• Click to edit Master subtitle
style
Chapter 2: OSI Specifications
Chapter 2 Objectives
The Following CompTIA Network+ Exam Objectives Are
Covered in This Chapter:
• 5.0 Industry standards, practices, and network theory
• 5.1 Analyze a scenario and determine the
corresponding OSI layer
• • Layer 1 – Physical
• • Layer 2 – Data link
• • Layer 3 – Network
• • Layer 4 – Transport
• • Layer 5 – Session
• • Layer 6 – Presentation
• • Layer 7 – Application
2
Chapter 2 Objectives
The Following CompTIA Network+ Exam
Objectives Are Covered in This Chapter:
• 5.2 Explain the basics of network theory and
concepts
• • Encapsulation/de-encapsulation
• • Modulation techniques
• o Multiplexing
• o De-multiplexing
• o Analog and digital techniques
• o TDM
3
Internetworking Models
4
• In the late 1970s, the Open Systems Interconnection
(OSI) reference model was created by the
International Organization for Standardization (ISO)
to break through this barrier.
• The OSI model was meant to help vendors create
interoperable network devices and software in the
form of protocols so that different vendor networks
could work with each other.
• The OSI model is the primary architectural model for
networks. It describes how data and network
information are communicated from an application
on one computer through the network media to an
application on another computer. The OSI reference
model breaks this approach into layers.
Advantages of Reference
Models
5
Advantages of using the OSI layered model include, but
are not limited to, the following:
• It divides the network communication process into
smaller and simpler components, thus aiding
component development, design, and troubleshooting.
• It allows multiple-vendor development through
standardization of network components.
• It encourages industry standardization by defining
what functions occur at each layer of the model.
• It allows various types of network hardware and
software to communicate.
• It prevents changes in one layer from affecting other
layers, so it doesn’t hamper development and makes
application programming easier.
The OSI Model
6
• The OSI model has seven layers:
– Application (Layer 7)
– Presentation (Layer 6)
– Session (Layer 5)
– Transport (Layer 4)
– Network (Layer 3)
– Data Link (Layer 2)
– Physical (Layer 1)
OSI Layer Functions
7
Application
• File, print, message, database, and application services
Presentation
• Data encryption, compression, and translation services
Session
• Dialog control
Transport
• End-to-end connection
Network
• Routing
Data Link
• Framing
Physical
• Physical topology
The Upper Layers
8
Application
• Provides a user interface
Presentation
• Presents data
• Handles processing such as encryption
Session
• Keeps different applications’
data separate
Transport
Network
Data Link
Physical
The Lower Layers
9
Application
Presentation
Session
Transport
• Provides reliable or unreliable delivery
• Performs error correction before retransmit
Network
• Provides logical addressing which routers use for path
determination
Data Link
• Combines packets into bytes and bytes into frames
• Provides access to media using MAC address
• Performs error detection not correction
Physical
• Moves bits between devices
• Specifies voltage, wire speed, and pin-out of cables
Reliability
10
Reliable data transport employs a connection-oriented
communications session between systems, and the
protocols involved ensure that the following will be
achieved:
• The segments delivered are acknowledged back to
the sender upon their reception.
• Any segments not acknowledged are retransmitted.
• Segments are sequenced back into their proper
order upon arrival at their destination.
• A manageable data flow is maintained in order to
avoid congestion, overloading, and data loss.
A Connection Oriented
Session
11
Sender Receiver
SYN
SYN/ACK
ACK
Connection Established
Data transfer
(Send bytes of Segments)
Flow Control
12
Sender Receiver
Buffer full
No ready –
STOP!
Segments
processed
GO!
Transmit
Transmit
Connection Oriented Session
13
A service is considered connection-oriented if:
• Virtual circuit is setup (three-way handshake).
• Uses sequencing.
• Uses acknowledgments.
• Uses flow control.
Windowing Flow Control
14
Sender Receiver
Receive 1
Window size of 1
Receive 2
Ack 1
Ack 2
Send 1
Send 2
Window size of 3
Ack 4
Send 1
Send 2
Send 3
Send 4
Acknowledgements
15
Sender Receiver
Ack 4
Send 1
Send 2
Ack 5
Send 4
Send 5
Send 6
Send 5
Send 3
Connection lost!
