1. Trang chủ
  2. » Công Nghệ Thông Tin

CCNA 1 and 2 Companion Guide, Revised (Cisco Networking Academy Program) part 11 pps

10 395 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 10
Dung lượng 259,95 KB

Nội dung

Networking Models 69 is responsible for a specific part of network communication. These layers interact with the layer above and below them only. This interaction very narrowly defines a layer’s purpose. The two common network models that use layers are the Open System Inter- connection (OSI) reference model and the TCP/IP reference model. The OSI Reference Model The early development of LANs, MANs, and WANs was chaotic in many ways. The early 1980s saw tremendous increases in the number and size of networks. As compa- nies realized the money they could save and the productivity they could gain by using networking technology, they added networks and expanded existing networks almost as rapidly as new network technologies and products were introduced. By the mid-1980s, these companies began to experience difficulties from all the imple- mented expansions. It became more difficult for networks that used different specifica- tions and implementations to communicate with each other. These companies realized that they needed to move away from proprietary networking systems. Proprietary sys- tems are privately developed, owned, and controlled. In the computer industry, propri- etary is the opposite of open. Proprietary means that one company or a small group of companies controls all usage of the technology. Open means that free usage of the technology is available to the public. To address the problem of network incompatibility and the inability to communicate with one another, the International Organization for Standardization (ISO) researched different network schemes, such as DECnet, Systems Network Architecture (SNA), and TCP/IP, to find a set of rules. As a result of this research, the ISO created a net- work model that would help vendors create networks that would be compatible and operate with other networks. The process of breaking down complex communications into smaller discrete tasks can be compared to the process of building an automobile. When taken as a whole, the design, manufacture, and assembly of an automobile is a highly complex process. It is unlikely that a single person would know how to perform all the required tasks to build a car from scratch. This is why mechanical engineers design the car, manufactur- ing engineers design the molds to make the parts, and assembly technicians each assemble a part of the car. The OSI reference model, released in 1984, was the descriptive scheme that the ISO created. This reference model provided vendors with a set of standards that ensured greater compatibility and interoperability among the various types of network technol- ogies that were produced by many companies around the world. 1102.book Page 69 Tuesday, May 20, 2003 2:53 PM 70 Chapter 2: Networking Fundamentals The OSI reference model is the primary model used as a guideline for network commu- nications. Although other models exist, most network vendors today relate their prod- ucts to the OSI reference model, especially when they want to educate users on the use of their products. The OSI reference model is considered the best tool available for teaching people about sending and receiving data on a network. The OSI reference model defines the network functions that occur at each layer. More importantly, it is a framework that facilitates an understanding of how information travels throughout a network. In addition, the OSI reference model describes how information, or data packets, travels from application programs (such as spreadsheets and documents) through a network medium (such as wires) to another application program that is located in another computer on a network, even if the sender and receiver have different types of network media. The OSI reference model has seven numbered layers, each of which illustrates a partic- ular network function: ■ Layer 7—Application layer ■ Layer 6—Presentation layer ■ Layer 5—Session layer ■ Layer 4—Transport layer ■ Layer 3—Network layer ■ Layer 2—Data link layer ■ Layer 1—Physical layer This separation of networking functions is called layering. Dividing the network into seven layers provides the following advantages: ■ It breaks network communication into smaller, simpler parts. ■ It standardizes network components to allow multiple-vendor development and support. ■ It allows different types of network hardware and software to communicate. ■ It prevents changes in one layer from affecting the other layers so that they can be developed more quickly. ■ It breaks network communication into smaller components to make learning easier. By working through the layers of the OSI reference model, you will understand how data packets travel through a network and what devices operate at each layer. As a result, you will understand how to troubleshoot network problems if they occur dur- ing data packet flow. 1102.book Page 70 Tuesday, May 20, 2003 2:53 PM Networking Models 71 OSI Layers and Functions Each OSI layer has a set of functions that it must perform for data packets to travel from a source to a destination on a network. The following sections briefly describe each layer in the OSI reference model. Layer 7: The Application Layer The application