Vous êtes sur la page 1sur 130

UNIT 2

THE OPEN SYSTEMS


INTERCONNECTION
(OSI) MODEL AND
NETWORK PROTOCOLS

2.1 Network Communications


Learning Outcomes
At the end of this topic, student should be able to:
1. Describe the purpose of the OSI Model and each of its layers.
2. Define specific functions belonging to each OSI Model layer.
3. Explain how two network nodes communicate through the
OSI Model.
4. Explain the structure and purpose of data packets and frames.
5. Explain two types of addressing covered by the OSI Model.

2.1 Describe Network Communications


What is networking?
o

Communication, sharing, delivering

An interconnection of computers and other


devices including:
o
o
o

Client computers
Servers (computers)
Network Devices

Hubs and Switches


Routers
Firewall
etc

2.1.1 Describe the purpose of the OSI


Model and each of its layers.
In the early 1980s, ISO began work on a universal set of

specifications that would enable computer platforms across the


world to communicate openly.
The result was a helpful model for understanding and
developing computer-to-computer communications over a
network.
This model, called the OSI (Open Systems Interconnection)
model, divides network communications into seven layers:
Physical, Data Link, Network, Transport, Session, Presentation,
and Application. Each layer has their own task and protocol
involved.
OSI or Open Systems Interconnection is a standard reference
model for communication between two end users in a network.

2.1.1 Describe the purpose of the OSI


Model and each of its layers. (cont.)
While performing those services, the

protocols also interact with protocols in the


layers directly above and below.
In addition, at the top of the OSI model,
Application layer protocols interact with the
software you use (such an e-mail or
spreadsheet program).
At the bottom, Physical layer services act on
the networking cables and connectors to
issue and receive signals.

Please Do Not Touch Steve Pets Alligator

1.2 Define specific functions belonging


to each OSI Model layer.

Application
(Layer 7)

Provides interface between


software applications and network
for interpreting applications
request and requirements.

Presentation
(Layer 6)

Allow hosts and applications to


use a common language; perform
data formatting, encryption and
compression

SESSION
(Layer 5)

TRANSPORT
(Layer 4)

Establishes, maintains and


terminates user connection

Ensure accurate delivery of data


through flow control, segmentation
and reassembly, error correction
and acknowledgment

NETWORK
(Layer 3)

Establishes network connections;


translate network addresses into
their physical counterparts and
determines routing

DATA LINK
(Layer 2)

Packages data in frames


appropriate to network
transmission method

Physical
(Layer 1)

Manages signaling to
and form physical
network connections

Summary

2.1.3 Explain how two network nodes


communicate through the OSI Model.
The OSI model is a theoretical representation of

what happens between two nodes communicating


on a network.
Every process that occurs during network
communications can be associated with a layer of
the OSI model, so you should be familiar with the
names of the layers and understand the key
services and protocols that belong to each.

When Data Passes from Host A to Host B :


Application, Presentation and Session layer take

user input and converts it into data


Transport layer adds a segment header converting
the data into segments
Network layer adds a network header and
converts the segments into packets
Data Link layer adds a frame header converting
the packets into frames
MAC sublayer layer converts the frames into a
bits which the Physical layer can put on the wire.

When the bits stream arrives at the


destination (Host B):
Physical layer takes it of the wire and converts it

into frames.
Each layer will remove their corresponding header
while the data flows up the OSI model until it is
converted back to data and presented to the user.

2.1.4 Explain the structure and


purpose of data packets and frames.
Data frames are small blocks of data with control,

addressing, and handling information attached to


them.
Frames are composed of several fields. The
characteristics of these fields depend on the type
of network on which the frames run and the
standards that they must follow.
Ethernet and token ring networks use different
frame types, and one type of network cannot
interpret the others frames.

Frame Specifications
You have learned that frames are composed of several

smaller components, or fields.


The characteristics of these components depend on the
type of network on which the frames run and on the
standards that they must follow.
By far, the most popular type of networking technology in
use today is Ethernet, which uses Ethernet frames.
Youll learn much more about Ethernet in Chapter 5, but
the following serves as an introduction, as well as a
comparison between this favored network type and its
historical rival, token ring.

