chapter 2 networking standards and the osi model n.
Skip this Video
Loading SlideShow in 5 Seconds..
Chapter 2 Networking Standards and the OSI Model PowerPoint Presentation
Download Presentation
Chapter 2 Networking Standards and the OSI Model

Loading in 2 Seconds...

play fullscreen
1 / 42

Chapter 2 Networking Standards and the OSI Model - PowerPoint PPT Presentation

  • Uploaded on

Chapter 2 Networking Standards and the OSI Model. Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft IT Academy Administrator Computer Information Systems Instructor Albany Technical College. Attention: Accessing Demos. This course presents many demos.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

Chapter 2 Networking Standards and the OSI Model

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
    Presentation Transcript
    1. Chapter 2Networking Standards and the OSI Model Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft IT Academy Administrator Computer Information Systems Instructor Albany Technical College

    2. Attention: Accessing Demos • This course presents many demos. • The Demosrequire that you be logged in to the Virtual Technical College web site when you click on them to run. • To access and log in to the Virtual Technical College web site: • To access the site type in the url window • Log in using the username: CIS 1140 or ATCStudent1 • *Enter the password: student • If you should click on the demo link and you get an Access Denied it is because you have not logged in to or you need to log out and log back in. *Remember that passwords are case sensitive so enter it in all lower case letters.

    3. Objectives • Identify organizations that set standards for networking • Describe the purpose of the OSI Model and each of its layers • Explain specific functions belonging to each OSI Model layer • Understand how two network nodes communicate through the OSI model • Discuss the structure and purpose of data packets and frames • Describe the two types of addressing covered by the OSI Model

    4. Networking Standards Organizations • Standards: documented agreements containing technical specifications or other precise criteria stipulating how particular products or services should be designed or performed • Define minimum acceptable performance • Many different organizations have evolved to oversee computer industry’s standards

    5. ANSI • American National Standards Institute (ANSI) • Composed of more than a thousand representatives from industry and government • Represents United States in setting international standards • ANSI standards documents available: • ANSI’s Web site ( • At university or public libraries

    6. EIA and TIA • Electronic Industries Alliance (EIA): Trade organization composed of representatives from electronics manufacturing firms across US • Sets standards for its members • Helps write ANSI standards • Lobbies for legislation favorable to growth of computer and electronics industries • Telecommunications Industry Association (TIA): Focuses on standards for information technology (IT), wireless, satellite, fiber optics, and telephone equipment

    7. IEEE • Institute of Electrical and Electronics Engineers • International society composed of engineering professionals • Goals are to promote development and education in electrical engineering and computer science • IEEE technical papers and standards are highly respected in the networking profession • Can purchase IEEE documents online from IEEE’s Web site (

    8. ISO • International Organization for Standardization • Collection of organization standards representing 146 countries • Goal is to establish international technological standards to facilitate global exchange of information and barrier-free trade • Fewer than 300 of ISO’s more than 14,250 standards apply to computer-related products and functions

    9. ITU • International Telecommunication Union • Regulates international telecommunications: • Radio and TV frequencies • Satellite and telephony specifications • Networking infrastructure • Tariffs applied to global communications • Typically, documents pertain more to global telecommunications issues than to industry technical specifications

    10. ISOC • Internet Society • Professional membership society that helps to establish technical standards for the Internet • Oversees groups with specific missions: • Internet Architecture Board (IAB): Technical advisory group of researchers and professionals • Interested in overseeing Internet’s design and management • Internet Engineering Task Force (IETF): Sets standards for how systems communicate over the Internet • How protocols operate and interact

    11. IANA and ICANN • Internet Protocol (IP) addresses: Addresses used to identify computers on the Internet and other TCP/IP-based networks • Internet Assigned Numbers Authority (IANA): Used to keep records of available and reserved IP addresses and determines how addresses were doled out • Internet Corporation for Assigned Names and Numbers (ICANN): Ultimately responsible for IP addressing and domain name management • IANA still performs system administration • Individuals and businesses lease addresses from Internet Service Provider (ISP) • Business providing access to Internet and other services

    12. Development and Reason for Model Demo What is the OSI Model?Demo The OSI Model • Open Systems Interconnection (OSI) Model: divides network communications into seven layers: • Physical, Data Link, Network, Transport, Session, Presentation, and Application • Protocols perform services unique to layer • Protocols interact with protocols in layers directly above and below • Protocol: set of instructions to perform a function or group of functions • Written by a programmer The OSI Model Demo

    13. OSI Model Layer Mnemonics OSI Layer Down Up

    14. The OSI Model • Theoretical representation of what happens between two nodes communicating on a network • Does not prescribe type of hardware or software that should support each layer • Does not describe how software programs interact with other software programs or how software programs interact with humans • Each layer communicates with same layer from one computer to another (peer protocols) • Model is imperfect Overview of Layered Architecture Demo

    15. The OSI Model The layers of the model Demo • The Application, Presentation and Session layers are known as the Upper Layers and are implemented in software • The Transport and Network layer are mainly concerned with protocols for delivery and routing of packets and are implemented in software as well • The Data Link is implemented in hard- and software • The Physical layer is implemented in hardware only, hence its name. These lower two layers define LAN and WAN specifications. Upper Layers Demo Lower Layers Demo

