Chapter II - Austin Community College

Download Report

Transcript Chapter II - Austin Community College

OSI Model and Standards
ITNW 1325, Chapter II
Understanding the OSI Model
Understanding the OSI Model
Overview:
 Open Systems Interconnection (OSI) – a layered
reference model comprised of seven functional layers
 Developed by the International Organization for
Standardization (ISO) in 1984 – based on their analysis
of TCP/IP, IBM SNA, and DECNET protocols
 Governed by the ISO Standard 7498 – some vendors
build their products according to it (Novell)
 Ensures compatibility and solves communication issues
among different implementations of network hardware
and software
Understanding the OSI Model
Overview (continued):
 Uses the divide-and-conquer approach to networking
from low-level hardware to the high-level software
 Constructs a series of independent but interconnected
layers – breaks the big problem of communications into
smaller problems that are isolated from each other
 Individual layers encapsulate specific independent
functions – changes to one layer don’t affect other ones
 Implements the “peer communication” principle – only
identical remote layers communicate to each other
Understanding the OSI Model
Overview (continued):
 “Universal” resembles “imperfect” – some network
functions operate at several layers, while some do not
require services from every layer
 Practical usage is questioned by many because of its
complexity and lack of flexibility
The OSI networking model remains a great tool for learning
networks – protocols, devices security, and other models
Understanding the OSI Model
Reasons for Layering:
 Divides communications into a finite number of logical
blocks – simplifies comprehension and use
 Provides design modularity – allows upgrades to a
specific layer to remain separate from the other ones
 Allows programmers to specialize in a particular layer
of the networking model, with open set of specifications
 Encourages interoperability by promoting balance
between different networking models
 Allows vendors to produce standardized interfaces
Understanding the OSI Model
Seven Layers:
Understanding the OSI Model
From a meaningless sequence:
Application (L7)
Presentation
Session
Transport
Network
Data Link
Physical (L1)
To the meaningful phrase:
All
People
Seem
To
Need
Data
Processing
Understanding the OSI Model
From a meaningless sequence:
Application (L7)
Presentation
Session
Transport
Network
Data Link
Physical (L1)
To the meaningful phrase:
Away
Pizza
Sausage
Throw
Not
Do
Please
Understanding the OSI Model
Peer Communication, Overview:
 Each layer is unaware of the activities of all other ones
on the same host – doesn’t acknowledge their services
 Each layer only communicates logically to an identical
layer on the other side of the communication process –
information is passed via headers and trailers added
 Headers and trailers added at the sending layer will be
read and removed at the peer layer on the other side
 Protocol suites combine protocols defined at different
layers together to enable network communications
Understanding the OSI Model
Peer Communication, Illustration:
Understanding the OSI Model
Peer Communication, Advantages:
 Allows convenient distribution of networking functions
 Permits independent error checking on different layers
 Simplifies creation of protocols
Peer Communication, Disadvantages:
 Results in overhead that grows as data traverses the
model from the Application to the Data Link layer
 Leads to reduced efficiency of network utilization
OSI Layer Functions
OSI Layer Functions
Application (L7):
 Defines network services that software applications
(browsers, e-mail clients, etc) can request from the
network and requests the services on their behalf
 Accepts data from applications and interprets their
formatting and procedures to the network
 Interprets data coming from the network and passes it to
proper applications
 Facilitates multiple important protocols – HTTP, FTP,
DNS, Telnet, SMTP, SNMP, etc.
OSI Layer Functions
Presentation (L6):
 Receives data from the Application layer and prepares it
for transmission over the network
 Reformats the incoming data from lower layers for
specific machine/application combination
 Performs encryption and compression of data for
outbound communications – as well as decryption and
decompression of data for inbound communications
 The only layer that restructures data – other ones add
headers and/or trailers without reconfiguring the data
OSI Layer Functions
Presentation (continued):
 Distinguishes between file extensions and coding
schemes – BMP, JPG, WAV, MP3, ASCII, HTML, etc.
