|
|
NET 102 - Networking Essentials II
Chapter 1, CompTIA Network+ in a Nutshell; Chapter 2,
Network Models
Objectives:
This lesson introduces the student to networking concepts
relating to models and testing. Objectives
important to this lesson:
- Explain the purpose and function of the OSI model and the
layers of the OSI model
- Describe specific networking services within each layer of
the OSI model
Concepts:
Chapter 1
The author begins chapter 1 in a friendly, conversational tone
that goes on for several pages before page 1. On the bottom of page 1
he informs us that this book complies with standards from CompTIA, the Computing Technology Industry Association.
I don't know why someone chose to use four letters of the first word
when they made that acronym. It is important to know that CompTIA is an
industry association that is not affiliated with a particular company.
CompTIA offers several certifications associated with computer careers.
The text discusses the Network+ certification, and remarks that this
book is meant
to prepare you to take that test. Personally, I think this chapter
about taking the test should be the last chapter, not the first one,
because the author has not taught you anything yet. Review this chapter
after you complete this course for ideas about how to study for the
Network+ test, if you are planning to take it.
Chapter 2
Traffic on a network is broken into packets,smaller message units that
are transmitted more easily on a network. Each packet must hold at least two addresses: that of the sender and that of the recipient. They also hold data, and
numbers that tell the receiving device how to reassemble the pieces of
the message. Chapter 2 is mainly about
one network model, the ISO-OSI
model, which is a logical
(as opposed to physical) model that explains how networks handle their
packets and perform other
useful functions. The text only calls this the OSI,
or Open Systems
Interconnect model. ISO,
the International Organization for Standardization, is another trade
association that sets standards for the computer industry. Note that
ISO is not an acronym. It is based on the Greek word isos, which means same, and stands for their goal of
standardization.
The text says nothing useful for three pages. The author gets
around to what I just told you on page 11. He wants to talk about the
OSI model and another model he
calls the TCP/IP model That
may be one name for it.
A better name is the Department of
Defense, or DoD model.
The Internet was created by the Advanced Research Projects Agency
(ARPA) of the Department of Defense of the United States. The DoD model
is the model that was used. Perhaps the author, and others, are trying
to be politically sensitive. We can call it the TCP/IP
model if he likes.
TCP, by the way, is Transmission Control Protocol, and IP is Internet Protocol. A protocol is a set of rules for how a
program that runs on a network works. IP is for sending packets, TCP is for making sure they get there. The
combination of the two, TCP/IP, is a large part of how the Internet
works.
The OSI Model has seven layers,
each of which has a name and a number.
- 7 - Application
- 6 - Presentation
- 5 - Session
- 4 - Transport
- 3 - Network
- 2 - Data Link
- 1 - Physical
The author tells you the names of the seven layers, and
mentions that some protocols operate only on one layer, but there are
also protocols whose functions span two or more layers. What determines
whether a protocol runs only on one layer? The things it does must fit
the topics, the operational functions, of a layer
for the protocol to belong/live/run on that layer. See the list of layers and topics in the chart below. The chart
shows methods, too. A method
is how you accomplish the
goals of a topic.
So, the author starts explaining the model by telling you some
of the things associated with it.
- In the Physical
layer, we pick a communications medium,
which is usually UTP
(unshielded twisted pair) cable,
because it is inexpensive, easy to use, and it works well. The author
mentions hubs in this layer. A
hub
can also be
called a concentrator, because it is where lots of wires come together
(concentrate). The author confuses the description by saying
that a hub is like a telephone
switchboard,
which most of you have
probably never seen, but Wikipedia has decent pictures. A hub is like a
switchboard in that lots of wires from different devices come together
there. It is also NOT like a switchboard, in that any signal sent into a
hub will come out on ALL the other wires. On a telephone switchboard,
like those shown on Wikipedia, a telephone
operator determined what circuit you needed to be connected to, made
the connection, and your signal only went on that circuit. That's why
we don't use hubs any more: we use switches, which do what the operator
did.
A lot of other topics are covered by the physical layer of the OSI
model. In the chart below, you can see that this layer has more topics
that any other. We will talk about them more as we go along.
