso gaddis java_chapter14Cso gaddis java_chapter14
Cso gaddis java_chapter14
 
Cso gaddis java_chapter13
Cso gaddis java_chapter13Cso gaddis java_chapter13
Cso gaddis java_chapter13
 
Cso gaddis java_chapter12
Cso gaddis java_chapter12Cso gaddis java_chapter12
Cso gaddis java_chapter12
 
Cso gaddis java_chapter11
Cso gaddis java_chapter11Cso gaddis java_chapter11
Cso gaddis java_chapter11
 
Cso gaddis java_chapter10
Cso gaddis java_chapter10Cso gaddis java_chapter10
Cso gaddis java_chapter10
 
Cso gaddis java_chapter9ppt
Cso gaddis java_chapter9pptCso gaddis java_chapter9ppt
Cso gaddis java_chapter9ppt
 
Cso gaddis java_chapter8
Cso gaddis java_chapter8Cso gaddis java_chapter8
Cso gaddis java_chapter8
 
Cso gaddis java_chapter7
Cso gaddis java_chapter7Cso gaddis java_chapter7
Cso gaddis java_chapter7
 
Cso gaddis java_chapter6
Cso gaddis java_chapter6Cso gaddis java_chapter6
Cso gaddis java_chapter6
 
Cso gaddis java_chapter5
Cso gaddis java_chapter5Cso gaddis java_chapter5
Cso gaddis java_chapter5
 
Cso gaddis java_chapter4
Cso gaddis java_chapter4Cso gaddis java_chapter4
Cso gaddis java_chapter4
 
Cso gaddis java_chapter3
Cso gaddis java_chapter3Cso gaddis java_chapter3
Cso gaddis java_chapter3
 
Cso gaddis java_chapter2
Cso gaddis java_chapter2Cso gaddis java_chapter2
Cso gaddis java_chapter2
 
Cso gaddis java_chapter1
Cso gaddis java_chapter1Cso gaddis java_chapter1
Cso gaddis java_chapter1
 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16
 
Networking Chapter 15
Networking Chapter 15Networking Chapter 15
Networking Chapter 15
 
Networking Chapter 14
Networking Chapter 14Networking Chapter 14
Networking Chapter 14
 
Networking Chapter 13
Networking Chapter 13Networking Chapter 13
Networking Chapter 13
 
Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12
 

Recently uploaded

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 

Recently uploaded (20)

