• Click toedit Master subtitle
style
Chapter 2: OSI Specifications
2.
Chapter 2 Objectives
TheFollowing CompTIA Network+ Exam Objectives Are
Covered in This Chapter:
• 5.0 Industry standards, practices, and network theory
• 5.1 Analyze a scenario and determine the
corresponding OSI layer
• • Layer 1 – Physical
• • Layer 2 – Data link
• • Layer 3 – Network
• • Layer 4 – Transport
• • Layer 5 – Session
• • Layer 6 – Presentation
• • Layer 7 – Application
2
3.
Chapter 2 Objectives
TheFollowing CompTIA Network+ Exam
Objectives Are Covered in This Chapter:
• 5.2 Explain the basics of network theory and
concepts
• • Encapsulation/de-encapsulation
• • Modulation techniques
• o Multiplexing
• o De-multiplexing
• o Analog and digital techniques
• o TDM
3
4.
Internetworking Models
4
• Inthe late 1970s, the Open Systems Interconnection
(OSI) reference model was created by the
International Organization for Standardization (ISO)
to break through this barrier.
• The OSI model was meant to help vendors create
interoperable network devices and software in the
form of protocols so that different vendor networks
could work with each other.
• The OSI model is the primary architectural model for
networks. It describes how data and network
information are communicated from an application
on one computer through the network media to an
application on another computer. The OSI reference
model breaks this approach into layers.
5.
Advantages of Reference
Models
5
Advantagesof using the OSI layered model include, but
are not limited to, the following:
• It divides the network communication process into
smaller and simpler components, thus aiding
component development, design, and troubleshooting.
• It allows multiple-vendor development through
standardization of network components.
• It encourages industry standardization by defining
what functions occur at each layer of the model.
• It allows various types of network hardware and
software to communicate.
• It prevents changes in one layer from affecting other
layers, so it doesn’t hamper development and makes
application programming easier.
6.
The OSI Model
6
•The OSI model has seven layers:
– Application (Layer 7)
– Presentation (Layer 6)
– Session (Layer 5)
– Transport (Layer 4)
– Network (Layer 3)
– Data Link (Layer 2)
– Physical (Layer 1)
7.
OSI Layer Functions
7
Application
•File, print, message, database, and application services
Presentation
• Data encryption, compression, and translation services
Session
• Dialog control
Transport
• End-to-end connection
Network
• Routing
Data Link
• Framing
Physical
• Physical topology
8.
The Upper Layers
8
Application
•Provides a user interface
Presentation
• Presents data
• Handles processing such as encryption
Session
• Keeps different applications’
data separate
Transport
Network
Data Link
Physical
9.
The Lower Layers
9
Application
Presentation
Session
Transport
•Provides reliable or unreliable delivery
• Performs error correction before retransmit
Network
• Provides logical addressing which routers use for path
determination
Data Link
• Combines packets into bytes and bytes into frames
• Provides access to media using MAC address
• Performs error detection not correction
Physical
• Moves bits between devices
• Specifies voltage, wire speed, and pin-out of cables
10.
Reliability
10
Reliable data transportemploys a connection-oriented
communications session between systems, and the
protocols involved ensure that the following will be
achieved:
• The segments delivered are acknowledged back to
the sender upon their reception.
• Any segments not acknowledged are retransmitted.
• Segments are sequenced back into their proper
order upon arrival at their destination.
• A manageable data flow is maintained in order to
avoid congestion, overloading, and data loss.
The Lower Layers
16
Application
Presentation
Session
Transport
•Provides reliable or unreliable delivery
• Performs error correction before retransmit
Network
• Provides logical addressing which routers use for path
determination
Data Link
• Combines packets into bytes and bytes into frames
• Provides access to media using MAC address
• Performs error detection not correction
Physical
• Moves bits between devices
• Specifies voltage, wire speed, and pin-out of cables
17.
Routing at Layer3
17
1.1
1.2
1.0
1.3
E0
2.1
S0
2.2
S0
3.0
3.1
3.2
3.3
E0
Routing table
NET INT Metric
1 E0 0
2 S0 0
3 S0 1
Routing table
NET INT Metric
1 S0 1
2 S0 0
3 E0 0
18.
Routers at Layer3
18
FastEthernet0/0
FastEthernet0/1
Serial0
WAN Services
Each router interface is a broadcast domain.
Routers break up broadcast domains by
default and provide WAN services
Internet
19.
The Lower Layers
19
Application
Presentation
Session
Transport
•Provides reliable or unreliable delivery
• Performs error correction before retransmit
Network
• Provides logical addressing which routers use for path
determination
Data Link
• Combines packets into bytes and bytes into frames
• Provides access to media using MAC address
• Performs error detection not correction
Physical
• Moves bits between devices
• Specifies voltage, wire speed, and pin-out of cables
20.
Data Link Layer(Layer 2)
20
802.11 802.3 802.2
Logical Link Control (LLC)
Media Access Control (MAC)
21.