- The author uses the Network
Interface Card (NIC) as
a reason to go to the Data-Link
layer. Network cable connects to the NIC, which connects a computer to
the network. NICs belong on the Data-Link layer because they have addresses
that are hard coded (burned in) to them. This kind of address is also
called a physical address, but that does not place the NIC on the
Physical layer. A better name for the address is a MAC address, because the address is
used for Media Access Control,
which has to do with how devices share the medium. Before we can make
them share, we have to tell them apart, so we use addresses. The text
shows an example of a MAC address written two ways: as twelve hexadecimal characters with
no breaks, and as six pairs
of hexadecimal characters with hyphens between them. (Sometimes they
use colons instead of hyphens.) The paired format is easier to read,
and if you see a lot of them, it makes it easier to notice that the
first six characters in a MAC address identify a manufacturer. (Large
manufacturers have lots of six character sequences assigned to them.) I
just checked my MAC address with the procedure on page 15, and saw that
it begins 5C-26-0A. Google that, and tell me what kind of computer I am
using.
After remarking that computers and NICs may send signals with
electricity, light, or radio waves, the author turns to a new idea: frames. I already said that we break
signals into packets. Well, you should know that we also collect data
into usable clumps or
clusters. On the Data Link layer, where NICs live, those clusters are
called frames. Many frame types have been created over the years. For
any two devices on the same network to communicate, they must send and
receive frames of the same type. (Devices that connect one network to
another can translate frames from one type to another.) One year I ran
into several new computers that were configured with a default frame
type (802.3) that was not the type our network used. Guess what? Users
could not log in to the network on those computers until they were
reconfigured to use Ethernet II frames. Once I diagnosed the problem, I
told my staff what to do, and it was a ten minute fix for every device
that had the problem.
At the top of page 17, there is a diagram of a generic frame, which shows four elements that you can expect a frame to hold: the destination MAC address, the source MAC address, the data being sent, and an FCS, which is a Frame Check Sequence, which is an error check for the data in the frame.
The author mentions that different networks use different size frames.
This is true. He then says that frames hold about 1500 bytes of data.
That is not so true. Some frame types hold different amounts of data,
some less than 1500 bytes. 1500 bytes is a typical limit on the data field size.
The author also tells you that every
device on a network can see every
frame that is transmitted on it. There are exceptions,
especially when we start breaking networks into subnets, but in his simple example
the statement is true. His point is that a frame is usually addressed
to a particular NIC, because
frames use MAC addresses.
(They hold the MAC address of the sender and the receiver.)
Because of this, only the device whose MAC address matches a frame will process that
frame. There are two exceptions to this rule. First, as the author
explains, a frame sent to the broadcast
address (FF-FF-FF-FF-FF-FF) of
a network. will be processed by all
devices. That address, by the way, is the broadcast address for frames
on any network, not just a particular one. In the second case, a
network admin may set the NIC on device to work in promiscuous mode, which means that
it processes all frames, which
is useful in monitoring activity on a network.
Regarding the broadcast MAC address, that address can be used to make a
general request to all devices on a system, asking them to respond with
their MAC addresses and some kind of device name. There are several systems of naming, which we will see in a later chapter.
On page 21, the author mentions in a marginal note that the Data Link
layer is the only OSI layer with sublayers. They are the MAC sublayer
and the LLC sublayer. He describes some of the functions of each
sublayer, and calls it good. There are other topics that belong there:
- MAC sublayer
- Logical Topology - 2 methods:
- Bus - passes frames to all devices at once
- Ring - passes frames from one device to
the next in a circular path
- Media Access - 3 methods:
- Contention - devices transmit when they
need to, if the line is clear
- Token Passing - devices take turns
transmitting
- Polling - devices are asked if they need
to transmit
- Addressing - 1 method:
- Physical Device Address - the MAC address
- LLC sublayer
- Transmission Synchronization - 3 methods:
- Synchronous - devices send markers for
signal timing in each conversation
- Asynchronous - devices send markers for
signal timing in each frame
- Isochronous - devices use a common
network timing signal
- Connection Services - 3 methods:
- Unacknowledged Connectionless - no
guarantee of delivery
- Connection Oriented - guaranteed delivery
- Acknowledged Connectionless - usually
point-to-point, so connection services not needed
- Data cluster type: Frames
|
- When the world was new and there were only four computers
that were about to be connected to what would become the Internet, the
kind of networking that only used layers 1 and 2 may have been enough.