Ethernet is a networking technology originally

developed at Xerox in the early 1970s and


improved by Digital Equipment Corporation,
Intel, and Xerox.
There are four different types of Ethernet frames.
The most popular form of Ethernet is
characterized by the unique way in which devices
share a common transmission channel, described
in the IEEE 802.3 standard.

A much less common networking technology, token

ring, was developed by IBM in the 1980s.


It relies upon direct links between nodes and a ring
topology.
Nodes pass around tokens, special control frames
that indicate to the network when a particular node
is about to transmit data.
Although this networking technology is nearly
obsolete, there is a remote chance that you might
work on a token ring network.
The IEEE has defined token ring technology in its
802.5 standard.

Ethernet frames are different from token ring

frames, and the two will not interact with each other
on a network.
In fact, most LANs do not support more than one
frame type, because devices cannot support more
than one frame type per physical interface, or NIC.
(NICs can, however, support multiple protocols.)
Although you can conceivably transmit both token
ring and Ethernet frames on a network, Ethernet
interfaces cannot interpret token ring frames, and
vice versa.
Normally, LANs use either Ethernet or token ring,
and almost all contemporary LANs use Ethernet.

NOTE :
The terms frame, packet, datagram, and protocol data unit

(PDU) are often used interchangeably to refer to a small


piece of data formatted for network transmission.
Technically, however, a packet is a piece of information that
contains network addressing information, and a frame is a
piece of data enclosed by a Data Link layer header and
trailer.
Datagram is synonymous with packet.
PDU generically refers to a unit of data at any layer of the
OSI model.
However, networking professionals often use the term
packet to refer to frames, PDUs, and Transport layer
segments alike.

2.1.5 Explain two types of addressing


covered by the OSI Model.
Addressing is a system for assigning unique

identification numbers to devices on a network.


Each node has two types of addresses.

2 Types of Address

Network Address
Physical Address

Network Address
Network addresses follow a hierarchical addressing

scheme and can be assigned through operating


system software.
They are hierarchical because they contain subsets of data
that incrementally narrow down the location of a node,
just as your home address is hierarchical because it
provides a country, state, ZIP code, city, street, house
number, and persons name.
Network layer address formats differ depending on
which Network layer protocol the network uses.
Example : IP, ICMP, IGMP, IPX/SPX
Network addresses are also called network layer
addresses, logical addresses, or virtual addresses.

MAC (Media Access Control) Address


The MAC (Media Access Control) sublayer, the

lower sublayer of the Data Link layer, manages access


to the physical medium.
It appends the physical address of the destination
computer onto the data frame.
The physical address is a fixed number associated
with the hosts NIC; it is initially assigned at the
factory and stored in the NICs on-board memory.
Because this address is appended by the MAC
sublayer of the Data Link layer, it is also known as a
MAC address or a Data Link layer address.
Sometimes, its also called a hardware address.

PHYSICAL ADDRESS

LOGICAL ADDRESS

The 48 bit MAC address that manufactures


encode in their network interface cards

A 32 bit IP address that is not embedded in


the network card

Address is unique, referred to as the


Ethernet or hardware address.

The purpose of routing between networks.

Associated with layer2 of the OSI Model.

Operates at Layer 3 of the OSI Model.

2.2 Construct a Local Wired Network


Learning Outcomes
Student should be able to:
1. Determine the MAC address of a host using ipconfiq/all command.
2. Build a standard IEEE 802.3 Ethernet Frame based on a given
source and destination devices.
3. Indicate logical address of a computer.
4. Prepare IP address of a computer.

2.2.1 Determine the MAC address of a


Host using ipconfig /all command.
You will need to know how to find and interpret

MAC addresses when supporting networks. In


this project, you will discover two ways of finding
your computers MAC address, also known as its
physical address, or sometimes, its hardware
address.

If your workstation is running the Windows XP or Windows Vista operating


system, perform the following steps:
1. Click the Start button, point to All Programs, select Accessories, and
then select Command Prompt. The Command Prompt window opens
with a cursor blinking at the C:\> prompt.
2. Type ipconfig /all then press Enter. A list of your Windows XP or
Windows Vista configuration and Ethernet adapter parameters appears.
This includes your workstations TCP/IP properties, as well as its MAC
address.
3. Search the output for the 12-digit hexadecimal MAC address
currently assigned to your NIC. (Hint: Look for the Physical Address
line.) On a separate piece of paper, write down the MAC address.
4. Type exit and then press Enter to close the Command Prompt
window.