    16. The OSI Model • A more detailed description of each layer follows later, but here's what basically happens when data passes from Host A to Host B: • The Application, Presentation and Session layers take user input and converts it into data • The Transport layer adds a segment header converting the data into segments • The Network layer adds a network header and converts the segments into packets / datagrams • The Data Link layer adds a frame header converting the packets/datagrams into frames, the MAC sublayer converts the frames into bits, which the Physical layer can put on the wire. • These steps are known as dataencapsulation. • When the bits stream arrives at the destination, the process is reversed and each layer will remove their corresponding header while the data flows up the OSI model until it is converted back to data and presented to the user. This is also known as decapsulation. Flow of data through the OSI Model

    17. Packet Assembly and Disassembly Process Each successive layer adds formatting and peer control information to the data in the form of a header. At the receiving end the headers are stripped off by the corresponding layers to determine how to handle the data. At the Data Link layer an error checking mechanism known as the Frame check sequence is added as a trailer.

    18. Packet Assembly and Disassembly Process Source Computer Destination Computer

    19. Application Layer (7) • Topmost layer • Represents services that directly support user applications • Window to network services • Services facilitate communication between software and lower-layer network services • Helps software applications negotiate formatting, procedural, security, synchronization, and other requirements with network • Hypertext Transfer Protocol (HTTP): formats and sends requests from client’s browser to server • Also formats and sends Web server’s response back to client’s browser • Application program interface (API): set of routines that make up part of a software application • Handles network access, flow control, and error recovery • SNMP, FTP, Telnet, DHCP, DNS, WINS, POP, IMAP and SMTP protocols function at this level The Application Layer Demo

    20. Presentation Layer (6) • Network translator • Protocols accept Application layer data and format it • So that one type of application and host can understand data from another type of application and host • e.g., translation and conversion between graphics file types • Examples of specifications defined at this layer are GIF, JPEG, MPEG, MIME, and ASCII. • On sending end, determines formatting used to exchange data among computers and adds formatting so data can be understood by network • On receiving end, translates data from application format to a common intermediate format • Manages data compression, translation, encryption • I/O redirectors work to redirect resources to a server • The Server and Workstation Services work at this layer The Presentation Layer Demo

    21. Session Layer (5) • Allows two applications on different computers to open, use, and close connections • Protocols coordinate and maintain communications between two network nodes • Establish and maintain communications link for duration of session • Synchronize dialogue between two nodes • Terminate communications • Performs name recognition and provides security • Monitors identification of session participants • Ensures that only authorized nodes have access • Provides synchronization by placing checkpoints in the data stream • Determine if communications have been cut off • Determine where to restart transmission • Implements dialog control between communication processes • Examples of protocols/API's that operate on this layer are RPC and NETBIOS. • Sets terms of communication • Decides which node will communicate first • Decides how long a node can communicate The Session Layer Demo

    22. Transport Layer (4) • Protocols accept data from Session layer and manage end-to-end delivery of data • Ensure data transferred reliably, in correct sequence, and without errors • Protocols also handle flow control • Gauging appropriate rate of transmission based on how fast recipient can accept data • Transmission Control Protocol (TCP): Takes care of reliably transmitting HTTP requests from client to server and vice versa • Connection-oriented protocols: ensure that data arrives exactly as it was sent • Establish connection before transmitting data • TCP is connection-oriented • Client’s TCP protocol first sends synchronization (SYN) packet request to server • Server responds with synchronization-acknowledgment (SYN-ACK) packet • Client responds with own acknowledgment (ACK)

    23. Transport Layer (4) • Acknowledgments also used to ensure that data was properly delivered • For every data unit sent, connection-oriented protocol expects acknowledgment from recipient • If no acknowledgment, data retransmitted • Connection-oriented protocols (TCP & SPX) use a checksum • Unique character string allowing receiving node to determine if arriving data unit exactly matches data unit sent by source • Connectionless protocols ( UDP) do not establish connection before transmitting • No effort to ensure data delivered error-free The Transport Layer Demo

    24. Transport Layer (4) • Transport layer protocols break large data units received from Session layer into smaller segments (segmentation) • Maximum transmission unit (MTU): largest data unit a given network will carry • Reassembly: process of reconstructing segmented data units • Sequencing: method of identifying segments that belong to same group of subdivided data • Indicates where unit of data begins • Indicates order in which groups of data were issued • Transport layer protocols of two nodes must synchronize timing and agree on starting point for the transmission

    25. Transport Layer Segmentation and Reassembly

    26. Network Layer (3) • Network layer protocols accept Transport layer segments and add logical addressing information in network header to form packets • Primary functions of protocols: • Translate network addresses into physical counterparts (ARP) • Decide how to route data from sender to receiver (RIP OSPF IGMPBGP) • Addresses the package using network address scheme (IP IPX) • Each node has two types of addresses: • Network address: follows hierarchical addressing scheme • Can be assigned through OS software • Network layer addresses, logical addresses, or virtual addresses • Physical address • Network layer handles routing • Determines the best route on the network based on network conditions, priority of service • Performs packet switching, routing, traffic management, and controls congestion of data • IP: Network layer protocol that underlies most Internet traffic • Fragmentation: Network layer protocol subdivides segments it receives from Transport layer into smaller packets • Troubleshooting network connectivity (ICMP) The Network Layer Demo