The Lower Layers
21
Application
Presentation
Session
Transport
•Provides reliable or unreliable delivery
• Performs error correction before retransmit
Network
• Provides logical addressing which routers use for path
determination
Data Link
• Combines packets into bytes and bytes into frames
• Provides access to media using MAC address
• Performs error detection not correction
Physical
• Moves bits between devices
• Specifies voltage, wire speed, and pin-out of cables
22.
Data Encapsulation
22
Upper layerdata
Upper layer data
TCP Header
Segment
IP Header
Packet
LLC Header
Packet
MAC Header
FCS
FCS
0101110101001000010
Application
Presentation
Session
Physical
Transport
Network
Data Link
Segment
Packet
Frame
Bits
PDU
23.
Modulation Techniques
23
Modulation isthe process of varying one or more properties of
a waveform called a carrier signal
In current networks, modulation takes digital or analog signals
and puts in in another signal that can be physically
transmitted
Modems – perform both modulation and demodulation
operations
Analog and Digital modulation use Frequency-Division
multiplexing. Several low-pass signals transferred
simultaneously over same shared medium
Ethernet uses digital baseband modulation or line coding to
transfer digital bit stream
Time-division multiplexing (TDM) method of transmitting and
receiving many independent signals over common signal
path through synchronize devices
#4 Layered architecture – understand computer processes and see what must be accomplished on any one layer and how
#6 Its not a physical model, it’s a conceptual and comprehensive fluid set of guidelines
#7 Divided into two groups:
top 3 rules of how applications within hosts communicate with each other and end users
bottom 4 how data is transmitted from end to end
#8 Application:
users communicate and interact with the computer
application processes, interfaces, APIs -> through OS
Presentation:
data translation and code formatting
Adapts data to standard format before transmission
data compression, decompression, encryption, decryption
Session
setting up , managing, and tearing down session between presentation layer entities
coordinates communication between systems
organizes their communication through: simplex, half-duplex, full-duplex
keeps app data separate from other apps data
#9 Transport,
segments and reassembles data into data streams
end-to-end data transport services
establish logical connections between sending and destination hosts
multiplexing
establish virtual connections
tear down virtual connections
TCP/UDP
#11 How does the Transport layer employ connection oriented sessions:
Senders TCP process contacts destination TCP process to establish connection -> this results in a virtual circuit
within the handshake, TCP processes agree on amount of information will be sent
The virtual circuit setup is called overhead
#12 If a bunch of computers are simultaneously sending datagrams back and forth -> congestion -> bottleneck
prevents sending host from overflowing the buffer in receiving host -> loss of data
delivered segments are acknowledged back to sender upon receipt
if not acknowledged, retransmitted by sender
segments are sequenced into proper order on arrival destination
manageable data flow maintained to avoid congestion, overload, data loss
#14 Slow if: sender waited for ACK after transmission of each segment.
Sender allowed to send without receiving ACK is known as Windowing
used to control the amount of outstanding, unacknowledged data segments
#15 Reliable data deliver guarantees that data wont be duplicated or lost
Positive Acknowledgments with Retransmission
requires receiving machine to communicate with sender when data received
Remember how during the handshake, they share information about size of segment?
#16 Network
logical device addressing
transports traffic between devices that aren’t locally attached
Routers work at Layer 3
Two types of packets in the network layer:
Data packets: transport user data through internetwork, called routed protocols ie: IP and IPv6
Route-Update packets: to update neighboring routers about networks connected to all routers, called routing protocols ie: RIP, RIPv2, EIGRP, OSPF. Used to help build and maintain the routing table
#17 Routing table:
network addresses – protocol specific
Interface – exit interface
metric – distance to the remote network. Different ways of computing this distance: hop count, (bandwidth, delay etc.
#18 Each interface represents a separate network – each assigned a unique network identification number, each host on the network will use the same network number
Key points:
do not forward broadcast or multicast packets
use logical address to determine next-hop router to forward packet
can use access-lists created by admins to control security
can provide layer 2 bridge functions and can route through the same interface
layer 3 devices provide connections between VLANS
provide QOS for specific types of network traffic
#19 Data link is the physical transmission of data, handles:
error notification
network topology
flow control
Uses:
hardware addressing (MAC) media access control
formats messages into pieces called data frames
#20 MAC – how packets are placed on the media.
physical addressing
logical topology – signal path through a physical topology
line discipline
error notification
ordered delivery of frames
optional flow control
LLC- identifies network layer protocols and encapsulates them
flow control
sequencing of control bits
802 project
#21 Physical layer:
send and receives bits (1, 0)
specifies the electrical, mechanical, procedural, and functional requirements for activating, maintaining, and deactivating a physical link
Identify the interface between data terminal equipment DTE -> data communication equipment DCE
DTE is the end of the users device
DCE is the end of the providers side of communication,
usually located at the customer premice (modem or channel service unit/data service unit (CSU/DSU)
#22 Encapsulation: wrapped with protocol information at each layer
Protocol Data Unit (PDU) – hold the control information attached to the data
User information -> Data -> segments, reliable connection setup for transmission -> packets, logical address to be routed -> frames, hardware address for unique identify -> bits, digital encoding and cocking scheme