IEEE Networking Specifications


Apply to connectivity, networking media, error

checking algorithms, encryption, emerging


technologies, and more
Specifications fall under IEEEs Project 802
Effort to standardize physical and logical elements of a network

31

Network+ Guide to Networks, 4e

IEEE Networking Specifications


(continued)

Table 2-2: IEEE 802 standards


32

Network+ Guide to Networks, 4e

IEEE Networking Specifications


(continued)

Table 2-2 (continued): IEEE 802 standards


33

Network+ Guide to Networks, 4e

Summary
Standards are documented agreements containing

precise criteria that are used as guidelines to ensure


that materials, products, processes, and services suit
their purpose
ISOs OSI Model divides networking architecture
into seven layers
Each OSI layer has its own set of functions and
interacts with the layers directly above and below it
Application layer protocols enable software to
negotiate their formatting, procedural, security, and
synchronization with the network
34

Network+ Guide to Networks, 4e

Summary (continued)
Presentation layer protocols serve as translators

between the application and the network


Session layer protocols coordinate and maintain links
between two devices for the duration of their
communication
Transport layer protocols oversee end-to-end data
delivery
Network layer protocols manage logical addressing
and determine routes based on addressing, patterns
of usage, and availability
35

Network+ Guide to Networks, 4e

Summary (continued)
Data Link layer protocols organize data they receive

from the Network layer into frames that contain


error checking routines and can then be transmitted
by the Physical layer
Physical layer protocols generate and detect voltage
to transmit and receive signals carrying data over a
network medium
Data frames are small blocks of data with control,
addressing, and handling information attached to
them
36

Network+ Guide to Networks, 4e

2.2 Comprehend a Local Wired


Network
Determine the MAC address of a Host using

ipconfig /all command


Build a standard IEEE 802.3 Ethernet Frame
based on a given source and destination devices

Explain logical address of a computer


Appears to reside from the perspective of an executing

application.

Determine the IP address of a computer


Using ipconfig

2.3 The Importance of Network


Protocols
Learning Outcomes
At the end of this topic, student should be able to:
Identify the characteristics of TCP/IP, IPX/SPX, NetBIOS and
NetBEUI, AppleTalk.
Differentiate how network protocols correlate to layers of the OSI
Model
Explain the functions of the core protocols of the TCP/IP suite

Introduction to Protocols
Protocols vary according to purpose, speed,

transmission efficiency, utilization of resources,


ease of setup, compatibility, and ability to travel
between different LANs.
Multiprotocol networks: networks running more
than one protocol
Most popular protocol suite is TCP/IP
Others: IPX/SPX, NetBIOS, and AppleTalk

40

Network+ Guide to Networks, 4e

Networking Protocol Suites:


a) Transmission Control Protocol/Internet

Protocol (TCP/IP)
b) Internetwork Packet Exchange/ Sequenced
Packet Exchange (IPX/SPX)
c) NetBIOS and NetBEUI
d) AppleTalk

1.Physical
Wireless LAN
(802.11b, a, g)

Internet
(DSL, Cable Modem)

MAN / WAN
(poTS, ISDNT1, SONET,
ATM, Frame Relay

Backbone
(Ethernet, ATM, FDDI)

LAN
(Ethernet)

7.Application

6.Presentation
APPLICATION
LAYER

5.Session

4.Transport

3.Network
INTERNETWORK
LAYER

2.Data Link

HARDWARE
LAYER

Internetwork Layer
Internetwork layer connect the application

software in the application layer with the


hardware layer that actually move messages from
one computer to another.

TCP/IP
Transmission Control Protocol/Internet Protocol
Consist of dozens of difference protocols, but

only a few are the core protocol.


Two core protocol the most important : IP
protocol and TCP protocol.
Develop for the US Department of Defenses
Advance Research Project Agency Network
(ARPAnet) by Vinton Cerf and Bob Kahn in
1974.