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 

OSI Model Networking Layers

  • 1. Building a Network with the OSI Model Chapter 2
  • 2. Objectives • Describe models such as the OSI seven-layer model • Explain the major functions of network hardware with OSI Layers 1-2 • Describe the functions of network software with OSI Layers 3-7
  • 4. The CompTIA Network+ Challenge • Understand every aspect of networking – Use the Open Systems Interconnect (OSI) model – Conceptualize the parts of a network
  • 5. • The OSI Seven-Layer Model provides – A powerful tool for diagnosing problems – A common language to describe networks
  • 6. Figure 2.1 Using the OSI terminology – Layer 3 – in a typical setup screen
  • 8. Biography of a Model • What does “model” mean to you? – Computer models that predict weather – Plastic model airplane – Fashion model Figure 2.2 Types of Models
  • 9. A model has all the major functions of the real item Figure 2.3 Simple model airplane
  • 10. The OSI seven-layer model • What functions define all networks? • What details can be omitted? • ISO (International Organization for Standardization) proposed the OSI seven-layer model
  • 11. Layer 7 - Application The Seven Layer 6 - Presentation Layers in Action Layer 5 - Session Layer 4 - Transport Layer 3 - Network The OSI Model Layer 2 - Data Link Layer 1 - Physical
  • 12. Welcome to MHTechEd! A conceptual viewpoint of networking – One of the workers has just completed a new employee handbook – She needs to transfer the Word document to Figure 2.4 Janelle and Tiffany, the other worker for hard at work review
  • 13. She could… • Copy the file to a flash drive and walk it over to the other person (sneakernet) • Transfer the file using the network
  • 14. Let’s Get Physical… and examine the network hardware components required for this transfer
  • 15. Cabling • Most networks use a cable, like this one, as a physical channel to move the bits of data Unshielded Twisted Pair (UTP) cable Figure 2.5 UTP cabling
  • 16. Hubs • Each computer system has a cable leading to a device called a hub – Usually located in a closet • The hub sends the data received from one system to all the other systems attached to it Figure 2.6 Typical hub
  • 17. Figure 2.7 The network so far, with the Physical layer hardware
  • 18. Network Interface Cards • Network Interface Cards (NICs) are installed in PCs • Network cables attach to the NICs Figure 2.8 Typical NIC
  • 19. NIC to Hub Connections • Cables run from the NIC in the PC to a jack on the wall • Cables run through the walls to the closet where they connect to a hub Figure 2.9 NIC with cable connect-ing the PC to the wall jack
  • 20. Network Cabling System Figure 2.10 The MHTechEd network
  • 21. The NIC MAC address printed on surface of chip – and burned inside the chip. • Each system must have a unique identifier • Media Access Control (MAC) address – A unique address burned into a ROM chip on the network card – Each MAC address is 12 hex characters or 48 bits in length Figure 2.11 MAC address
  • 22. MAC Addresses • MAC addresses are 48-bits long • Usually represented using hexadecimal characters (12 hex digits = 48 bits) – A typical MAC address: 004005-607D49 Organizationally unique Device ID identifier (OUI) No two MAC addresses are ever the same!
  • 23. ipconfig /all MAC address Figure 2.12 Output from IPCONFIG/ALL
  • 24. Moving Data Figure 2.13 Data moving along a wire
  • 25. Moving Data Figure 2-14: Oscilloscope of data
  • 26. Moving Data Figure 2.15 Data as ones and zeroes
  • 28. Inside a frame • Frames are made up of fields that contain information • Frames contain the recipient’s MAC address, the sender’s MAC address, the data itself, and a cyclic redundancy check (CRC) for error checking Figure 2.17 Generic frame
  • 29. Frame as a canister Figure 2.18 Frame as a canister
  • 30. Frame Size • Different networks use different sizes of frames • Many frames hold about 1500 bytes of data • The sending software breaks up large amounts of data into smaller chunks • The receiving station must then put the chunks back together in the proper order
  • 31. Processing Frames • All devices on the network see the frame, but only the device that it is addressed to will process it – Every frame is received by every NIC – The MAC address is used to decide if the frame belongs to a given device
  • 32. Getting Data on the Line • Since the cable is shared, only one system may speak at a time • Processes are used to keep two NICs from talking at the same time
  • 33. Incoming Frame! Figure 2.19 Incoming frame!
  • 34. Getting To Know You • Usually two devices have talked before, so the destination MAC address is already known • If the MAC address is not known, a broadcast message is sent over the network – The destination device will respond by sending its MAC address – A MAC broadcast address is FF-FF-FF-FF-FF-FF
  • 35. Figure 2.20 Building the frame
  • 36. Figure 2.21 Adding the data and CRC to the frame
  • 37. Figure 2.22 Sending the frame
  • 38. Figure 2.23 Reading an incoming frame
  • 39. After the frame is received • The receiving station checks the CRC value in the frame – If the value matches what it should, then the NIC sends the data portion to the network operating system for processing – If the value does not match, the frame has errors and must be resent
