Networking Essentials Notes

Section 2


Section Titles:

The OSI Model | Drivers | Packets | Protocols | Putting data on the Cable

How a Network Functions

The OSI Model

  • International Standards Organization (ISO) specifications for network architecture.
  • Called the Open Systems Interconnect or OSI model.
  • Seven layered model, higher layers have more complex tasks.
  • Each layer provides services for the next higher layer.
  • Each layer communicates logically with its associated layer on the other computer.
  • Packets are sent from one layer to another in the order of the layers, from top to bottom on the sending computer and then in reverse order on the receiving computer.

OSI Layers

  • Application
  • Presentation
  • Session
  • Transport
  • Network
  • Data Link
  • Physical

Application Layer

  • Serves as a window for applications to access network services.
  • Handles general network access, flow control and error recovery.

Presentation Layer

  • Determines the format used to exchange data among the networked computers.
  • Translates data from a format from the Application layer into an intermediate format.
  • Responsible for protocol conversion, data translation, data encryption, data compression, character conversion, and graphics expansion.
  • Redirector operates at this level.

Session Layer

  • Allows two applications running on different computers to establish use and end a connection called a Session.
  • Performs name recognition and security.
  • Provides synchronization by placing checkpoints in the data stream.
  • Implements dialog control between communicating processes.

Transport Layer

  • Responsible for packet creation.
  • Provides an additional connection level beneath the Session layer.
  • Ensures that packets are delivered error free, in sequence with no losses or duplications.
  • Unpacks, reassembles and sends receipt of messages at the receiving end.
  • Provides flow control, error handling, and solves transmission problems.

Network Layer

  • Responsible for addressing messages and translating logical addresses and names into physical addresses.
  • Determines the route from the source to the destination computer.
  • Manages traffic such as packet switching, routing and controlling the congestion of data.

Data Link Layer

  • Sends data frames from the Network layer to the Physical layer.
  • Packages raw bits into frames for the Network layer at the receiving end.
  • Responsible for providing error free transmission of frames through the Physical layer.

Physical Layer

  • Transmits the unstructured raw bit stream over a physical medium.
  • Relates the electrical, optical mechanical and functional interfaces to the cable.
  • Defines how the cable is attached to the network adapter card.
  • Defines data encoding and bit synchronization.

The 802 Project Model

  • Defines Standards for the Data Link and Physical Layers.
  • Network Adapter Cards
  • WAN components
  • Components used to create twisted-pair and coaxial cable networks.
  • Just in case, a crazy mnemonic for this table, but it works :-)

I Like Changing Boxers Rarely. My Butt Feels Very Sexy With Denim

802.1 Internet working
802.2 Division of Data Link Layer into sublayers
  • LLC (Logical Link Control)
  • Media Access Control (MAC)
802.3 CSMA/CD - Ethernet
802.4 Token Bus LAN (ARCnet)
802.5 Token Ring LAN
802.6 MAN (Metropolitan Area Network)
802.7 Broadband Technical Advisory Group
802.8 Fiber-Optic Technical Advisory Group
802.9 Integrated Voice/Data Networks
802.10 Network Security
802.11 Wireless Networks
802.12 Demand Priority Access Lan, 100 Base VG - AnyLAN

OSI Model Enhancements

The bottom two layers - Data Link and Physical - define how multiple computers can simultaneously use the network without interfering with each other.

  • Divides the Data-link layer in to the Logical Link Control and Media Access Control sublayers.
  • Logical Link Control
    • manages error and flow control and
    • defines logical interface points called Service Access Points (SAP's). These SAP's are used to transfer information to upper layers
  • Media Access Control
    • communicates directly with the network adapter card and
    • is responsible for delivering error-free data between two computers.
    • Categories
      • 802.3
      • 802.4
      • 802.5 and
      • 802.12 define standards for both this sublayer and the Physical layer
 Drivers
  • a device driver is software that tells the computer how to drive or work with the device so that the device performs the job it's supposed to.
  • Drivers are called

    Network Drivers,

    MAC drivers,

    NIC drivers.