TCP/IP
Suite of specialized subprotocols
TCP, IP, UDP, ARP, and many others

De facto standard on Internet


Protocol of choice for LANs and WANs

Protocols able to span more than one LAN are

routable
Can run on virtually any combination of NOSs or
network media
TCP/IP core protocols operate in Transport or
Network layers
46

Network+ Guide to Networks, 4e

TCP
Transmission Control Protocol

The TCP Protocols


Provides reliable data delivery services
Operates in Transport layer
Connection-oriented
Establishes a connection before transmitting data.
Three-way handshake
Require acknowledgements from receiver to ensure data was received
correctly.
Ensures reliable data delivery through sequencing and checksums
Checksum for data integrity
Provides flow control

Port hosts address where an application makes itself

available to incoming or outgoing data

50

Network+ Guide to Networks, 4e

The TCP Protocols (TCP Segment)

Figure 4-1: A TCP segment


51

Network+ Guide to Networks, 4e

The TCP Protocols (TCP Segment)

Figure 4-2: TCP segment data


52

Network+ Guide to Networks, 4e

The TCP Protocols (connection)

54

Figure 4-3: Establishing a TCP connection


Network+ Guide to Networks, 4e

To establish a connection, TCP uses a three-way handshake. Before a client

attempts to connect with a server, the server must first bind to a port to open
it up for connections: this is called a passive open. Once the passive open is
established, a client may initiate an active open. To establish a connection, the
three-way (or 3-step) handshake occurs:
SYN: The active open is performed by the client sending a SYN to the server.
The client sets the segment's sequence number to a random value A.
SYN-ACK: In response, the server replies with a SYN-ACK. The
acknowledgment number is set to one more than the received sequence
number (A + 1), and the sequence number that the server chooses for the
packet is another random number, B.
ACK: Finally, the client sends an ACK back to the server. The sequence
number is set to the received acknowledgement value i.e. A, and the
acknowledgement number is set to one more than the received sequence
number i.e. B.
At this point, both the client and server have received an acknowledgment of
the connection.

UDP (User Datagram Protocol)

Figure 4-4: A UDP segment


59

Network+ Guide to Networks, 4e

The UDP Protocols


Provides reliable data delivery services
Operates in Transport layer
Connection-less
Do not establishes a connection before transmitting data.
No handshake.
No effort to ensure data is delivered free of errors.
Faster than conneciton-oriented protocol.
Useful when data must be transferred quickly such as streaming

music or video.

60

Network+ Guide to Networks, 4e

The TCP Protocols (TCP Segment)

Figure 4-1: A TCP segment


61

Network+ Guide to Networks, 4e

The TCP/IP Services

IP
Internet Protocol

IP (Internet Protocol) Protocol


Provides information about how and where data

should be delivered
Datas source and destination addresses

Network layer protocol


Enables TCP/IP to internetwork
Unreliable, connectionless protocol

IP datagram: packet, in context of TCP/IP


Envelope for data

67

Network+ Guide to Networks, 4e

IP (continued)

Figure 4-5: An IP datagram


68

Network+ Guide to Networks, 4e

IP (continued)

Figure 4-6: IP datagram data


69

Network+ Guide to Networks, 4e

ICMP (Internet Control Message


Protocol)
Network layer protocol that reports on success or

failure of data delivery


Indicates when part of network congested

Indicates when data fails to reach destination


Indicates when data discarded because allotted time for delivery

(TTL) expired
Cannot correct errors it detects

71

Network+ Guide to Networks, 4e

IGMP (Internet Group Management


Protocol)
Network layer protocol that manages

multicasting
Transmission method allowing one node to send data to defined

group of nodes
Point-to-multipoint method
Teleconferencing or videoconferencing over Internet

Routers use IGMP to determine which nodes

belong to multicast group and to transmit data to


all nodes in that group
73

Network+ Guide to Networks, 4e

ARP (Address Resolution Protocol)


Network layer protocol
Obtains MAC (physical) address of host
Creates database that maps MAC address to hosts IP (logical) address