  • 40. The Two Aspects of NICs Figure 2.24 Layer 1 and Layer 2 are now properly applied to the network
  • 41. Figure 2.25 LLC and MAC, the two parts of the Data Link Layer
  • 42. Beyond the Single Wire – Network Software and Layers 3 – 7
  • 43. Subnets Figure 2.26 Large LAN complete (left), and broken into two subnets (right)
  • 44. Network Protocols • Network protocols define rules for how systems are addressed, how to chop data up into chunks, how to deal with routers, and so on • As a network grows, a more universal address- ing method than MAC addresses is needed • TCP/IP: – Transmission Control Protocol (TCP) – Internet Protocol (IP)
  • 45. IP – Playing on Layer 3, the Network Layer • IP address: a unique numeric identifier • An IP address is a logical address while a MAC address is a physical address • IP uses a dotted-decimal notation • Each 8-bit number ranges from 0 to 255 – Example: 192.168.4.232 • No two systems on the same network share the same IP address
  • 46. • Routers are used to chop large networks up into smaller ones • Routers forward packets by logical address • An IP router (most common) forwards IP packets • Works at Layer 3, the Network layer Figure 2.27 Typical small router
  • 47. Figure 2.28 MHTechEd addressing
  • 48. Figure 2.29 Router added to the OSI model for the network
  • 49. Frames (packets) within Frames • Network software creates a packet that contains the sending and receiving IP addresses along with the data Figure 2.30 IP packet
  • 50. Figure 2.31 IP packet in a frame (as a canister)
  • 51. • The packet is enclosed within a frame that contains the sending and receiving MAC addresses IP packet in a frame Figure 2.32 IP packet in a frame
  • 52. Connecting to the Internet • A router connects a local network to the Internet • The local hub is connected to the router • The router is connected to the Internet through a cable or phone line • The cable or phone line uses a different kind of frame, so the router strips the frame and creates a new one
  • 53. Figure 2.33 Adding a router to the network
  • 54. Connecting to the Internet Figure 2.34 Router removing network frame and adding one for the cable line
  • 55. Figure 2.35 Router in action (notice addresses)
  • 56. • The router replaces the MAC address with the type of address used by the cable or phone company • The frame uses the IP address to guide it to the receiving system • The receiving router strips off the cable or phone company frame and adds the MAC address for the receiving system • The NIC strips off the MAC header and hands the frame off to the NOS
  • 57. Assembly and Disassembly – Layer 4, the Transport Layer • Most data is much larger than a single frame • Network protocols chop up the data into smaller packets, and give each one a sequence number • The sequence numbers are used by the receiving system to put the packets back in order, and to assemble them • This compares to the numbering of boxes by UPS
  • 58. Figure 2.36 Labeling the boxes
  • 59. • Transport layer is the assembler/disassembler • Transport layer also initializes requests for packets that weren’t received in good order
  • 60. Figure 2.37 OSI updated
  • 61. Talking on a Network – Layer 5, the Session Layer • One system may be talking to many other systems simultaneously • The software that handles these processes is called session software, working at Layer 5
  • 62. Figure 2.38 Handling multiple inputs
  • 63. Figure 2.39 Each request becomes a session
  • 64. Figure 2.40 OSI updated
  • 65. Standardized Formats – or Why Layer 6, Presentation, Has No Friends • Presentation layer tasks solved an old problem • Macintoshes and PCs use very different formats • Standardized formats have been created that allow very different operating systems to exchange data
  • 66. Figure 2.41 Different data formats were often unreadable between systems
  • 67. Figure 2.42 Everyone recognized PDF files!
  • 68. Figure 2.43 OSI updated
  • 69. Network Applications – Layer 7, the Application Layer • Users use Application layer network applications to exchange data on a network – Network in Windows Vista (My Network Places in earlier Windows) – Web browser like Internet Explorer or Netscape Navigator – Outlook Express for e-mail • All operating systems have APIs at the Application layer for network-aware applications
  • 70. Figure 2.44 Network applications at work
  • 71. Figure 2.45 OSI updated
  • 72. How Tiffany Gets Her Document • The next few slides illustrate a typical process that takes place to copy a file from one machine to another over a network
  • 73. Figure 2.46 Network application showing computers on the MHTechEd network
  • 74. Figure 2.47 Copying the Word document
  • 75. Figure 2.48 Chopping the Word document
  • 76. Figure 2.49 Creating and addressing packets
  • 78. Figure 2.51 Tiffany’s system grabbing a frame
  • 79. • The OSI seven-layer model is a troubleshooting tool • Example: Jane can’t print to the networked printer – Layer 1 and 2: NIC shows activity? – Layer 3: Does computer have a proper IP address? – Move up through the layers to discover problem area