  • Provide communication between a network adapter card and the redirector in the computer.
  • Resides in the Media Access Control sublayer of the Data Link layer. Therefore, the NIC driver ensures direct communication between the computer and the NIC
  • the Media Access Control driver is another name for the network card device driver
  • When installing a driver, you need to know these things
    • IRQ
    • I/O Port Address
    • Memory Mapped (Base Memory Address)
    • Transceiver Type
Packets
  • Data is broken down into smaller more manageable pieces called packets.
  • Special control information is added in order to:
    • disassemble packets
    • reassemble packets
    • check for errors

Types of data sent includes

  • Can contain information such as messages or files.
  • Computer control data and commands and requests.
  • Session control codes such as error correction and retransmission requests.
  • Original block of data is converted to a packet at the Transport layer.

Packet Components

  • Header
    1. Alert signal to indicate packet is being transmitted
    2. Source address.
    3. Destination address.
    4. Clock synchronization information.
  • Data
    1. Contains actual data being sent.
    2. Varies from 512 to 4096 bytes (4K), depending on the network
  • Trailer
    1. Content varies by protocol.
    2. Usually contains a CRC.

Packet Creation

  • Look at the example on pp. 201 - 204
  • Begins at the Application layer where data is generated.
  • Each layer subsequently adds information to the packet; the corresponding layer on the receiving machine reads the information.
  • Transport layer breaks the data into packets and adds sequencing information needed to reassemble data at the other end => the structure of the packets is defined by the common protocol being used between the two computers.
  • Data is passed through the Physical layer to the cable.

Packet Addressing

  • every NIC sees all packets sent on its cable segment but only interrupts the computer if the packet address matches the computer's address
  • a broadcast type address gets attention of all computers on the network

 

 Protocols
  • Protocols are rules and procedures for communication.
 How Protocols Work

The Sending Computer

  • Breaks data into packets.
  • Adds addressing information to the packet
  • Prepares the data for transmission.

The Receiving Computer (same steps in reverse)

  • Takes the packet off the cable.
  • Strips the data from the packet.
  • Copies the data to a buffer for reassembly.
  • Passes the reassembled data to the application.

Protocol Stacks (or Suites)

  • A combination of protocols, each layer performing a function of the communication process.
  • Ensure that data is prepared, transferred, received and acted upon.

The Binding Process

  • Allows more than one protocol to function on a single network adapter card. (e.g. both TCP/IP and IPX/SPX can be bound to the came card
  • Binding order dictates which protocol the operating systems uses first.
  • binding also happens with the Operating System architecture: for example, TCP/IP may be bound to the NetBIOS session layer above and network card driver below it. The NIC device driver is in turn bound to the NIC.

Standard Stacks

  • ISO/OSI
  • IBM SNA (Systems Network Architecture)
  • Digital DECnet
  • Novell NetWare
  • Apple AppleTalk
  • TCP/IP

Protocol types map roughly to the OSI Model into three layers:

Application Level Service Users

Application Layer
Presentation Layer
Session Layer

Transport Services

Transport Layer


Network Services

Network Layer
Data Link Layer
Physical Layer

Application Protocols

Work at the upper layer of the OSI model and provide application to application interaction and data exchange.

Examples:

  • APPC-IBM's peer to peer SNA protocol used on AS400's
  • FTAM: an OSI file access protocol.
  • X.400: international e-mail transmissions.
  • X.500: file and directory services across systems.
  • SMTP: Internet e-mail.
  • FTP: Internet file transfer
  • SNMP: Internet network management protocol.
  • Telnet: Internet protocol for logging on to remote hosts.
  • Microsoft SMB: client shells and redirectors.
  • NCP: Novell client shells or redirectors.
  • AppleTalk and AppleShare: Apple's protocol suite.
  • AFP: Apple's protocol for remote file access.
  • DAP (data access protocol): DECnet file access protocol.

