Introducing Network Standards
Introducing Network Standards
1 Zewdu Tesfaye
After this lesson, you will be able to:
Network Communications
2 Zewdu Tesfaye
With the rapid growth of networking hardware and software, a need
arose for standard protocols that could allow hardware and software
from different vendors to communicate. In response, two primary sets
of standards were developed: the OSI reference model and a
modification of that standard called Project 802 (covered in the next
lesson).
NOTE
In 1984, the ISO released a revision of this model and called it the
Open Systems Interconnection (OSI) reference model. The 1984
revision has become an international standard and serves as a guide
for networking.
3 Zewdu Tesfaye
The OSI reference model is the best-known and most widely used
guide for visualizing networking environments. Manufacturers adhere
to the OSI reference model when they design network products. It
provides a description of how network hardware and software work
together in a layered fashion to make communications possible. The
model also helps to troubleshoot problems by providing a frame of
reference that describes how components are supposed to function.
A Layered Architecture
Each layer provides some service or action that prepares the data for
delivery over the network to another computer. The lowest layers—1
and 2—define the network's physical media and related tasks, such as
4 Zewdu Tesfaye
putting data bits onto the network interface cards (NICs) and cable.
The highest layers define how applications access communication
services. The higher the layer, the more complex its task.
Each layer provides services to the next-higher layer and shields the
upper layer from the details of how the services below it are actually
implemented. At the same time, each layer appears to be in direct
communication with its associated layer on the other computer. This
provides a logical, or virtual, communication between peer layers, as
shown in Figure 5.2. In reality, actual communication between adjacent
layers takes place on one computer only. At each layer, software
implements network functions according to a set of protocols.
5 Zewdu Tesfaye
Before data is passed from one layer to another, it is broken down into
packets, or units of information, which are transmitted as a whole from
one device to another on a network. (Packets were introduced in
Chapter 3, Lesson 2: How Networks Send Data.) The network passes a
packet from one software layer to another in the same order as that of
the layers. At each layer, the software adds additional formatting or
addressing to the packet, which is needed for the packet to be
successfully transmitted across the network.
At the receiving end, the packet passes through the layers in reverse
order. A software utility at each layer reads the information on the
packet, strips it away, and passes the packet up to the next layer.
When the packet is finally passed up to the application layer, the
addressing information has been stripped away and the packet is in its
original form, which is readable by the receiver.
With the exception of the lowest layer in the OSI networking model, no
layer can pass information directly to its counterpart on another
computer. Instead, information on the sending computer must be
passed down through each successive layer until it reaches the
physical layer. The information then moves across the networking
cable to the receiving computer and up that computer's networking
layers until it arrives at the corresponding layer. For example, when
the network layer sends information from computer A, the information
moves down through the data-link and physical layers on the sending
side, over the cable, and up the physical and data-link layers on the
receiving side to its final destination at the network layer on computer
B.
6 Zewdu Tesfaye
Interaction between adjacent layers occurs through an interface. The
interface defines the services offered by the lower networking layer to
the upper one and further defines how those services will be accessed.
In addition, each layer on one computer appears to be communicating
directly with the same layer on another computer.
The following sections describe the purpose of each of the seven layers
of the OSI reference model, and identify the services that each
provides to adjacent layers. Beginning at the top of the stack (layer 7,
the application layer), we work down to the bottom (layer 1, the
physical layer).
Application Layer
Presentation Layer
7 Zewdu Tesfaye
Apple, and Sun—need to communicate, a certain amount of translation
and byte reordering must be done. Within the sending computer, the
presentation layer translates data from the format sent down from the
application layer into a commonly recognized, intermediary format. At
the receiving computer, this layer translates the intermediary format
into a format that can be useful to that computer's application layer.
The presentation layer is responsible for converting protocols,
translating the data, encrypting the data, changing or converting the
character set, and expanding graphics commands. The presentation
layer also manages data compression to reduce the number of bits
that need to be transmitted.
Session Layer
Transport Layer
8 Zewdu Tesfaye
Layer 4, the transport layer, provides an additional connection level
beneath the session layer. The transport layer ensures that packets
are delivered error free, in sequence, and without losses or
duplications. At the sending computer, this layer repackages
messages, dividing long messages into several packets and collecting
small packets together in one package. This process ensures that
packets are transmitted efficiently over the network. At the receiving
computer, the transport layer opens the packets, reassembles the
original messages, and, typically, sends an acknowledgment that the
message was received. If a duplicate packet arrives, this layer will
recognize the duplicate and discard it.