Editor's Notes

  1. Teaching Tip Before moving on, point out the Cross Check on Page 9, which asks the students to check their knowledge about information in Chapter 1 on Cisco. It asks, What does Cisco say about CompTIA Network+ certification? Where would you go to get more details?
  2. Note on page 10: ISO may look like a mispelled acronym, but it’s actually a word, derived from the Greek word isos , which means equal.
  3. Tip on Page 11: Be sure to memorize both the name and the number of each OSI layer. Network techs use terms such as “Layer 4” and “Transport layer” synonymously. Students have long used mnemonics for memorizing such lists. One of my favorites for the OSI seven-layer model is Please Do Not Throw Sausage Pizza Away. Yum! Note on Page 11: Keep in mind that these layers are not laws of physics — anybody who wants to design a network can do it any way he or she wants. While many protocols fit nearly into one of the seven layers, others do not.
  4. Note on bottom of Page 11: This section is a conceptual overview of the hardware and software functions of a network. Your network may have different hardware or software, but it will share the same functions!
  5. Take time to point out the Try This! On page 15, giving each student time to determine the MAC address of a NIC using IPCONFIG/ALL.
  6. Note on Page 15: A number of different frame types are used in different networks. All NICs on the same network must use the same frame type or they will not be able to communicate with other NICs.
  7. Tech Tip (Page 16): CRC in Depth Most CRCs are only 4 bytes long, yet the average frame carries around 1500 bytes of data. How can 4 bytes tell you if all 1500 bytes in the data are correct? That’s the magic of CRCs. Without going into the grinding details, think of the CRC as just the remainder of a division problem. (Remember learning remainders from division back in elementary school?) The NIC sending the frame does a little math to make the CRC. Using binary arithmetic, it works a division problem on the data using a divisor called a key. This key is the same on all the NICs in your network —it’s built in at the factory. The result of this division is the CRC. When the frame gets to the receiving NIC, it divides the data by the same key. If the receiving NIC’s answer is the same as the CRC, it knows the data is good.
  8. How does the destination device know that it is the intended destination device? On most networks today, an address called an IP address is used to identify the destination device. More on IP addresses later in this chapter, and again, later in the book (Chapters 7 through 11).
  9. The sending system hands data to the NIC The NIC makes the frame
  10. The NIC adds the CRC and data to the frame The NIC puts its MAC address and the destination’s MAC address in the frame
  11. NIC sends the frame when no other NIC is using the cable
  12. The frame propagates down the wire to the hub The hub creates a copy of the frame to send to every other system The receiving device processes the frame
  13. Tip on Page 20: The CompTIA Network+ exam tests you on the details of the OSI seven-layer model, so know that the Data Link layer is the only layer that has any sublayers.
  14. Tech Tip (Page 21): NIC and Layers [a shortened version] Network cards operate at both Layer 2 and Layer 1 of the OSI seven-layer model. If cornered to answer one or the other, however, go with the more common answer, Layer 2.
  15. Tip on Page 21: MAC addresses are also known as physical addresses.
  16. Note on Page 22: TCP/IP is the most famous network protocol, but there are others.
  17. Tip on Page 23: Head to Chapter 7, “TCP/IP Basics,” and Chapter 8, “The Wonderful World of Routing,” to get much deeper into routers.
  18. Note on Page 23: This is a highly simplified IP packet. I am not including lots of little parts of the IP packet in this diagram because they are not important to what you need to understand right now —but don’t worry, you’ll see them later in the book!
  19. Allow time for the students to do the activity in the Try This! on Page 28. No need to explain the results of running the netstat command, other than to ensure that they appreciate the large number of sessions that are open on each computer.
  20. Tech Tip (Page 28): Acrobat as Open Standard Adobe released the PDF standard to ISO in 2007 and PDF became the ISO 32000 open standard. Adobe Acrobat remains the premier application for reading and editing PDF documents, so most folks call PDF documents Acrobat files.