layer is the OSI layer that is closest to the user. It provides network services to the user’s applications. It differs from the other layers in that it does not provide services to any other OSI layer; instead, it provides services only to applica- tions outside the OSI model. Examples of such applications are spreadsheet programs and word-processing programs. The application layer establishes the availability of intended communication partners and also synchronizes and establishes agreement on procedures for error recovery and control of data integrity. Examples of the Layer 7 applications include Telnet and HTTP. Layer 6: The Presentation Layer The presentation layer ensures that the information that the application layer of one system sends out can be read by the application layer of another system. If necessary, the presentation layer translates among multiple data formats by using a common for- mat. One of the more important tasks of this layer is encryption and decryption. The common Layer 6 graphic standards are PICT, TIFF, and JPEG. Examples of Layer 6 standards that guide the presentation of sound and movies are MIDI and MPEG. Layer 5: The Session Layer As its name implies, the session layer establishes, manages, and terminates sessions between two communicating hosts. The session layer provides its services to the pre- sentation layer. It also synchronizes dialogue between the two hosts’ presentation lay- ers and manages their data exchange. In addition to handling session regulation, the session layer offers provisions for efficient data transfer, class of service, and exception reporting of session layer, presentation layer, and application layer problems. Exam- ples of Layer 5 protocols are the Network File System (NFS), X-Window System, and AppleTalk Session Protocol (ASP). Layer 4: The Transport Layer The transport layer segments data from the sending host’s system and reassembles it into a data stream on the receiving host’s system. The boundary between the transport layer and the session layer can be thought of as the boundary between application pro- tocols and data-flow protocols. Whereas the application, presentation, and session 1102.book Page 71 Tuesday, May 20, 2003 2:53 PM 72 Chapter 2: Networking Fundamentals layers are concerned with application issues, the lowest four layers are concerned with data-transport issues. The transport layer attempts to provide a data-transport service that shields the upper layers from transport-implementation details. Specifically, issues such as reliability of transport between two hosts are the concern of the transport layer. In providing com- munication service, the transport layer establishes, maintains, and properly terminates virtual circuits. Transport error detection and recovery and information flow control are used to provide reliable service. Examples of Layer 4 protocols are Transmission Control Protocol (TCP), User Datagram Protocol (UDP), and Sequenced Packet Exchange (SPX). Layer 3: The Network Layer The network layer is a complex layer that provides connectivity and path selection between two host systems that might be located on geographically separated networks. Additionally, the network layer is concerned with logical addressing. Examples of Layer 3 protocols are Internet Protocol (IP), Internetwork Packet Exchange (IPX), and AppleTalk. Layer 2: The Data Link Layer The data link layer provides reliable transit of data across a physical link. In so doing, the data link layer is concerned with physical (as opposed to logical) addressing, net- work topology, network access, error notification, ordered delivery of frames, and flow control. Layer 1: The Physical Layer The physical layer defines the electrical, mechanical, procedural, and functional speci- fications for activating, maintaining, and deactivating the physical link between end systems. Such characteristics as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors, and other similar attributes are defined by physical layer specifications. Peer-to-Peer Communications For data packets to travel from the source to the destination, each layer of the OSI model at the source must communicate with its peer layer at the destination. This form of communication is called peer-to-peer communication. During this process, the pro- tocols at each layer exchange information, called protocol data units (PDUs), between peer layers. Each layer of communication on the source computer communicates with a layer-specific PDU and with its peer layer on the destination computer, as shown in Figure 2-17. 1102.book Page 72 Tuesday, May 20, 2003 2:53 PM Networking Models 73 Figure 2-17 Peer-to-Peer Communication Data packets on a network originate at a source and then travel to a destination. Each layer depends on the service function of the OSI layer below it. To provide this service, the lower layer uses encapsulation to put the PDU from the upper layer into its data field. Each layer then adds whatever headers it needs to perform its function. As the data moves through the layers of the OSI model, additional headers are added. The group- ing of data at the Layer 4 PDU is called a segment. The network layer provides a service to the transport layer. The network layer moves the data through the internetwork by encapsulating the data and attaching a header to create a packet (the Layer 3 PDU). The header