Ack 7
1 2 3 4 5 6 1 2 3 4 5 6
The Lower Layers
16
Application
Presentation
Session
Transport
• Provides reliable or unreliable delivery
• Performs error correction before retransmit
Network
• Provides logical addressing which routers use for path
determination
Data Link
• Combines packets into bytes and bytes into frames
• Provides access to media using MAC address
• Performs error detection not correction
Physical
• Moves bits between devices
• Specifies voltage, wire speed, and pin-out of cables
Routing at Layer 3
17
1.1
1.2
1.0
1.3
E0
2.1
S0
2.2
S0
3.0
3.1
3.2
3.3
E0
Routing table
NET INT Metric
1 E0 0
2 S0 0
3 S0 1
Routing table
NET INT Metric
1 S0 1
2 S0 0
3 E0 0
Routers at Layer 3
18
FastEthernet0/0
FastEthernet0/1
Serial0
WAN Services
Each router interface is a broadcast domain.
Routers break up broadcast domains by
default and provide WAN services
Internet
The Lower Layers
19
Application
Presentation
Session
Transport
• Provides reliable or unreliable delivery
• Performs error correction before retransmit
Network
• Provides logical addressing which routers use for path
determination
Data Link
• Combines packets into bytes and bytes into frames
• Provides access to media using MAC address
• Performs error detection not correction
Physical
• Moves bits between devices
• Specifies voltage, wire speed, and pin-out of cables
Data Link Layer (Layer 2)
20
802.11 802.3 802.2
Logical Link Control (LLC)
Media Access Control (MAC)
The Lower Layers
21
Application
Presentation
Session
Transport
• Provides reliable or unreliable delivery
• Performs error correction before retransmit
Network
• Provides logical addressing which routers use for path
determination
Data Link
• Combines packets into bytes and bytes into frames
• Provides access to media using MAC address
• Performs error detection not correction
Physical
• Moves bits between devices
• Specifies voltage, wire speed, and pin-out of cables
Data Encapsulation
22
Upper layer data
Upper layer data
TCP Header
Segment
IP Header
Packet
LLC Header
Packet
MAC Header
FCS
FCS
0101110101001000010
Application
Presentation
Session
Physical
Transport
Network
Data Link
Segment
Packet
Frame
Bits
PDU
Modulation Techniques
23
Modulation is the process of varying one or more properties of
a waveform called a carrier signal
In current networks, modulation takes digital or analog signals
and puts in in another signal that can be physically
transmitted
Modems – perform both modulation and demodulation
operations
Analog and Digital modulation use Frequency-Division
multiplexing. Several low-pass signals transferred
simultaneously over same shared medium
Ethernet uses digital baseband modulation or line coding to
transfer digital bit stream
Time-division multiplexing (TDM) method of transmitting and
receiving many independent signals over common signal
path through synchronize devices
Summary
24
• Summary
• Exam Essentials Section
• Written Labs
• Review Questions

Chapter_2_Network+_fundementals_study.ppt

  • 1.
    • Click toedit Master subtitle style Chapter 2: OSI Specifications
  • 2.
    Chapter 2 Objectives TheFollowing CompTIA Network+ Exam Objectives Are Covered in This Chapter: • 5.0 Industry standards, practices, and network theory • 5.1 Analyze a scenario and determine the corresponding OSI layer • • Layer 1 – Physical • • Layer 2 – Data link • • Layer 3 – Network • • Layer 4 – Transport • • Layer 5 – Session • • Layer 6 – Presentation • • Layer 7 – Application 2
  • 3.
    Chapter 2 Objectives TheFollowing CompTIA Network+ Exam Objectives Are Covered in This Chapter: • 5.2 Explain the basics of network theory and concepts • • Encapsulation/de-encapsulation • • Modulation techniques • o Multiplexing • o De-multiplexing • o Analog and digital techniques • o TDM 3
  • 4.
    Internetworking Models 4 • Inthe late 1970s, the Open Systems Interconnection (OSI) reference model was created by the International Organization for Standardization (ISO) to break through this barrier. • The OSI model was meant to help vendors create interoperable network devices and software in the form of protocols so that different vendor networks could work with each other. • The OSI model is the primary architectural model for networks. It describes how data and network information are communicated from an application on one computer through the network media to an application on another computer. The OSI reference model breaks this approach into layers.
  • 5.
    Advantages of Reference Models 5 Advantagesof using the OSI layered model include, but are not limited to, the following: • It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting. • It allows multiple-vendor development through standardization of network components. • It encourages industry standardization by defining what functions occur at each layer of the model. • It allows various types of network hardware and software to communicate. • It prevents changes in one layer from affecting other layers, so it doesn’t hamper development and makes application programming easier.
  • 6.