 Example – Presentation layer protocols encode online
music tracks into MP3 format
 Example – Presentation layer protocols interpret JPG
images so that HTTP is able to understand them
 Example – Presentation layer protocols encode text
using ASCII and other schemes
 Example – Presentation layer protocols encode/decode
sensitive data within secure Internet connections
OSI Layer Functions
Session (L5):
 Allows senders and receivers to establish and manage
data transmission session – independently of the actual
data flow over the network
 Detects if the transmission has been cut off, notifies the
client software, and restart its at the appropriate point
 Determines the order of communication, maximum
duration of transmission, and provides clocking or
timing for the session
 Assists large data transfers – informs the receiver about
the beginning/end of the stream that’s broken in pieces
OSI Layer Functions
Session (continued):
 Allows information of different streams – that may be
originating from different sources – to be properly
combined or synchronized
 Facilitates NetBIOS, SQL, RPC, and other protocols
OSI Layer Functions
Transport (L4):
 Accepts data from the Session layer services and
provides messaging service for them
 Facilitates connection-oriented (guarantee of delivery)
and connectionless (delivery not guaranteed) protocols
 Connection-oriented protocols ensure data delivery –
used for sensitive data transmissions over the Internet
 Connectionless protocols don’t ensure data delivery –
but impose much lower overhead onto the network
 Submits data with its header added to the Network layer
for further handling
OSI Layer Functions
Transport, Connection-Oriented Protocols:
 Explicitly establish a session (“connection”) before
allowing data to be sent
 Ensure data delivery by requiring and acknowledgement
(ACK) of the receipt of data packets – retransmit in case
an ACK is not timely returned
 Negotiate for the highest number of data segments to be
sent before an acknowledgement is required
 Provide data integrity via checksums – unique character
strings attached to data that allow the receiving node to
determine if a data unit was modified during delivery
OSI Layer Functions
Transport, Connection-Oriented Protocols (continued):
OSI Layer Functions
Transport, Connection-Oriented Protocols (continued):
 Ensure reliable data delivery by breaking large data
units into multiple smaller segments (segmentation) –
with segment size related to the MTU size
 The MTU size is the maximum data size that nodes on
the way can place into their memory buffers
 Identify segments that belong to the same message,
determine the order of segments (sequencing), and
reconstruct the segmented units (reassembly)
 Gauge appropriate rate of transmission based on how
fast the recipient can accept data (flow control)
OSI Layer Functions
Transport, Connectionless Protocols:
 Do not establish a connection before sending data
 Do not require acknowledgements for data sent – don’t
ensure the that the data was properly received
 Define a special term for data carried – datagrams
 Do not perform error check
 Much less sophisticated and have less transmission and
processing overhead than connection-oriented ones
 Used in cases when data needs to be sent quickly
 Example – streaming video and audio transmissions
over the network
OSI Layer Functions
Transport, Protocols:
OSI Layer Functions
Network (L3):
 Accepts data from the Transport layer – wraps segments
into packets that carry addressing information
 May brake large packets into smaller ones – according
to capacity of the network (fragmentation)
 Defines protocol-dependent logical addressing schemes
that uniquely identify nodes within interconnected
networks and enable network segmentation
 Establishes the best delivery path (routing) considering
addressing, delivery priorities, network congestion,
quality of service, and cost of the paths (routes)
OSI Layer Functions
Network (continued):
 Implements congestion control by sensing delays
associated with routes and managing how much traffic
is sent across them – helpful within busy networks
 Internet Protocol (IP) is the most common L3 protocol
OSI Layer Functions
Data Link (L2):
 Encapsulates packets received from the Network layer
into frames – complete packages to be transmitted
 Defines the format of the header and/or trailer added to
packets received – depend on the network type in use
 Common network types are Ethernet and Token Ring –
use different frames and can not be used together
 Frame format and maximum size map onto the carrying
capacity of the network medium
 Performs verification of data integrity using checksum
mechanism – to detect transmission errors
OSI Layer Functions
Data Link (continued):
 Implies error correction upon the receiver’s request for
retransmission in case a frame is dropped or altered
 Manages point-to-point transmission across the medium
within the same logical or physical cable segment
 Splits into two sublayers with separate duties – Logical
Link Control (LLC) and Media Access Control (MAC)
OSI Layer Functions
Data Link, Sublayers:
OSI Layer Functions
Data Link, Sublayers, LLC:
 Interfaces the Network layer – implies intelligence
 Packages data frames differently for different networks
 Manages flow control and issues requests for
retransmission for data with errors
Data Link, Sublayers, MAC:
 Defines a unique physical identifier – MAC address –
for network cards (every frame carries a destination and
source MAC addresses)
 Defines and manages the access to the physical medium
OSI Layer Functions
Data Link, MAC Addresses:
 48-bit non-replaceable, “burned-in” addresses (BIA) represented using twelve hexadecimal characters
 Consist of two parts – a block ID and a device ID
 A block ID (“Organizational Unit Identifier, OUI”) – a
six-character (24-bit) sequence that uniquely identifies
each vendor (managed by IEEE), with large vendors
assigned several different block IDs
 A device ID (“serial number”) – a six-character (24-bit)
sequence that uniquely identifies the device (managed
by the manufacturer)
OSI Layer Functions
Data Link, MAC Addresses (continued):
OSI Layer Functions
Data Link, Frame Integrity:
 Before a frame is sent, the sender performs a cyclic
redundancy check (CRC) on all of its fields – generates
a unique 4-byte frame check sequence (FCS) code
 The FCS code is attached to the frame being sent – to
be detached and regenerated by receiver
 The generated code is compared to the one received –
no error is assumed in case the two codes match and a
retransmission request is issued in case of mismatch
OSI Layer Functions
Data Link, Frame Handling:
 All NICs connected to the same physical segment of the
network receive and process frames sent
 Only NIC with matching destination MAC address
passes the payload to the Network layer – other nodes
would drop the frame
 Broadcast frames are sent to and processed by all nodes
on the physical segment – costs performance
 Reducing the number of nodes on a physical network –
segmentation – improves performance by reducing the
number of frames sent and processed
OSI Layer Functions
Physical (L1):
 Accepts frames from the Data Link layer and turns
frame bits into the medium pulses on the sending end
 Transforms pulses to bits and passes them to the Data
Link layer on the receiving end
 Defines mechanical, electrical, and procedural
characteristics of the network hardware and medium
 Determines data transmission rates and timing intervals
 Non-intelligent layer – does not read data handled, adds
no header or trailer, and performs no error correction
OSI Layer Functions
OSI Model at Work
OSI Model at Work
Encapsulation, Overview:
 Each lower layer accepts data from the layer above and
performs encapsulation – adds a protocol data unit
(PDU) composed of layer-specific header and/or trailer
 A PDU enables logical communication between a layer
at the source computer and the identical layer at the
destination computer
 Headers are layer-specific labels, trailers carry errordetection/correction information and end-of-PDU flags
 The encapsulated data is passed to the layer below
OSI Model at Work
Encapsulation, Layer PDU:
 Application, Presentation, and Session layer PDUs
come in a variety of types and are referred to as
Application, Presentation, and Session PDUs
 Transport, Network, and Data Link layer PDUs are
referred to as segments, packets, and frames
 Physical layer PDUs consist of series of pulses that
match bit patterns for Data Link layer frames
OSI Model at Work
Encapsulation, Process:
 Begins at the at the upper three layers – the data is
converted into a standard networking format
 Transport layer forms segments by adding a header with
port information – ensure proper delivery
 The Network layer forms packets by adding a header
with logical addressing information – ensures routing
 The Data Link layer forms frames by adding a header
with physical addressing information and a trailer
 The Physical layer encodes frames and transmits them
as pulses along the physical network
OSI Model at Work
Encapsulation, Illustration:
OSI Model at Work
Decapsulation:
 The receiver’s Physical layer accepts the data from the
physical network – transforms pulses into bits, passes to
the layer above where bits are read as a frame
 Headers and trailers are removed as data travels up the
OSI model’s layers at the destination computer
 Ultimately, the original data is passed to the receiving
application by the receiver’s Application layer – with no
headers or trailers present
OSI Model at Work
Encapsulation/Decapsulation:
OSI Model at Work
Relevance:
1984
Today
Physical
Medium
(wireless, copper, fiber-optics)
Data Link
Ethernet
(frame format, access to the medium)
Network
IP
(packet format, address format)
Transport
TCP
(segment format, reliable procedures)
Networking Standards
Networking Standards
Advantages:
 Creation of competition – everybody may create
technological devices based on a standard, as opposed
to proprietary, apart from standards, patented devices
 Lower cost for consumers – via lower product startup
costs, time due to lower manufacturing costs, and
healthy competition
 Protection of investment into technology – lower costs
and clarity of equipment upgrades due to backward
compatibility of newer products
 Interoperability – all devices from various vendors
Networking Standards
Disadvantages:
 International standards – open domestic markets to
competition from countries with lower production costs
 Political conflicts – can be caused by standards or result
in rejection of standards proposed by a nation by others
The advantages outweigh the disadvantages
Networking Standards
Types, De Facto:
 Common practices followed by industry for a variety of
reasons – ease of use, established habits, costs, etc.