Transport Protocols

These protocols provide communication sessions between computers and ensure data is moved reliably between computers.

Examples:

  • TCP (transmission control protocol): internet protocol for guaranteed delivery of sequenced data.
  • SPX (sequenced packet exchange): Novell protocol suite.
  • NWLink: Microsoft implementation of IPX/SPX.
  • NetBEUI: establishes communications sessions between computers and provides the underlying data transport services.
  • ATP, NBP: Apple's communication session and transport protocols.

Network Protocols

These provide link services

They also

  • handle
    • addressing and routing,
    • error checking and
    • retransmission requests.
  • Define rules for Ethernet or Token Ring.

Examples:

  • IP (Internet Protocol): packet forwarding and routing.
  • IPX: (Internetwork Packet Exchange): Novell's protocol for packet forwarding and routing.
  • NWLink: Microsoft implementation of IPX/SPX.
  • NetBEUI: Transport for NetBIOS sessions and applications.
  • DDP (datagram delivery protocol): An AppleTalk data transport protocol.

 

The IEEE protocols at the Physical Layer

802.3 (CSMA /CD - Ethernet)

  • logical bus network
  • can transmit at 10 Mbps
  • data is transmitted on the wire to every computer but only those meant to receive respond
  • CSMA /CD protocol listens and allows transmission when the wire is clear

802.4 (Token Passing)

  • bus layout that used token passing
  • every computer receives all of the data but only the addressed computers respond
  • token determines which computer can send


802.5 (Token Ring)

  • logical ring network; physical set up as star network
  • transmits at 4 Mbps or 16 Mbps
  • token determines which computer can send
 Important Protocols

TCP/IP

  • Provides communications in a heterogeneous environment.
  • Routable, defacto standard for internetworking.
  • SMTP, FTP, SNMP are protocols written for TCP/IP
  • Disadvantages are size and speed.

NetBEUI

  • NetBIOS extended user interface.
  • Originally, NetBIOS and NetBEUI were tightly tied together but, NetBIOS has been separated out to be used with other routable protocols. NetBIOS acts as a tool to allow applications to interface with the network; by establishing a session with another program over the network
  • NetBIOS operates at the Session layer.
  • Small, fast and efficient.
  • Compatible with most Microsoft networks.
  • Not routable and compatible only with Microsoft networks.

X.25

  • Protocols incorporated in a packet switching network of switching services.
  • Originally established to connect remote terminals to mainframe hosts.

XNS

  • Xerox Network System.
  • Developed for Ethernet LANs but has been replaced by TCP/IP.
  • Large, slow and produces a lot of broadcasts.

IPX/SPX and NWLink

  • Used for Novell networks.
  • Small and fast.
  • Routable.

APPC

  • Advanced Program to Program Communication
  • Developed by IBM to support SNA.
  • designed to enable application programs running on different computers to communicate and exchange data directly.

AppleTalk

  • Apple's proprietary protocol stack for Macintosh networks.

OSI Protocol Suite

  • each protocol maps directly to a single layer of the OSI model

DECnet

  • Digital Equipment's proprietary protocol stack
  • Defines communications over Ethernet, FDDI MAN's and WAN's.
  • DECnet can also use TCP/IP and OSI protocols as well as its own protocols
  • Routable.

 