    The OSI Model 6 •The OSI model has seven layers: – Application (Layer 7) – Presentation (Layer 6) – Session (Layer 5) – Transport (Layer 4) – Network (Layer 3) – Data Link (Layer 2) – Physical (Layer 1)
  • 7.
    OSI Layer Functions 7 Application •File, print, message, database, and application services Presentation • Data encryption, compression, and translation services Session • Dialog control Transport • End-to-end connection Network • Routing Data Link • Framing Physical • Physical topology
  • 8.
    The Upper Layers 8 Application •Provides a user interface Presentation • Presents data • Handles processing such as encryption Session • Keeps different applications’ data separate Transport Network Data Link Physical
  • 9.
    The Lower Layers 9 Application Presentation Session Transport •Provides reliable or unreliable delivery • Performs error correction before retransmit Network • Provides logical addressing which routers use for path determination Data Link • Combines packets into bytes and bytes into frames • Provides access to media using MAC address • Performs error detection not correction Physical • Moves bits between devices • Specifies voltage, wire speed, and pin-out of cables
  • 10.
    Reliability 10 Reliable data transportemploys a connection-oriented communications session between systems, and the protocols involved ensure that the following will be achieved: • The segments delivered are acknowledged back to the sender upon their reception. • Any segments not acknowledged are retransmitted. • Segments are sequenced back into their proper order upon arrival at their destination. • A manageable data flow is maintained in order to avoid congestion, overloading, and data loss.
  • 11.
    A Connection Oriented Session 11 SenderReceiver SYN SYN/ACK ACK Connection Established Data transfer (Send bytes of Segments)
  • 12.
    Flow Control 12 Sender Receiver Bufferfull No ready – STOP! Segments processed GO! Transmit Transmit
  • 13.
    Connection Oriented Session 13 Aservice is considered connection-oriented if: • Virtual circuit is setup (three-way handshake). • Uses sequencing. • Uses acknowledgments. • Uses flow control.
  • 14.
    Windowing Flow Control 14 SenderReceiver Receive 1 Window size of 1 Receive 2 Ack 1 Ack 2 Send 1 Send 2 Window size of 3 Ack 4 Send 1 Send 2 Send 3 Send 4
  • 15.
    Acknowledgements 15 Sender Receiver Ack 4 Send1 Send 2 Ack 5 Send 4 Send 5 Send 6 Send 5 Send 3 Connection lost! Ack 7 1 2 3 4 5 6 1 2 3 4 5 6
  • 16.
    The Lower Layers 16 Application Presentation Session Transport •Provides reliable or unreliable delivery • Performs error correction before retransmit Network • Provides logical addressing which routers use for path determination Data Link • Combines packets into bytes and bytes into frames • Provides access to media using MAC address • Performs error detection not correction Physical • Moves bits between devices • Specifies voltage, wire speed, and pin-out of cables
  • 17.
    Routing at Layer3 17 1.1 1.2 1.0 1.3 E0 2.1 S0 2.2 S0 3.0 3.1 3.2 3.3 E0 Routing table NET INT Metric 1 E0 0 2 S0 0 3 S0 1 Routing table NET INT Metric 1 S0 1 2 S0 0 3 E0 0
  • 18.
    Routers at Layer3 18 FastEthernet0/0 FastEthernet0/1 Serial0 WAN Services Each router interface is a broadcast domain. Routers break up broadcast domains by default and provide WAN services Internet
  • 19.
    The Lower Layers 19 Application Presentation Session Transport •Provides reliable or unreliable delivery • Performs error correction before retransmit Network • Provides logical addressing which routers use for path determination Data Link • Combines packets into bytes and bytes into frames • Provides access to media using MAC address • Performs error detection not correction Physical • Moves bits between devices • Specifies voltage, wire speed, and pin-out of cables
  • 20.
    Data Link Layer(Layer 2) 20 802.11 802.3 802.2 Logical Link Control (LLC) Media Access Control (MAC)
  • 21.
    The Lower Layers 21 Application Presentation Session Transport •Provides reliable or unreliable delivery • Performs error correction before retransmit Network • Provides logical addressing which routers use for path determination Data Link • Combines packets into bytes and bytes into frames • Provides access to media using MAC address • Performs error detection not correction Physical • Moves bits between devices • Specifies voltage, wire speed, and pin-out of cables
  • 22.
    Data Encapsulation 22 Upper layerdata Upper layer data TCP Header Segment IP Header Packet LLC Header Packet MAC Header FCS FCS 0101110101001000010 Application Presentation Session Physical Transport Network Data Link Segment Packet Frame Bits PDU
  • 23.