ARP table or cache: local database containing

recognized MAC-to-IP address mappings


Dynamic ARP table entries created when client makes ARP

request that cannot be satisfied by data already in ARP table


Static ARP table entries entered manually using ARP utility

74

Network+ Guide to Networks, 4e

RARP (Reverse Address Resolution


Protocol)
Allows client to broadcast MAC address and receive

IP address in reply
If device doesnt know own IP address, cannot use ARP

RARP server maintains table of MAC addresses and

associated IP addresses

76

Network+ Guide to Networks, 4e

BOOTP (Bootstrap Protocol)


Uses central list of IP addresses and associated

devices MAC addresses to assign IP addresses to


clients dynamically
Dynamic IP addresses
Application layer protocol
Client broadcasts MAC address, BOOTP server replies with:
Clients IP address
IP address of server
Host name of server
IP address of a default router

77

Network+ Guide to Networks, 4e

DHCP (Dynamic Host Configuration


Protocol)
Automated means of assigning unique IP address to

every device on a network

Application layer protocol


Reduces time and planning spent on IP address management
Reduces potential for errors in assigning IP addresses
Enables users to move workstations and printers without having to
change TCP/IP configuration
Makes IP addressing transparent for mobile users

Three method in DHCP:


Dynamic allocation
Automatic allocation
Static allocation
78

Network+ Guide to Networks, 4e

DHCP (continued)

Figure 4-11: The DHCP leasing process


79

Network+ Guide to Networks, 4e

APIPA (Automatic Private IP Addressing)


Provides computer with IP address automatically
For Windows 98, Me, 2000, XP client and

Windows 2003 server


For situations where DHCP server unreachable
Assigns computers network adapter IP address from predefined
pool of addresses
169.254.0.0 through 169.254.255.255

Computer can only communicate with other nodes using

addresses in APIPA range

80

Network+ Guide to Networks, 4e

http://pic.dhe.ibm.com/infocenter/zos
/v2r1/index.jsp?topic=%2Fcom.ibm.zo
s.v2r1.hala001%2Fitctcpipcon.htm
TCP Transmission Control Protocol is a transport protocol providing a reliable, full-duplex byte

stream. Most TCP/IP applications use the TCP transport protocol. UDP User Datagram Protocol is
a connectionless protocol providing datagram services. UDP is less reliable because there is no
guarantee that a UDP datagram ever reaches its intended destination, or that it reaches its
destination only once and in the same condition as it was passed to the sending UDP layer by a UDP
application. ICMP Internet Control Message Protocol is used to handle error and control
information at the IP layer. The ICMP is most often used by network control applications that are
part of the TCP/IP software product itself, but ICMP can be used by authorized user processes as
well. PING and TRACEROUTE are examples of network control applications that use the ICMP
protocol. IP Internet Protocol provides the packet delivery services for TCP, UDP, and ICMP. The
IP layer protocol is unreliable (called a best-effort protocol). There is no guarantee that IP packets
arrive, or that they arrive only once and are error-free. Such reliability is built into the TCP
protocol, but not into the UDP protocol. If you need reliable transport between two UDP
applications, you must ensure that reliability is built into the UDP applications. ARP/ND The IPv4
networking layer uses the Address Resolution Protocol (ARP) to map an IP address into a hardware
address. In the IPv6 networking layer, this mapping is performed by the Neighbor Discovery (ND
function). On local area networks (LANs), such an address would be called a media access control
(MAC) address. RARP Reverse Address Resolution Protocol is used to reverse the operation of the
ARP protocol. It maps a hardware address into an IPv4 address. Note that both ARP packets and
RARP packets are not forwarded in IP packets, but are themselves media level packets. ARP and
RARP are not used on all network types, as some networks do not need these protocols

2.4 Addressing Schemes for TCP/IP


Suite
Learning Outcomes
At the end of this topic, student should be able to:
Understand addressing schemes for TCP/IP suite.
Describe the purpose and implementation of DNS (Domain Name
System) and WINS (Windows Internet Naming Service)
Install protocols on Windows XP clients

2.4 Addressing Schemes for TCP/IP


Suite
Learning Outcomes
At the end of this topic, student should be able to:
Compare the addressing scheme of TCP/IP: classes, binary, dotted
decimal notation and subnet mask.
Label Public and Private IP address.
Label Unicast, Broadcast and Multicast address.
Relate how IP address are obtained : static address or dynamic address.

