Chapter 2: the OSI Model

Chapter 2: the OSI Model

Chapter 2: The OSI Model

Chapter 2 Outline

  1. On the Test

2.1. Given an example, identify a MAC address.

2.2. Identify the seven layers of the OSI Model and their functions

2.4. Identify the OSI layers at which the following network components operate: hubs; switches; bridges; routers; network interface cards.

  1. The OSI Model
  2. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework for the rules of data communication.
  3. This model allows any vendor who adheres to the framework to design a component for data communications with the assurance that it can be used with products from any other vendor and provide seamless interoperability.
  1. The Seven Layers
  2. Each layer of the OSI Model adds information to the data packet so that it can be passed to the next layer in the model
  3. Every layer is responsible for a part of the communications process.
  4. To remember the seven layers, there are two mnemonics:
  5. All People Seem To Need Data Processing”
  6. Please Do Not Throw Sausage Pizza Away”
  1. The Physical Layer
  2. The Physical layer defines the way data is transmitted over the physical connections of the network.
  3. Other component characteristics of this layer include physical topology, connection types, signal type, baseband and broadband, and bit synchronization.
  1. Physical Topology
  2. Bus: The bus topology is the easiest to install because all computers connect to the same piece of cable.
  1. Star
  2. The most common physical setup
  3. Requires a hub or switch and is easy to troubleshoot and repair
  1. Ring
  2. Connects nodes in a circle where the nodes can only “talk” to two other nodes – the one immediately preceding on the ring and the one immediately succeeding on the ring.
  3. Data moves in a single direction.
  4. A node can only “talk” if it has a token in its possession.
  1. Mesh
  2. All nodes are physically connected to all other nodes on the network.
  3. This is 100% fault tolerant.
  1. Wireless
  2. Wireless is rapidly emerging in the network communications market.
  3. Wireless systems rely on either radio frequency (RF) or infrared (IR) frequencies to connect directly to each other or to access points (AP).
  4. Wireless devices connect using either ad hoc mode or infrastructure (multipoint networking).
  1. Ad Hoc Mode
  2. In ad hoc mode, devices send out radio waves that can be intercepted by other wireless devices whenever they move within a certain distance range of each other.
  3. The network is created as needed. Network association can be changed by moving the location of the device closer to another wireless device.
  1. Infrastructure (Multipoint networking)
  2. Devices connect to a fixed network through a wireless bridge functioning as an AP.
  3. Usually the AP is wired to the network backbone and serves essentially the same purpose as a switch or hub in a wired network.
  1. Connection Types
  2. Point-to-point connections occur when two computers are connected to each other.
  3. Multipoint connections occur when many devices are connected to the network or transmission media.
  1. Signal Types
  2. Analog signaling uses a continuously varying voltage or signal. Signaling types include Amplitude Shift Keying, Frequency Shift Keying, and Phase Shift Keying.
  3. Digital signaling uses an electrical pulse to transmit data. Signaling types include current-state encoding and state-transition encoding.
  1. Baseband versus Broadband
  2. Baseband and broadband refer to the way the signals are passed across the media.
  3. Baseband transmission allows a single transmission to use the entire bandwidth, while broadband transmission requires that many signals share the same bandwidth.
  4. Bit Synchronization
  5. Bit synchronization is the timing function that allows devices to understand the beginning and end of a transmission.
  6. Asynchronous transmissions require that a start bit begin the transmission and a stop bit close the transmission.
  7. Synchronous transmissions use a clocking signal to identify the beginning and ending of a transmission.
  1. The Data Link Layer
  2. The Data Link layer is subdivided into two sublayers known as the logical link control layer (LLC) and the media access control layer (MAC).
  3. The LLC is responsible for the standards that govern how network communication will take place.
  4. The MAC layer maintains the physical addressing scheme used by network-connected nodes, allowing each node to be uniquely identified as a participant on the network.
  5. The Network Layer
  6. The Network layer is responsible for two important functions: logical addressing of nodes on the network or internetwork and routing of packets from source to destination.
  7. The logical addressing scheme used most frequently is IP addressing, a binary method for building large numbers of unique addresses.
  8. Routing is a store and forward action that allows the best path to be chosen when sending a packet from source node to a destination node.
  9. The Transport Layer
  10. The Transport layer makes sure that the data is transmitted reliably between nodes.
  11. This layer also segments large packets based on the type of network.
  12. Each segment is given a sequence number so that the receiving node can recreate the message correctly.
  13. Transport layer function also includes flow control, or the management of the rate of data transmission.
  14. To maintain reliable delivery of segments, this layer will issue either an ACK (acknowledgement) or a request for retransmission if errors are detected.
  15. The Session Layer: Session layer functions include the management of sessions or conversations between nodes.
  16. The Presentation Layer
  17. The Presentation layer makes sure that both nodes understand in what format the data will arrive.
  18. Its function is that of translator when two different data formats are present.

c.Encryption/decryption are managed at this layer.

d.Compression/decompression of data is managed at this layer.

15.The Application Layer

a.The Application layer provides services to software applications used by a user.

b.Some of the services include file access services, printing services, e-mail services, file transfer services, and file management services.