    Modulation Techniques 23 Modulation isthe process of varying one or more properties of a waveform called a carrier signal In current networks, modulation takes digital or analog signals and puts in in another signal that can be physically transmitted Modems – perform both modulation and demodulation operations Analog and Digital modulation use Frequency-Division multiplexing. Several low-pass signals transferred simultaneously over same shared medium Ethernet uses digital baseband modulation or line coding to transfer digital bit stream Time-division multiplexing (TDM) method of transmitting and receiving many independent signals over common signal path through synchronize devices
  • 24.
    Summary 24 • Summary • ExamEssentials Section • Written Labs • Review Questions

Editor's Notes

  • #4 Layered architecture – understand computer processes and see what must be accomplished on any one layer and how
  • #6 Its not a physical model, it’s a conceptual and comprehensive fluid set of guidelines
  • #7 Divided into two groups: top 3 rules of how applications within hosts communicate with each other and end users bottom 4 how data is transmitted from end to end
  • #8 Application: users communicate and interact with the computer application processes, interfaces, APIs -> through OS Presentation: data translation and code formatting Adapts data to standard format before transmission data compression, decompression, encryption, decryption Session setting up , managing, and tearing down session between presentation layer entities coordinates communication between systems organizes their communication through: simplex, half-duplex, full-duplex keeps app data separate from other apps data
  • #9 Transport, segments and reassembles data into data streams end-to-end data transport services establish logical connections between sending and destination hosts multiplexing establish virtual connections tear down virtual connections TCP/UDP
  • #11 How does the Transport layer employ connection oriented sessions: Senders TCP process contacts destination TCP process to establish connection -> this results in a virtual circuit within the handshake, TCP processes agree on amount of information will be sent The virtual circuit setup is called overhead
  • #12 If a bunch of computers are simultaneously sending datagrams back and forth -> congestion -> bottleneck prevents sending host from overflowing the buffer in receiving host -> loss of data delivered segments are acknowledged back to sender upon receipt if not acknowledged, retransmitted by sender segments are sequenced into proper order on arrival destination manageable data flow maintained to avoid congestion, overload, data loss
  • #14 Slow if: sender waited for ACK after transmission of each segment. Sender allowed to send without receiving ACK is known as Windowing used to control the amount of outstanding, unacknowledged data segments
  • #15 Reliable data deliver guarantees that data wont be duplicated or lost Positive Acknowledgments with Retransmission requires receiving machine to communicate with sender when data received Remember how during the handshake, they share information about size of segment?
  • #16 Network logical device addressing transports traffic between devices that aren’t locally attached Routers work at Layer 3 Two types of packets in the network layer: Data packets: transport user data through internetwork, called routed protocols ie: IP and IPv6 Route-Update packets: to update neighboring routers about networks connected to all routers, called routing protocols ie: RIP, RIPv2, EIGRP, OSPF. Used to help build and maintain the routing table
  • #17 Routing table: network addresses – protocol specific Interface – exit interface metric – distance to the remote network. Different ways of computing this distance: hop count, (bandwidth, delay etc.
  • #18 Each interface represents a separate network – each assigned a unique network identification number, each host on the network will use the same network number Key points: do not forward broadcast or multicast packets use logical address to determine next-hop router to forward packet can use access-lists created by admins to control security can provide layer 2 bridge functions and can route through the same interface layer 3 devices provide connections between VLANS provide QOS for specific types of network traffic
  • #19 Data link is the physical transmission of data, handles: error notification network topology flow control Uses: hardware addressing (MAC) media access control formats messages into pieces called data frames
  • #20 MAC – how packets are placed on the media. physical addressing logical topology – signal path through a physical topology line discipline error notification ordered delivery of frames optional flow control LLC- identifies network layer protocols and encapsulates them flow control sequencing of control bits 802 project
  • #21 Physical layer: send and receives bits (1, 0) specifies the electrical, mechanical, procedural, and functional requirements for activating, maintaining, and deactivating a physical link Identify the interface between data terminal equipment DTE -> data communication equipment DCE DTE is the end of the users device DCE is the end of the providers side of communication, usually located at the customer premice (modem or channel service unit/data service unit (CSU/DSU)
  • #22 Encapsulation: wrapped with protocol information at each layer Protocol Data Unit (PDU) – hold the control information attached to the data User information -> Data -> segments, reliable connection setup for transmission -> packets, logical address to be routed -> frames, hardware address for unique identify -> bits, digital encoding and cocking scheme