 Primary influencing factor – success in the marketplace
 Examples – MS Windows, Intel x86 architecture
Types, De Jure:
 Official, entrusted standards established by a body or an
organization – with different subcommittees overseeing
different technologies
 Subject to lengthy development and acceptance process
 Published and accessible to everyone online
Networking Standards
Types, De Jure (continued):
 First step – working groups of industry experts propose
the initial draft that gets published
 Second step – requests for comments (RFCs) are sought
from all interested developers, users, and specialists
 Third step – the comments are reviewed and may be
incorporated into a draft of the standard
 Finally, the entire organization reviews the draft before
it gets published as an official standard
 A De Facto standard may become De Jure one upon
approval by a committee or other authorized entity
Networking Standards
Types, Consortia:
 Introduced by industry-sponsored organizations that
want to promote a specific technology within a short
period of time
 Example – World Wide Web Consortium (W3C) that
involves Microsoft, Sun, and IBM (developed Internet
standards such as HTML, CSS, DOM)
 Imply membership that may be open or not
Standards can be enforced by the market
De Jure standards are enforced by a regulatory authority
Networking Standards Groups
Networking Standards Groups
Institute of Electrical and Electronics Engineers (IEEE):
 World’s largest technical professional society – consists
of 37 smaller societies and councils
 Developed more than 800 standards in IT and
communication, circuits and devices, control and
automation, signal processing, optics, power and
energy, etc. since early 1980s
 Project 802 develops computer network architecture
and technology standards: Ethernet LAN (802.3), Token
Ring (802.5), wireless LAN (802.11), etc.
 Website – www.ieee.org
Networking Standards Groups
International Organization for Standardization (ISO):
 A collection of more than 17000 standards developed in
more than 157 countries – titled after the Greek word
iso than means “equal”
 Covers multiple fields – communications, packaging,
energy production, banking and financials, etc.
 Promotes and facilitates global exchange of information
and barrier-free trade
 Website – www.iso.org
Networking Standards Groups
American National Standards Institute (ANSI):
 Established standards for electronics industry, chemical
and nuclear engineering, construction, health and safety
 Involves industry and government representatives –
represents the US in developing international standards
 Requires rigorous testing of new technology for
obtaining its approval
 Compliance with its standards is voluntary but
beneficial – constitutes reliability and compatibility and
is beneficial
 Website – www.ansi.org
Networking Standards Groups
Electronic Industries Alliance (EIA):
 A trade organization that involves representatives of
USA electronics manufacturing firms
 Lobbies for legislation favorable to the growth of
computer and electronics industries
 Assists writing ANSI standards, sets standards for its
members, and sponsors conferences and exhibitions
 Its subgroup – Telecommunications Industry
Association (TIA) – focuses on standards for IT
 Websites – www.eia.org, www.tiaonline.org
Networking Standards Groups
International Telecommunication Union (ITU):
 A United Nations agency that regulates international
communications with members from 191 countries
 Offers global standards in radio/TV frequencies,
networking, satellite and global communications, etc.
 Provides developing countries with technical expertise
and telecommunications equipment
 Actively involved into implementation of worldwide
Internet services
 Website – www.itu.int
Networking Standards Groups
Internet Corporation for Assigned Names and Numbers
(ICANN):
 A private nonprofit corporation upon recommendation
of the US Department of Commerce
 Responsible for Internet Protocol addressing (IP
addressing) and domain name management
 Assigns rights to use internet addresses and names
 Website – www.icann.org
Networking Standards Groups
Internet Assigned Numbers Authority (IANA):
 A nonprofit group that is used to keep records of
available and reserved IP addresses and to determine
how they are distributed
 Cooperated with three Regional Internet Registries
(RIRs) – American Registry for Internet Numbers
(ARIN), Asia Pacific Network Information Centre
(APNIC), and Reseaux IP Europeens (RIPE)
 Performs system administration within ICANN
 Website – www.iana.org
Networking Standards Groups
Internet Society (ISOC):
 A professional membership society that establishes
technical standards for the Internet – involves Internet
professionals and companies
 Addresses Internet’s growth, accessibility, security,
addressing services, and open standards
 Oversees several active subgroups that carry specific
missions
 Website – www.isoc.org
Networking Standards Groups
Internet Engineering Task Force (IETF):
 An ISOC subgroup that manages Internet protocol
standards
 Openly accepts proposals for standards – performs
reviews, testing, and issues approvals
 Promotes standards approved in the US internationally
Internet Architecture Board (IAB):
 A technical advisory group of researchers and
professionals – another ISOC subgroup
 Oversees Internet’s growth and management strategy,
resolution of technical disputes, and standards
Homework
 Read the chapter and the summary section, then review
the key terms learned
 Answer the review questions and verify your answers
with the chapter or lecture slides
 Complete the hands-on project 2-2 and case projects 2-2
and 2-3