contains information required to com- plete the transfer, such as source and destination logical addresses. The data link layer provides a service to the network layer. It encapsulates the network layer information in a frame (the Layer 2 PDU). The frame header contains the physical addresses required to complete the data link functions, and the frame trailer contains the frame check sequence (FCS), which is used by the receiver to detect whether the data is in error. This then becomes the data that is passed down to the physical layer. The physical layer provides a service to the data link layer. The physical layer encodes the data link frame into a pattern of 1s and 0s (bits) for transmission on the medium (usually a wire) at Layer 1. Network devices such as hubs, switches, and routers work at the lowest three layers. Hubs operate at Layer 1, switches operate at Layer 2, and routers at Layer 3. The first layer that deals with the end-to-end transport between end users is the transport layer (Layer 4). 1102.book Page 73 Tuesday, May 20, 2003 2:53 PM 74 Chapter 2: Networking Fundamentals DoD (TCP/IP) Model Although the OSI reference model is universally recognized, the historical and techni- cal open standard of the Internet is Transmission Control Protocol/Internet Protocol (TCP/IP). The TCP/IP reference model and the TCP/IP protocol suite make data com- munication possible between any two computers anywhere in the world at nearly the speed of light. The TCP/IP model has historical importance, just like the standards that allowed the telephone, electrical power, railroad, television, and videotape industries to flourish. The U.S. DoD provided funding for the invention of the TCP/IP reference model because it wanted a network that could survive any conditions, even a nuclear war. To illus- trate further, imagine a world at war, criss-crossed by different kinds of connections, including wires, microwaves, optical fibers, and satellite links. Then imagine that information/data (in the form of packets) must flow, regardless of the condition of any particular node or network on the internetwork (which, in this case, might have been destroyed by the war). The DoD wants its packets to get through every time, under any conditions, from any one point to any other point. This very difficult design problem brought about the creation of the TCP/IP model, which has since become the standard on which the Internet has grown. When reading about the TCP/IP model layers, remember the original intent of the Internet; it helps explain why certain things are as they are. The TCP/IP model, as shown in Figure 2-18, has four layers: ■ The application layer ■ The transport layer ■ The Internet layer ■ The network access layer Figure 2-18 The TCP/IP Model Application (Layer 7) Presentation (Layer 6) Session (Layer 5) Transport (Layer 4) Network (Layer 3) Data Link (Layer 2) Physical (Layer 1) OSI Application Transport Internet Network Access TCP/IP 1102.book Page 74 Tuesday, May 20, 2003 2:53 PM Networking Models 75 It is important to note that some of the layers in the TCP/IP model have the same names as layers in the OSI model. However, do not confuse the layers of the two models. Even with the same name, most the layers have the same functions in each model, but some do not. Detailed Encapsulation Process All communications on a network originate at a source and are sent to a destination. The information that is sent on a network is called data or data packets. If one com- puter (Host A) wants to send data to another computer (Host B), the data must first be packaged by a process called encapsulation. Encapsulation Encapsulation wraps data with the necessary protocol information before network transit. Therefore, as the data moves down through the layers of the OSI model, each OSI layer adds a header (and also a trailer at Layer 2) to the data before passing it down to a lower layer. The headers and trailers contain control information for the network devices and receiver, to ensure proper delivery of the data and to ensure that the receiver can properly interpret the data. For example, think of a header as an address on an envelope. An address is required on the envelope so that the letter inside the envelope can be delivered to the desired recipient. To see how encapsulation occurs, examine the manner in which data travels through the layers, as illustrated in Figure 2-19. After the data is sent from the source, it travels through the application layer down through the other layers. The packaging and flow of the data that is exchanged go through changes as the layers perform their services for end users. The data, in the form of electronic signals, must travel across a cable to the correct destination computer and then be converted to its original form to be read by the recipient. As you can imagine, several steps are involved in this process. For this rea- son, developers of hardware, software, and protocols recognized that the most efficient way to implement network communications would be as a layered process. Lab Activity OSI Model and TCP/IP Model In this exercise, you describe and compare the layers of the OSI and TCP/IP models. You also name the TCP/IP protocols and utilities that operate at each layer. NOTE The word header means that informa- tion was added to the front of the packet, just as trailers are added to the end. In addition, an address is an important piece of information that gets added. 