    27. Data-Link Layer (2) • Takes packets received from the Network layer and encapsulates them into frames • Protocols divide received data into distinct frames • Can then be transmitted by Physical layer • Appends Physical address and Frame check sequence to the frame • Parts of data frame: Destination ID, Sender ID, Control Data • Acknowledges data frames, error checking, and verification • Frame: structured package for moving data • Raw data • “payload” • Sender’s and receiver’s network addresses • Error checking and control information • Error checking accomplished by 4-byte Frame Check Sequence (FCS) field • Ensures data at destination exactly matches data issued from source • When source node transmits data, performs Cyclic Redundancy Check (CRC) to get FCS • Destination node’s Data Link layer services unscramble FCS via same CRC algorithm • Data Link layer divided into two sub-layers: • Logical Link Control • Media Access Control • NDIS works at this level The Data Link Layer Demo

    28. Ethernet Data Frame

    29. IEEE 802 Data Link sub layers • LLC sublayer - Short for Logical Link Control • Provides a common interface to the Network Layer, reliability and flow control • Defines SAPs (Service Access Points) MAC sublayer - Short for Media Access Control • Appends the physical address (MAC address) to the frame and performs error checking • Communicates directly with the media through the network interface card • It converts the frames into bits and puts them on the wire • Defines IEEE LAN standards such as 802.3, 802.4, 802.5, and 802.11

    30. Data Link Layer A NIC’s MAC address

    31. Physical Layer (1) • Bottommost Layer Referred to as the “hardware layer” • Hardware-oriented, establishes and maintains physical link between communication computers • Defines how the cable is attached to the NIC • Packet sent as an unstructured raw bit stream over physical medium • Protocols accept frames from Data Link layer and generate voltage to transmit signals • When receiving data, protocols detect voltage and accept signals • Protocols also set data transmission rate and monitor data error rates • Cannot perform error correction • Network administrators mostly concerned with bottom four layers of OSI Model The Physical Layer Demo

    32. Applying the OSI Model

    33. Communication Between Two Systems Data transformation through the OSI Model

    34. TCP/IP Compared to the OSI Model Models Demo TCP/IP and OSI Models Demo The TCP/IP suite of protocols can be divided into four layers that roughly correspond to the seven layers of the OSI Model. ■ Applicationlayer—Roughly equivalent to the Application, Presentation, and Session layers of the OSI Model. Applications gain access to the network through this layer, via protocols such as the File Transfer Protocol (FTP), Trivial File Transfer Protocol (TFTP), Hypertext Transfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), and Dynamic Host Configuration Protocol (DHCP). ■ Transport layer—Roughly corresponds to the Transport layer of the OSI Model. This layer holds the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), which provide flow control, error checking, and sequencing. All service requests use one of these protocols. ■ Internet layer—Equivalent to the Network layer of the OSI Model. This layer holds the Internet Protocol (IP), Internet Control Message Protocol (ICMP), Internet Group Message Protocol (IGMP), and Address Resolution Protocol (ARP). These protocols handle message routing and host address resolution. ■ Network Interface layer—Roughly equivalent to the Data Link and Physical layers of the OSI Model. This layer handles the formatting of data and transmission to the network wire.

    35. Layers at Which Network Components Operate

    36. Frame Specifications • The two major categories of frame types: • Ethernet • Four types of Ethernet frames • Most popular form characterized by unique way in which devices share a common transmission channel (described in IEEE 802.3 standard) • Token Ring: relies on direct links between nodes and a ring topology • Nodes pass around tokens (control frames that indicate to network when a node is about to transmit data)

    37. IEEE Networking Specifications • Apply to connectivity, networking media, error checking algorithms, encryption, emerging technologies, and more • Specifications fall under IEEE’s “Project 802” • Effort to standardize physical and logical elements of a network

    38. IEEE Networking Specifications

    39. Summary • Standards are documented agreements containing precise criteria that are used as guidelines to ensure that materials, products, processes, and services suit their purpose • ISO’s OSI Model divides networking architecture into seven layers • Each OSI layer has its own set of functions and interacts with the layers directly above and below it • Application layer protocols enable software to negotiate their formatting, procedural, security, and synchronization with the network

    40. Summary (continued) • Presentation layer protocols serve as translators between the application and the network • Session layer protocols coordinate and maintain links between two devices for the duration of their communication • Transport layer protocols oversee end-to-end data delivery • Network layer protocols manage logical addressing and determine routes based on addressing, patterns of usage, and availability

    41. Summary (continued) • Data Link layer protocols organize data they receive from the Network layer into frames that contain error checking routines and can then be transmitted by the Physical layer • Physical layer protocols generate and detect voltage to transmit and receive signals carrying data over a network medium • Data frames are small blocks of data with control, addressing, and handling information attached to them

    42. The End