When it was first turned on (1969), the ARPANET
connected computer networks at only four locations: UCLA,
Stanford University, UC Santa
Barbara, and the University of Utah. When
the first message was sent on it, the connection failed before the
first word was completely sent. Things got better.
As soon as it became a goal to connect
separate networks together, the ARPANET planners knew it would be
necessary to use a method that named
networks as well as
the devices on them. Several methods of accomplishing this have been
devised by different vendors. The method that has become dominant is the one that is used on
the Internet, IP addressing.
In this section about the Network
layer, the author tells us that TCP and IP are only two
protocols out of a much larger suite of protocols. Internet Protocol (IP) is used for an addressing scheme
that includes a reference to an individual
device, and to the network
it is on. IP lives on the Network
layer, Layer 3. On an IP network, each device (node) is known as
a host, and every host must have an address.
The addresses we discuss first are actually IP version 4
addresses. (IPv6 addresses will be 16 bytes,
or 128 bits long.) IP version 4 addresses are numeric
addresses, stored as four bytes, which is equal to 32
bits. For example: an IP v.4 address might be 10.45.17.122.
Each of the four numbers is held on one byte, which means no number can
be bigger than 255. IP addresses contain two parts:
one part of the address identifies the network a host
is on, and the other part identifies the host itself.
Every network is assigned an address which could take
up one, two, or three bytes, depending on the class
of the network (A, B, or C). The remaining byte or bytes are typically
used for hosts on networks. (It gets more complex:
this is how we start.)
In the example above, the 10
(in the first byte) might be the network identifier, or it might be the 10 and
the 45 (in the first two
bytes) or it could be the 10,
the 45, and the 17 (in the first three bytes),
depending whether we are treating this network as a class A, B, or C network. Or we could treat it as a
classless network, in which case it gets messy. We'll worry about that
later.
IP addresses, and any
addresses associated with the Network
layer, are logical addresses.
This means they are not permanently associated with a piece of hardware
like a MAC address and a NIC. A logical address is assigned to a device, by an administrator, by a user, or by a network device assigned to do so. The text
shows a picture of a router on page 24, which appears to be a typical
consumer device you might buy from most electronic stores. This is an
example of a device that would assign an IP address to any other device
that is connected to one of its switch ports. It does so because it
acts like a switch (connecting
devices on a small network), like a router
(connecting your network to your Internet Service Provider's network),
and like a Dynamic Host Configuration
Protocol (DHCP) server,
which is a device or program that assigns IP addresses to devices on a
network. The DHCP service makes note of the MAC address of each device
it gives an IP address to, to make sure it does not give out the same
IP address to two currently connected devices. Giving the same address
to two devices would keep at least one of them from being able to use
the network.
The text finally mentions the word packet,
and tells you that a packet is a message unit that is used on the
Network layer. In fact, the correct
word for the Network layer is datagram, but
the author apologizes in a marginal note on page 27, stating that he is
using the word packet in a generic way. His point is that there
is a Network layer message unit inside each frame. He does not explain
why. I am beginning to imagine our author, a deserted building, and a
pair of pliers. Okay, I feel better now. Let me explain something.
Imagine the diagram below as the stack of protocols being used to send a
signal out onto the Internet.
- As I prepare this signal to go, I start at the Application layer, where the message
is packaged by Application
layer rules, then passed down to the Presentation layer.
- The Presentation layer
receives the message, repackages it as
needed by its rules, keeping the information from the Application layer
inside the packets it makes,
then hands its packets off to the Session layer.
- The Session
layer negotiates a connection with the next machine it needs to send
to, which it does while it takes the received Presentation packets and
repackages them as Session packets.
These are handed off to the Transport layer.