Addressing in TCP/IP (IP address)

Figure 4-8: IP addresses and their classes


85

Network+ Guide to Networks, 4e

222.32.1.1

____

179.21.9.0

____

90.43.2.1

____

220.11.6.6

____

43.55.45.0

____

126.32.1.0

____

111.45.3.2

____

Addressing in TCP/IP (continued)


Many Internet addresses go unused
Cannot be reassigned because they are reserved
IP version 6 (IPv6) will incorporate new addressing scheme

Some IP addresses reserved for special functions


127 reserved for a device communicating with itself
Loopback test

ipconfig: Windows XP command to view IP

information
ifconfig on Unix and Linux

97

Network+ Guide to Networks, 4e

Binary and Dotted Decimal Notation


Most common way of expressing IP addresses
Decimal number between 0 and 255 represents each binary

octet
Separated by period

Each number in dotted decimal address has

binary equivalent

98

Network+ Guide to Networks, 4e

Subnet Mask
Every device on TCP/IP-based network identified by subnet

mask

32-bit number that, when combined with devices IP address,

informs rest of network about segment or network to which a


device is attached

Subnetting: subdividing single class of networks into multiple,

smaller logical networks or segments

99

Network+ Guide to Networks, 4e

1
1

Assigning IP Addresses
Nodes on a network must have unique IP

addresses
Static IP address: manually assigned
Can easily result in duplication of addresses

Most network administrators rely on network

service to automatically assign IP addresses

116

Network+ Guide to Networks, 4e

Sockets and Ports


Every process on a machine assigned a port number 0 to

65535
Well Known Ports: in range 0 to 1023

Assigned to processes that only the OS or system administrator can access

Registered Ports: in range 1024 to 49151


Accessible to network users and processes that do not have special

administrative privileges

Dynamic and/or Private Ports: in range 49152 through

65535

Open for use without restriction

Processs port number plus host machines IP address

equals processs socket

Ensures data transmitted to correct application


121

Network+ Guide to Networks, 4e

http://en.wikipedia.org/wiki/Internet_port

TCP Segment

123

Network+ Guide to Networks, 4e

IP datagram

124

Network+ Guide to Networks, 4e

Addressing in IPv6
IPv6 slated to replace current IP protocol, IPv4
More efficient header, better security, better prioritization
Billions of additional IP addresses

Differences:
Address size
Representation

Distinguishes among different types of network interfaces


Format Prefix

125

Network+ Guide to Networks, 4e

Comparison between IPv6 and IPv4:


-Larger address space
-Better multicasting
-Better on auto configurations
-Better on security (network layer)
-Better on supporting mobility

Host Names and DNS (Domain Name


System): Domain Names
Every host can take a host name
Every host is member of a domain
Group of computers belonging to same organization and has part of

their IP addresses in common


Domain name usually associated with company or other type of
organization

Fully qualified host name: local host name plus

domain name
Domain names must be registered with an Internet
naming authority that works on behalf of ICANN
127

Network+ Guide to Networks, 4e

Host Files
ASCII text file called HOSTS.TXT
Associate host names with IP addresses
Growth of Internet made this arrangement impossible to maintain

Figure 4-13: Example host file


128

Network+ Guide to Networks, 4e

http://compnetworking.about.com/od/dns_domainnamesystem/f/dns_servers.htm

DNS (Domain Name System)


DNS translates Internet domain and host names to IP addresses.

DNS automatically converts the names we type in our web


browser address bar to the IP addresses of web servers hosting
those sites.
Hierarchical method of associating domain names with IP
addresses
Refers to Application layer service that accomplishes association and organized

system of computers and databases making association possible


Relies on many computers around world

Thirteen root servers


Three components:

Resolvers - a piece of software that's understands how to formulate a DNS query

and is built into practically every Internet-capable application.


Name servers - DNS is a globally connected network of "name servers
Name space - establishes the syntactical rules for creating and structuring legal
DNS names.
129

http://blog.datakl.com/tag/dns-resolver/

Network+ Guide to Networks, 4e

Vous aimerez peut-être aussi