 Putting data on the Cable

Access Methods

The 4 major methods

  • Carrier Sense Multiple Access Methods
    1. with collision detection (CSMA/CD)
    2. with collision avoidance (CSMA/CA)
  • Token passing that allows only a singe opportunity to send data
  • A Demand Priority method
  • Carrier Sense Multiple Access with Collision Detection. (CSMA/CD)
    1. Computer senses that the cable is free.
    2. Data is sent.
    3. If data is on the cable, no other computer can transmit until the cable is free again.
    4. If a collision occurs, the computers wait a random period of time and retransmit.
    • Known as a contention method because computers compete for the opportunity to send data. (Database apps cause more traffic than other apps)
    • This can be a slow method
    • More computers cause the network traffic to increase and performance to degrade.
    • The ability to "listen" extends to a 2,500 meter cable length => segments can't sense signals beyond that distance.
  • Carrier Sense Multiple Access with Collision Avoidance  (CSMA/CA)
    • in CSMA/CA, the computer actually broadcasts a warning packet before it begins transmitting on the wire. This packet eliminates almost all collisions on the network because each computer on the network does not attempt to broadcast when another computer sends the warning packet.
    • All other computers wait until the data is sent.
    • The major drawback of trying to avoid network collisions is that the network traffic is high due to the broadcasting of the intent to send a message.
  • Token Passing
    • Special packet is passed from computer to computer.
    • A computer that wants to transmit must wait for a free token.
    • Computer takes control of the token and transmits data. Only this computer is allowed to transmit; others must wait for control of the token.
    • Receiving computer strips the data from the token and sends an acknowledgment.
    • Original sending computer receives the acknowledgment and sends the token on.
    • the token comes from the Nearest Active Upstream Neighbor  and when the computer is finished, it goes to the Nearest Active Downstream Neighbor
    • uses "beaconing" to detect faults => this method is fault tolerant
    • NO contention => equal access to all computers on the network
    • NO collisions
  • Demand Priority
    1. 100 Mbps standard called 100VG-AnyLAN. "Hub- based".
    2. Repeaters manage network access by performing cyclical searches for requests to send from all nodes on the network. The repeater or HUB is responsible for noting all addresses, links and end nodes and verifying if they are all functioning. An "end node" can be a computer, bridge, router or switch.
    3. Certain types of data are given priority if data reaches the repeater simultaneously. If two have the same priority, BOTH are serviced by alternating between the two.

      Advantages over CSMA/CD

      1. Computers Uses four pairs of wires which can send and receive simultaneously.
      2. Transmissions are through the HUB and are not broadcast to all other computers on the network.
      3. There is only communication between the sending computer, the hub and the destination computer.


Other methods


Appletalk

  • The cabling system for an AppleTalk network is called LocalTalk.
  • LocalTalk uses  CSMA/CD
  • AppleTalk has a dynamic network addressing scheme.
    • During bootup, the AppleTalk card broadcasts a random number on the network as its card address. If no other computer has claimed that address, the broadcasting computer configures the address as its own. If there is a conflict with another computer, the computer will try to use different IP combinations until it finds a working configuration.

ARCNet

  • ARCNet uses a token passing method in a logical ring similar to Token Ring networks.
  • However, the computers in an ARCNet network do not have to be connected in any particular fashion.
    • ARCNet can utilize a star, bus, or star bus topology.
  • Data transmissions are broadcast throughout the entire network, which is similar to Ethernet.
  • However, a token is used to allow computers to speak in turn.
    • The token is not passed in a logical ring order because ARCNet does not use the ring topology; instead the token is passed to the next highest numerical station
    • Use DIP switches to set the number (the Station Identifier) of the workstations, which you want to be beside each other so the token is passed to the next computer efficiently.
  • ARCNet isn't popular anymore => ARCNet speeds are a mere 2.5 Mbps.


Most important ARCNet facts for you to know:

  • ARCNet uses RG-62 (93 ohms) cabling;
  • it can be wired as a star, bus, or star bus; and
  • it uses a logical-ring media access method.

Summary Chart

Feature or Function CSMA/CD CSMA/CD Token Passing Demand Priority
Type of Communication Broadcast-based Broadcast-based Token-based Hub-based
Type of Access Method Contention Contention Non-contention Contention
Type of Network Ethernet LocalTalk Token Ring 
ARCnet
100VG-AnyLAN

 


E-mail Me! Comments and suggestions? E-mail me at grantwil@sk.sympatico.ca
Last Updated: Wednesday, March 10, 1999 Grant Wilson, Tisdale, SK. Canada