- The Transport layer
continues the pattern: add your magic, wrap it around the
received packets, and put them all in your own message units called segments. The segments are handed
off to the Network layer.
- The Network
layer continues: it does its thing, adds IP addresses for source and destination, rewraps the segments as
datagrams, and
hands them to the Data Link layer.
- The Data Link
layer does not change what is in the datagrams, but it adds MAC
addresses for source and destination. (Some real magic happens here. If
the author never gets to it, I will tell you later.) The datagrams are
rewrapped as frames, and they
are pushed to a network on the Physical layer.
- The Physical
layer takes the frames, which are perceived as a stream of bits, moves them as needed to the
next device, again and again, until the stream is processed by a NIC on
a receiving machine, which may be the final destination or a router
along the way.
That's what happens, from layers 7
through 1, in the machine sending
a message. On the final destination
machine, the received message is processed through the layers from layers 1 through 7, until the
message is received by a program that knows what to do with it. That is
why there are IP packets inside the frames that the Network layer
opens. They were put there by the Network layer processes of the
sending machine. And this is why we usually explain this process from
the top down instead of from the bottom up.
- Layer 4 is the Transport layer. As I have mentioned, its data units are called segments, and one of the processes of this layer is called segment development. What that means is actually simple: large messages that won't fit in one segment are broken down and the pieces are placed in two or more segments. Sometimes a message is very small, in which case the segment it is placed into would not be full. Segments are required to be full, so extra bits are generated to be used as filler.
The text tells us that the segments of a larger message are given numbers so they can be reassembled at their destination. This is not unique to this layer. Any layer that packages things into packet does the same thing.
The text does not mention that the TCP protocol operates on the Transport layer, which makes this layer associated with the word reliable. The author almost says this in the last sentence in this section. What he means to say is that if a packet is lost or received in a damaged state, a replacement copy of the packet is requested. This is one aspect of reliable, guaranteed delivery.
- Layer 5 is the Session layer, which the text explains as being useful when any device is doing more than one thing at a time on the network. Have you ever had two browser windows open at once? When you click something in one of those windows (or tabs), how does the computer know where to put the response to that click? Each of those windows is assigned a different session ID, which is used in any requests that are sent from it. This assignment of session IDs takes place for other kinds of connections as well, for any program that establishes a connection to a service across a network.
- Layer 6 is the Presentation layer, which our author seems to think does nothing, since all files are stored in common formats in the 21st century. I think the author and I had different teachers for this course. Files can still be stored by different methods on mainframes as opposed to PC based servers, bytes can still be sent across a wire most significant digit first or last, and most importantly files can be encrypted. Encryption services live on the Presentation layer.
- The Application layer is layer 7, the top layer in the OSI model. The author makes the point that this layer is about the network interfaces that exist so that application programs can use network services, like file service, print services, and message services.
DoD layer name
(and TCP/IP name) |
OSI Layer name
|
Topics & Methods |
Process/Application layer
(Application layer)
|
Application
(layer 7)
|
- Network Services
- File services
- Print services
- Message services
- Application services
- Database services
- Service Advertisement - how services become known
- Service Use - how services are obtained
- Data cluster type: Messages
|
Presentation
(layer 6)
|
- Translation - bit translation, byte translation,
character code translation, file translation
- Encryption - cipher, private key, or public key
- Data cluster type: Packets
|
Session
(layer 5)
|
- Dialog Control - simplex, half-duplex and duplex
- Session Administration - connection establishment,
data transfer, and connection release
- Data cluster type: Packets
|
Host-to-Host
layer
(Transport layer)
|
Transport
(layer 4)
|
- Address/name Resolution
- Addressing
- Segment Development - breaking large messages into
segments,
combining small messages into segments
- Connection Services