The transport layer provides flow control and error handling, and
participates in solving problems concerned with the transmission and
reception of packets. Transmission Control Protocol (TCP) and
Sequenced Packet Exchange (SPX) are examples of transport-layer
protocols.
Network Layer
9 Zewdu Tesfaye
Protocol (IP) and Internetwork Packet Exchange (IPX) are examples of
network-layer protocols.
Data-Link Layer
Layer 2, the data-link layer, sends data frames from the network layer
to the physical layer. It controls the electrical impulses that enter and
leave the network cable. On the receiving end, the data-link layer
packages raw bits from the physical layer into data frames. (A data
frame is an organized, logical structure in which data can be placed.
Data frames are discussed in more detail in Chapter 3, Lesson 4: Token
Ring.) The electrical representation of the data (bit patterns, encoding
methods, and tokens) is known to this layer only.
Figure 5.3 shows a simple data frame. In this example, the sender ID
represents the address of the computer that is sending the
information; the destination ID represents the address of the computer
to which the information is being sent. The control information is used
for frame type, routing, and segmentation information. The data is the
information itself. The cyclical redundancy check (CRC) provides error
correction and verification information to ensure that the data frame is
received correctly.
10 Zewdu Tesfaye
The data-link layer is responsible for providing error-free transfer of
these frames from one computer to another through the physical layer.
This allows the network layer to anticipate virtually error-free
transmission over the network connection.
Physical Layer
Layer 1, the bottom layer of the OSI reference model, is the physical
layer. This layer transmits the unstructured, raw bit stream over a
physical medium (such as the network cable). The physical layer is
totally hardware-oriented and deals with all aspects of establishing and
maintaining a physical link between communicating computers. The
physical layer also carries the signals that transmit data generated by
each of the higher layers.
This layer defines how the cable is attached to the NIC. For example, it
defines how many pins the connector has and the function of each. It
also defines which transmission technique will be used to send data
over the network cable.
This layer provides data encoding and bit synchronization. The physical
layer is responsible for transmitting bits (zeros and ones) from one
computer to another, ensuring that when a transmitting host sends a 1
bit, it is received as a 1 bit, not a 0 bit. Because different types of
media physically transmit bits (light or electrical signals) differently,
the physical layer also defines the duration of each impulse and how
11 Zewdu Tesfaye
each bit is translated into the appropriate electrical or optical impulse
for the network cable.
Memorizing the layers of the OSI reference model and their order is
very important, especially when preparing to take a computer
networking exam. Table 5.1 provides two ways to help you recall the
seven layers of the OSI reference model.
Transport To Throw
12 Zewdu Tesfaye
creation process begins at the application layer of the OSI reference
model, where the data is generated. Information to be sent across the
network starts at the application layer and descends through all seven
layers.
13 Zewdu Tesfaye
At the transport layer, the original block of data is broken into the
actual packets. The protocol defines the structure of the packets used
by the two computers.
When the packets finally pass through the physical layer on their way
to the cable, they contain information from each of the other six layers.
Addressing Packets
In situations involving large networks that cover large regions (or even
countries) and offer several possible communication routes, the
network's connectivity and switching components use the packet's
addressing information to determine the best route for addressing
packets.
Directing Packets
14 Zewdu Tesfaye
Packet forwarding Computers send a packet on to the next
appropriate network component based on the address in the
packet's header.
Packet filtering Computers use criteria, such as an address, to
select specific packets.
15 Zewdu Tesfaye
Figure 5.5 Windows NT and OSI
Transport Protocols
NIC drivers operate in the data-link and physical layers of the OSI
reference model. They are responsible for adding the hardware
address information to the data packet and for formatting the data for
16 Zewdu Tesfaye
transmission through the NIC and cable. NIC drivers are protocol-
independent, allowing systems based on Windows NT to transport data
to a variety of network systems.
Figure 5.6 shows how software and protocols relate to the OSI
reference model and the Windows NT model.
Windows NT Interfaces
17 Zewdu Tesfaye
Figure 5.7 Windows NT architecture with boundary interfaces
The transport driver interfaces (TDIs) work between the file system
drives and the transport protocols. These will allow any protocol
written to TDI to communicate with the file system drivers.
18 Zewdu Tesfaye
Exercise 5.1: Reviewing the OSI Reference Model Layers
This two-part exercise will give you the opportunity to memorize and
review the layers of the OSI reference model.
The left column is a listing of a memorization tool: "All People Seem To Need Data
Processing." Next to each word in that column, enter the appropriate name of the
applicable OSI layer in the center column and a brief description of that layer's function
in the right column.
All
People
Seem
To
Need
Data
Processing
In the second part of Exercise 1 that follows, a device or standard is listed in the left
column. In the space provided in the right column, write in the applicable OSI layer(s) for
each device or standard.
Gateway
NIC
Hub
Router
19 Zewdu Tesfaye
IEEE 802.x
Answers
Lesson Summary
The bottom two layers of the OSI reference model pertain to hardware:
the NIC and the network cabling. To further refine the requirements for
hardware that operate within these layers, the Institute of Electrical
and Electronics Engineers (IEEE) has developed enhancements specific
to different NICs and cabling. Collectively, these refinements are
known as the 802 project. This lesson describes these enhancements
and how they relate to OSI.
20 Zewdu Tesfaye
Estimated lesson time: 20 minutes
Although the published IEEE 802 standards actually predated the ISO
standards, both were in development at roughly the same time, and
both shared information that resulted in the creation of two compatible
models.
The 802 specifications define the ways NICs access and transfer data
over physical media. These include connecting, maintaining, and
disconnecting network devices.
NOTE
Choosing which protocol to run at the data-link layer is the single most
important decision you make when designing a LAN. This protocol
21 Zewdu Tesfaye
defines the speed of the network, the method used to access the
physical network, the types of cables you can use, and the NICs and
drivers you install.
The LAN standards defined by the 802 committees are classified into
16 categories that can be identified by their 802 number as shown in
Table 5.2:
Specificat Description
ion
802.3 Defines the MAC layer for bus networks that use
Carrier-Sense Multiple Access with Collision Detection
(CSMA/CD). This is the Ethernet Standard.
802.4 Defines the MAC layer for bus networks that use a
token-passing mechanism (Token Bus LAN).
802.5 Defines the MAC layer for token ring networks (Token
Ring LAN).
22 Zewdu Tesfaye
LANs, but smaller than WANs. MANs are usually
characterized by very-high-speed connections using
fiber-optic cables or other digital media.
802.13 Unused.
The bottom two OSI layers, the physical layer and the data-link layer,
define how multiple computers can use the network simultaneously
without interfering with each other.
After deciding that more detail was needed at the data-link layer, the
802 standards committee divided the data-link layer into two
sublayers:
23 Zewdu Tesfaye
Logical Link Control (LLC) Establishing and terminating links,
controlling frame traffic, sequencing frames, and acknowledging
frames
Media Access Control (MAC) Managing media access, delimiting
frames, checking frame errors, and recognizing frame addresses
As Figure 5.9 indicates, the MAC sublayer is the lower of the two
sublayers, providing shared access to the physical layer for the
computers' NICs. The MAC layer communicates directly with the NIC
and is responsible for delivering error-free data between two
computers on the network.
Categories 802.3, 802.4, 802.5, and 802.12 define standards for both
this sublayer and OSI layer 1, the physical layer.
24 Zewdu Tesfaye
Figure 5.9 Project 802 LLC and MAC standards
In this exercise, IEEE 802 standards categories are listed in the left column. In the right
column, enter a description of what each category represents.
802.1
802.2
802.3
802.4
802.5
802.6
802.7
802.8
802.9
802.10
802.11
802.12
802.13
25 Zewdu Tesfaye
802.14
802.15
802.16
Answers
Lesson Summary
[Previous] [Next]
26 Zewdu Tesfaye
Describe the function of NDIS and ODI.
There are drivers for nearly every type of computer device and
peripheral including:
27 Zewdu Tesfaye
As a general rule, manufacturers of components, such as peripherals
or cards that must be physically installed, are responsible for supplying
the drivers for their equipment. For example, NIC manufacturers are
responsible for making drivers available for their cards. Drivers
generally are included on a disk with the equipment when it is
purchased, included with the computer's operating system, or made
available for downloading from an Internet service provider such as the
Microsoft Network (MSN), CompuServe, or others.
NIC drivers reside in the MAC sublayer of the OSI reference model's
data-link layer. The MAC sublayer is responsible for providing shared
access to the physical layer for the computer's NICs. As shown in
Figure 5.10, the NIC drivers provide virtual communication between
the computer and the NIC. This, in turn, provides a link between the
computer and the rest of the network.
28 Zewdu Tesfaye
Figure 5.10 Communication between the NIC and network software
NOTE
Even if the driver for a particular card has not been included with the
network operating system, it is usual for the manufacturer of the NIC to
include drivers for most popular network operating systems on a disk
that is shipped with the card. Before buying a card, however, make
sure that the card has a driver that will work with a particular network
operating system. Installation and configuration of drivers is discussed
in detail in Chapter 8, "Designing and Installing a Network."
29 Zewdu Tesfaye
Network Driver Interface Specification (NDIS) is a standard that defines
an interface for communication between the MAC sublayer and the
protocol drivers. By permitting the simultaneous use of multiple
protocols and drivers, NDIS allows for a flexible environment of data
exchange. It defines the software interface, known as the NDIS
interface. Protocol drivers use this interface to communicate with the
NICs. The advantage of NDIS is that it offers protocol multiplexing,
so that multiple protocol stacks can be used at the same time. Three
types of network software have interfaces described by NDIS:
Microsoft and 3Com jointly developed the NDIS specification for use
with Warp Server and Windows NT Server. All NIC manufacturers make
their boards work with these operating systems by supplying NDIS-
compliant software drivers.
30 Zewdu Tesfaye
Bridging NDIS and ODI
NOTE
Lesson Checkup
1. Define ODI and describe the role it plays in Novell and Apple
NOSs.
2. Printer manufacturers are responsible for writing _______________
for their printer products.
3. Drivers described in an operating system manufacturer's ________
have been tested and included with their operating system.
4. NIC drivers reside on the computer's _________ _________.
5. Protocol drivers use an _________ interface to communicate with
the NICs.
6. Translation software is required to _____________ ________________
NDIS and ODI.
Answers
Lesson Summary
31 Zewdu Tesfaye
A driver is a device-specific control program that enables a
computer to work with a particular device, such as a printer or a
disk drive.
In networking, drivers are needed to provide the connection
between the computer and the NIC.
NIC drivers reside in the MAC sublayer of the data-link layer of
the OSI reference model.
NDIS is a standard that defines the interface for Windows NT
Server and Warp Server.
ODI is a standard that defines the interface for Apple and Novell
systems.
[Previous] [Next]
Chapter Summary
IEEE 802.x
32 Zewdu Tesfaye
The IEEE 802 standards divide the data-link layer into two
subgroups: Logical Link Control (LLC) and Media Access Control
(MAC).
[Previous] [Next]
Chapter Review
33 Zewdu Tesfaye
5. The top, or ___________________, layer handles general network
access, flow control, and error recovery.
6. At the sending computer, the _____________________ layer
translates data from a format sent down from the application
layer.
7. The ________________ layer determines the route from the source
to the destination computer.
8. The data-link layer is responsible for sending __________
___________ from the network layer to the physical layer.
9. The ________________ information in a data frame is used for
frame type, routing, and segmentation information.
10. The __________________ layer defines how the cable is
attached to the NIC.
11. Windows NT groups the seven OSI layers into three. The
three NT layers are ________ ____________ ___________, ____________
_______________, and ________ _____________.
12. An _________ provides the interface between the Windows
NT applications and file system drivers layer.
13. A _________ provides the interface between the Windows NT
file system drivers layer and the transport protocols.
14. An _________ provides the interface between the Windows
NT, the transport protocols layer, and the NIC drivers.
15. The Project 802 specifications define the way __________
access and transfer data over physical media.
16. The 802 project divided the __________ - __________ layer of
the OSI reference model into two sublayers, the Logical Link
Control (LLC) layer and the Media Access Control (MAC) layer.
17. The _________ sublayer communicates directly with the NIC
and is responsible for delivering error-free data between two
computers on the network.
18. The IEEE category __________ covers LAN standards for
Ethernet.
34 Zewdu Tesfaye
19. The IEEE category __________ covers LAN standards for
Token Ring.
20. A driver is _______________ that enables a computer to work
with a device.
21. NICs work in the _________ sublayer of the __________ -
_________ layer of the OSI reference model.
22. NDIS defines an interface for communication between the
__________ sublayer and the protocol drivers.
23. NDIS was jointly developed by ___________________ and
____________.
24. ODI works just like NDIS but was developed by
______________ and ________________ for interfacing hardware to
their protocols.
Answers
35 Zewdu Tesfaye