1102.book Page 75 Tuesday, May 20, 2003 2:53 PM 76 Chapter 2: Networking Fundamentals Figure 2-19 Encapsulation As illustrated in Figure 2-20, networks must perform the following five conversion steps to encapsulate data: Step 1 Build the data—As a user sends an e-mail message, its alphanumeric characters are converted to data that can travel across the internetwork. Step 2 Package the data for end-to-end transport—The data is packaged for internetwork transport. By using segments, the transport function ensures that the message hosts at both ends of the e-mail system can communicate reliably. Step 3 Append (add) the network address to the header—The data is put into a packet or datagram that contains a network header with source and des- tination logical addresses. These addresses help network devices send the packets across the network along a chosen path. Step 4 Append (add) the local address to the data link header—Each network device must put the packet into a frame. The frame allows connection to the next directly-connected network device on the link. Each device in the chosen network path requires framing to be connected to the next device. Step 5 Convert to bits for transmission—A clocking function lets the devices distinguish these bits as they travel across the medium. The medium on the physical internetwork can vary along the path used. For example, the e-mail message can originate on a LAN, cross a campus backbone, and go out a WAN link until it reaches its destination on another remote LAN. Headers and trailers are added as data moves down through the layers of the OSI model. 1102.book Page 76 Tuesday, May 20, 2003 2:53 PM Networking Models 77 Figure 2-20 Data Encapsulation Process De-Encapsulation When the remote device receives a sequence of bits, the physical layer at the remote device passes the bits to the data link layer for manipulation. The data link layer does the following: Step 1 Verifies that the MAC destination address matches this station’s address or is an Ethernet broadcast. If neither of these situations is true, the frame is discarded. Step 2 If the data is in error, it can be discarded, and the data link layer might ask for the data to be retransmitted. If the data is not in error, the data link layer reads and interprets the control information in the data link header. Step 3 The data link layer strips the data link header and trailer and then passes the remaining data up to the network layer based on the control informa- tion in the data link header. This process is called de-encapsulation. Each subsequent layer performs a similar de- encapsulation process. Think of the de-encapsulation process as the process of reading the address on a letter to see if it is for you and then removing the letter from the enve- lope if the letter is addressed to you. More Information: Cyclical Redundancy Check Each data packet has information added to the raw data itself, in the form of packet headers. The headers contain addressing information so that the packets reach the correct destination. They also contain sequencing information so the data can be reassembled accurately when all packets reach the receiving computer. continues 1102.book Page 77 Tuesday, May 20, 2003 2:53 PM 78 Chapter 2: Networking Fundamentals Networking Devices Equipment that connects directly to a network segment is called a device. These devices are broken into two classifications: ■ End user devices—Include computers, printers, scanners, and other devices that provide services directly to the user. ■ Network devices—Include all devices that connect the end-user devices to allow them to communicate. End-user devices that provide users with a connection to the network are also called hosts. Figure 2-21 shows an example of an end-user device—a workstation. Figure 2-21 End-User Device: Workstation Header information is placed at the head of the packet, in front of the original data. Packets also can include trailer information, which is appended to the back of the packet, following the orig- inal data. The error-checking component in the trailer is called a cyclical redundancy check (CRC). The CRC performs calculations on the packet before it leaves the source computer and again when it reaches the destination. If the results of these calculations are different, the data has changed. This can occur because of a disruption of the electrical signals that represent the 0s and 1s making up the data. If a discrepancy is found, that packet can be resent. More Information: Cyclical Redundancy Check (Continued) 1102.book Page 78 Tuesday, May 20, 2003 2:53 PM . layer-specific PDU and with its peer layer on the destination computer, as shown in Figure 2 -17 . 11 02. book Page 72 Tuesday, May 20 , 20 03 2: 53 PM Networking Models 73 Figure 2 -17 Peer-to-Peer Communication Data. between application pro- tocols and data-flow protocols. Whereas the application, presentation, and session 11 02. book Page 71 Tuesday, May 20 , 20 03 2: 53 PM 72 Chapter 2: Networking Fundamentals layers. information that gets added. 11 02. book Page 75 Tuesday, May 20 , 20 03 2: 53 PM 76 Chapter 2: Networking Fundamentals Figure 2 -19 Encapsulation As illustrated in Figure 2- 20, networks must perform

Ngày đăng: 04/07/2014, 18:20

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN