SYSTEM ADMINISTRATION Chapter 2 The OSI Model

advertisement
SYSTEM ADMINISTRATION
Chapter 2
The OSI Model
The OSI Model
• The OSI Model was designed by the International
Standards Organization (ISO) as a structural
framework for the rules of data communications.
• This model allows any vendor who adheres to the
framework to design a component for data
communications with the assurance that it can be
used with products from any other vendor and
provide seamless interoperability.
The Physical Layer
• The Physical layer defines the way data is
transmitted over the physical connections of the
network.
• Other component characteristics of this layer
include physical topology, connection types,
signal type, baseband and broadband, and bit
synchronization.
Physical Topology
• The physical topology of the network defines the
way the network is laid out, including:
– Cabling (star, bus, mesh, ring, and wireless)
– Interconnection of segments
– Devices
Star
• The star topology is the most commonly used physical
layout for networks today.
• When building a star topology, a hub or switch will be the
central device connecting all nodes on the segment.
• When a node failure occurs, there are three places
where the failure can take place: the port on the hub or
switch, the cable connecting the node and the hub or
switch, or the network interface on the node itself.
• A star topology is relatively easy to set up, and can be
expanded so long as the physical limitations are not
exceeded.
Bus
• The bus topology is the easiest to install and the
most difficult to troubleshoot.
• Cables must be terminated.
• The bus topology has strict physical limitations of
cable length and distance from other nodes.
Mesh
• Mesh networks provide redundant links between all
nodes on the network, thus creating a fault-tolerant
data communications topology.
• The mesh network is time-consuming and
somewhat expensive to install because of the
multiple connections between nodes.
• Troubleshooting mesh networks is relatively easy
because the failure points are easily identified.
Ring
• The ring topology connects nodes in a circle,
allowing only nodes directly connected to talk to
each other.
• Data is transmitted in a single direction only.
• A node can accept and respond to packets
addressed to it, then pass the packets on to the next
node on the ring.
Wireless
• A wireless topology relies on either radio frequency
(RF) or infrared (IR) frequencies, or channels, to
connect directly to each other or to access points
(APs).
• Wireless communication devices connect, or
network, using either ad hoc or infrastructure
networking.
Connection Types
• Point-to-point connections occur when two computers
are connected and exchange information. An example is
modem connections.
• Multipoint connections use many devices connected to
transmission media, sharing the available bandwidth.
The corporate network is an example.
Signal Types
• There are two broad categories of signal types:
digital and analog.
• Analog signals use constantly varying voltages or
waves.
• Digital signals use electrical pulses.
• All signals are subject to deterioration of signal over
distance or attenuation.
• Each category of signal has a set of specific
encoding schemes that allow for the efficient
transmission of the data.
Baseband vs. Broadband
• Baseband and broadband refer to the way the
signals are passed across the media.
• Baseband transmission allows a single
transmission to use the entire bandwidth.
• Broadband transmission requires that many
signals share the same bandwidth.
• Broadband traffic is more efficient for data
transmission.
Bit Synchronization
• Baseband and broadband refer to the way the
signals are passed across the media.
• Baseband transmission allows a single transmission
to use the entire bandwidth.
• Broadband transmission requires that many signals
share the same bandwidth.
• Broadband traffic is more efficient for data
transmission.
The Datalink Layer
• The Datalink layer is subdivided into two sub-layers
known as the Logical Link Control layer (LLC) and
the Media Access Control layer (MAC).
• The LLC is responsible for the standards that
govern how network communication will take place.
• The MAC layer maintains the physical addressing
scheme used by network-connected nodes, allowing
each node to be uniquely identified as a participant
on the network.
The Network Layer
• The Network layer is responsible for two important
functions: logical addressing of nodes on the
network or internetwork and routing of packets from
source to destination.
• The logical addressing scheme used most
frequently is IP addressing, a binary method for
building large numbers of unique addresses.
• Routing is a store and forward action that allows the
best path to be chosen when sending a packet from
source node to a destination node.
The Transport Layer
• The Transport layer makes sure that the data is
transmitted reliably between nodes.
• This layer also segments large packets based on the
type of network.
• Each segment is given a sequence number so that the
receiving node can recreate the message correctly.
• Transport layer function also includes flow control, or the
management of the rate of data transmission.
• To maintain reliable delivery of segments, this layer will
issue either an ACK (acknowledgement) or a request for
retransmission if errors are detected.
The Session Layer
• Session layer functions include the management of
sessions or conversations between nodes.
The Presentation Layer
• The Presentation layer makes sure that both nodes
understand in what format the data will arrive.
• Its function is that of translator when two different
data formats are present.
• Encryption/decryption are managed at this layer.
• Compression/decompression of data is managed at
this layer.
The Application Layer
• The Application layer provides services to software
applications used by a user.
• Some of the services include file access services,
printing services, e-mail services, file transfer
services, and file management services.
Download