- Data cluster type: Segments
|
Internet
layer
(Internet layer)
|
Network
(layer 3)
|
- Addressing - network addresses. 2 methods:
- Switching - route creation for packets, messages and
circuits. 3 methods:
- Packet switching
- Message switching
- Circuit switching
- Route Discovery - finding a route. 2 methods:
- Distance vector
- Link-state
- Route Selection - choosing a route. 2 methods:
- Connection Services - flow control, error control and
packet sequence control. 3 methods:
- Network-layer flow control
- Error control
- Packet sequence control
- Data cluster type: Datagrams
|
Network Access layer
(Link layer) |
Data
Link
(layer 2)
|
- MAC sublayer
- Logical Topology - 2 methods:
- Media Access - 3 methods:
- Contention
- Token Passing
- Polling
- Addressing - 1 method:
- Physical Device Address - the MAC address
- LLC sublayer
- Transmission Synchronization - 3 methods:
- Synchronous
- Asynchronous
- Isochronous
- Connection Services - 3 methods:
- Unacknowledged Connectionless
- Connection Oriented
- Acknowledged Connectionless
- Data cluster type: Frames
|
Physical
(layer 1)
|
- Connection Type - 2 methods:
- Point-to-Point
- Multipoint
- Physical Topology - 5 methods:
- Bus
- Ring
- Star
- Mesh
- Cellular
- Digital Signaling - 2 methods:
- Current State
- State Transition
- Analog Signaling - 2 methods:
- Current State
- State Transition
- Bit Synchronization - 2 methods:
- Bandwidth Usage - 2 methods:
- Multiplexing - 3 methods:
- Frequency Division
- Time Division
- Statistical Time Division
- No data clusters, just bits
|
The text moves on to the TCP/IP model, which is not actually different from the OSI model, it is more like just being a different way of looking at the OSI model. In the introduction to this section, the text explains that this model's Link layer is also called the Network Interface Layer. Really, guys? Kind of like the DoD model? Then what was the point in pretending that this is a new model? Hand me the pliers, Finch. Somebody at CompTIA needs to answer some questions.
Bottom line, it appears that CompTIA will put some questions on its test about its own spin on the DoD model, so you will want to know about its version in order to pass the test.
- Link (Network Interface) layer - this layer describes how networks are laid out, and how devices share access to the network medium
- Internet layer - this layer finds routes from one network to another, addresses devices and networks, and provides access to gateways between networks. A short list of protocols that work on this layer: IP, ICMP, ARP, and RARP
- Transport (Host-to-host) layer - Your book refers to this as the Transport layer, which is its name in the OSI model. Traditionally, it is called the Host-to-host layer in the DoD model. The purpose of this layer is to provide reliable delivery of packets across networks. The protocol that provides this function is TCP. Another protocol, UDP, also functions on this layer, but UDP is considered connectionless.
- Application (Process/Application) layer - this layer provides access to network services for applications that run on a client workstation. Some protocols that function on this layer: HyperText Transfer Protocol (HTTP) for the World Wide Web, Simple Mail Transfer Protocol (SMTP) for e-mail, and File Transfer Protocol (FTP) for uploading and downloading files.
The text introduces a concept on page 34 that is important to understand. We have talked about several protocols that are used on most networks. One way of looking at these protocols is to determine whether they are connection-oriented or connectionless. Connection-oriented protocols make sure things are delivered. Connectionless protocols just send and hope for the best. You generally use connectionless protocols when you are transmitting a short distance over a known medium, like sending directly to a printer. Otherwise, connectionless protocols are used together with a connection-oriented protocol to make sure the packets are delivered.
- Transmission Control Protocol (TCP), is connection-oriented. This is the protocol that makes the TCP/IP suite reliable. It operates in the Transport (Host-to-Host) layer.
- User Datagram Protocol (UDP) operates in the Transport (Host-to-Host) layer, but it is connectionless, so it is faster than TCP. Connectionless protocols send their data but they do not check to see if the intended receiver got the data.
- Internet Protocol (IP) is a connectionless protocol that supports routing (finding paths to networks), fragmentation (breaking data into numbered pieces) , and reassembly (reassembling the pieces into usable data). It operates in the Network (Internet) layer.
Note: if you have to decide whether a protocol is connectionless (IP, IPX, UDP) or connection-oriented (TCP, SPX), it is connectionless if it starts with a vowel. This trick only applies to protocols that you need to categorize this way.
|