Overview

During the past two decades there has been a tremendous increase in the numbers and sizes of networks. Many of the networks, however, were built using different implementations of hardware and software. As a result, many of the networks were incompatible and it became difficult for networks using different specifications to communicate with each other. To address this problem, the International Organization for Standardization (ISO) researched many network schemes. The ISO recognized that there was a need to create a network model that would help network builders implement networks that could communicate and work together (interoperability) and therefore, released the OSI reference model in 1984.

This chapter explains how standards ensure greater compatibility and interoperability between various types of network technologies. In this chapter, you will learn how the OSI reference model networking scheme supports networking standards. In addition, you will see how information or data makes its way from application programs (such as spreadsheets) through a network medium (such as wires) to other application programs located on other computers on a network. As you work through this chapter, you will learn about the basic functions that occur at each layer of the OSI model, which will serve as a foundation as you begin to design, build and troubleshoot networks.

 

2.1

General Model of Communication

 

2.1.1

Using layers to analyze problems in a flow of materials

The concept of layers will help you understand the action that occurs during communication from one computer to another. Shown in the Figure are questions that involve the movement of physical objects such as highway traffic, or electronic data. This motion of objects, whether it is physical or logical, is referred to as flow. There are many layers that help describe the details of the flow process. Other examples of systems that flow, are the public water system, the highway system, the postal system, and the telephone system.

Now examine the Figure "Comparing Networks" chart. What network are you examining? What is flowing? What are the different forms of the object that is flowing? What are the rules for flow? Where does the flow occur? The networks listed in this chart give you more analogies to help you understand computer networks.

Another example of how you might use the concept of layers to analyze an everyday subject is to examine human conversation. When you create an idea that you wish to communicate to another person, the first thing you do is choose how you want to express that idea, then you decide how to properly communicate it, and finally, you actually deliver the idea.

Imagine a young boy seated at one end of a very long dinner table. On the other end of the table, quite a distance away, sits the young boy's grandmother. The youngster speaks English. The grandmother prefers to speak Spanish. The table has been set with a wonderful meal that the grandmother has prepared. Suddenly the young boy shouts at the top of his lungs, "Hey, you! Give me the rice!" and reaches across the table to grab it. In most places, this action is considered quite rude. What should the young boy have done to communicate his wishes in an acceptable manner?

To help you find the solution to this question, analyze the communication process by using layers. First there is the idea -- the young boy wants rice; then there is the representation of the idea--- spoken English (instead of Spanish); next is the method of delivery -- "Hey, you"; and finally, the medium -- shouting (sound) and grabbing (physical action) across the table for the rice.

From this group of four layers, you can see that three of them prevent the young boy from communicating his idea in an appropriate/acceptable manner. The first layer (the idea) is acceptable. The second layer (representation), using spoken English instead of Spanish, and the third layer (delivery), demanding instead of a politely requesting, most definitely do not follow acceptable social protocol. The fourth layer (medium), shouting and grabbing from the table rather than politely requesting assistance from another person seated nearby, is unacceptable behavior in most any social situation.

By analyzing this interaction in terms of layers you can understand more clearly some of the problems of communication in both humans or computers, and how you might solve them.

 

2.1

General Model of Communication

 

2.1.2

Source, destination, and data packets

As you learned in chapter 1, the most basic level of computer information consists of binary digits, or bits (0s and 1s). Computers that send one or two bits of information, however, would not be very useful, so other groupings - bytes, kilobytes, megabytes, and gigabytes - are necessary. In order for computers to send information through a network, all communications on a network originate at a source, then travel to a destination.

As illustrated in the Figure, the information that travels on a network is referred to as data, packet, or data packet. A data packet is a logically grouped unit of information that moves between computer systems. It includes the source information along with other elements that are necessary in order to make communication possible and reliable with the destination device. The source address in a packet specifies the identity of the computer that sends the packet. The destination address specifies the identity of the computer that finally receives the packet.

 

2.1

General Model of Communication

 

2.1.3

Media

During your study of networking, you will hear references to the word "medium". (Note: The plural form of medium is media.) In networking, a medium is a material through which data packets travel. It could be any of the following materials:

  • telephone wires
  • Category 5 UTP (used for 10BASE-T Ethernet)
  • coaxial cables (used for cable TV)
  • optical fibers (thin glass fibers that carry light)

There are two more types of media that are less obvious, but should nonetheless be taken into account in network communications. First, is the atmosphere (mostly oxygen, nitrogen, and water) that carries radio waves, microwaves, and light.

Communication without some type of wires or cables is called wireless or free-space communication. This is possible using electromagnetic (EM) waves. EM waves, which in a vacuum all travel at the speed of light, include power waves, radio waves, microwaves, infrared light, visible light, ultraviolet light, x-rays, and gamma rays. EM waves travel through the atmosphere (mostly oxygen, nitrogen, and water), but they also travel through the vacuum of outer space (where there is virtually no matter, no molecules, no atoms).

 

2.1

General Model of Communication

 

2.1.4

Protocol

In order for data packets to travel from a source to a destination on a network, it is important that all the devices on the network speak the same language or protocol. A Protocol is a set of rules that make communication on a network more efficient. Some common examples are as follows:

  • In Congress, a form of Roberts Rules of Order makes it possible for hundreds of representatives, who all like to talk, to take turns, and to communicate their ideas in an orderly manner.
  • While driving a car, other cars (should!) signal when they wish to make a turn; if they did not, then the roads would be chaos.
  • While flying an airplane, pilots obey very specific rules for communication with other airplanes and with air traffic control.
  • When answering the telephone, someone says, "Hello," then the person calling says, "Hello. This is.... "; and so it goes back and forth.

One technical definition of a data communications protocol is: a set of rules, or an agreement, that determines the format and transmission of data. Layer n on one computer communicates with Layer n on another computer. The rules and conventions used in this communication are collectively known as the Layer n protocol.

 

2.1

General Model of Communication

2.1.5

The evolution of ISO networking standards

The early development of LANs, MANs, and WANs was chaotic in many ways. The early 1980's saw tremendous increases in the numbers and sizes of networks. As companies realized the money they could save and the productivity they could gain by using networking technology, they added networks and expanded existing networks almost as rapidly as new network technologies and products could be introduced.

By the mid-1980's, these companies began to experience growing pains from all the expansions they had made. It became harder for networks that used different specifications and implementations to communicate with each other. They realized that they needed to move away from proprietary networking systems.

Proprietary systems are privately developed, owned, and controlled. In the computer industry, proprietary is the opposite of open. Proprietary means that one or a small group of companies controls all usage of the technology. Open means that free usage of the technology is available to the public.

To address the problem of networks being incompatible and unable to communicate with each other, the International Organization for Standardization (ISO) researched network schemes like DECNET, SNA, and TCP/IP in order to find a set of rules. As a result of this research, the ISO created a network model that would help vendors create networks that would be compatible with, and operate with, other networks.

The process of breaking down complex communications into smaller discrete tasks could be compared to the process of building an automobile. When taken as a whole, the design, manufacture, and assembly of an automobile is a highly complex process. It's unlikely that one single person would know how to perform all the required tasks to build a car from scratch. This is why mechanical engineers design the car, manufacturing engineers design the molds to make the parts, and assembly technicians each assemble a part of the car.

The OSI reference model (Note: Do not confuse with ISO.), released in 1984, was the descriptive scheme they created. It provided vendors with a set of standards that ensured greater compatibility and interoperability between the various types of network technologies that were produced by the many companies around the world.

 

 

1