Documente Academic
Documente Profesional
Documente Cultură
[Type here]
[Type here]
Table of Contents
Title
Page
10
10
11
12
13
14
References
15
1
Created by Sorcia Kristi-Rose DArceuil
2
Created by Sorcia Kristi-Rose DArceuil
In addition, there are many communication protocols used in networking technology as well as
the layout of a network (network topology) plays a critical role in a networks architecture.
Table1. Below provides a list of the four basic network topologies used in network architecture.
3
Created by Sorcia Kristi-Rose DArceuil
Bus
Description
Image
4
Created by Sorcia Kristi-Rose DArceuil
Star
Ring
5
Created by Sorcia Kristi-Rose DArceuil
In the same way humans need communication to survive and thrive, technology requires the
same communication abilities to function and operate. At the core of any network is a highly
specialized highway of interconnected components and protocols that allow it to operate as it
should. In 1977 the International Organization for Standardization (ISO) made an effort to
regulate a computer networking by creating the Open Systems Interconnections Model. (OSI
Model.) This OSI model attempts to standardize the internal functions of a communication
system with distinct abstraction layers. The OSI model isn't a protocol but rather it is a model
created to ensure the architecture of a network is flexible, robust and interoperable with the
primary responsibility to facilitate communication between the different systems without
requiring any changes to the logic of the underlying software and hardware. In the model
communication functions are divided into seven logical layers each layer serves the layer above
it and the layer below it. The seven OSI layers begin with the 7th layer the Application layer that
provides different services to the application, the 6th layer the Presentation layer converts the
information while the 5th Session layer handles problems which are not communication issues.
Transport is the 4th layer and it provides end to end communication control while the 3rd layer,
the Network layer routes the information in the network. Data Link, (2nd layer) provides error
control and lastly the 1st layer, the physical layer connects the entity to the transmission media.
For example, a layer that provides error-free communications across a network provides the path
needed by applications above it, while it calls the next lower layer to send and receive packets
that make up the contents of that path. Two instances at one layer are connected by a horizontal
connection on that layer.
As mentioned previously, the underlying protocols that allow a network to be successful are just
as important the network topology. Thus the first computer networking model with standardized
protocols was created and funded by DARPA, initially known as the DoD model but later
became known as the Transmission Control Protocol (TCP) and the Internet Protocol (IP)
(TCP/IP) for its most important protocols. TCP/IP protocols are maintained by the Internet
Engineering Task Force (IETF) which provides an end-to-end connectivity specifying how data
should be transmitted, addressed, routed and received at the destination. The TCP/IP is organized
into four abstraction layers from lowest to highest; the link layer, the internet layer, transport
layer and the application layer. All layers are used to sort related protocols according to the
scope of networking involved. The first layer, the link layer contains communication
technologies for a single network segment (link), the second layer (internet layer) connects hosts
across independent networks and thus establishes internetworking. The transport layer is the
third layer and it handles host-to-host communication while the last layer, the application layer
provides process-to-process application data exchange. Table2. Below gives a detailed
comparison between the OSI and the TCP/IP models.
6
Created by Sorcia Kristi-Rose DArceuil
Table2. The Comparison between the OSI Model and TCP/IP model.
OSI (Open System Interconnection)
It has 7 layers
7
Created by Sorcia Kristi-Rose DArceuil
Encoding and Signaling: transform data from bits that reside within a device into signals
that can be sent over the network.
Data Transmission and Reception: correct encoding, transmission of data and receiving
of data.
Topology and Physical Network Design: hardware-related design issues, eg, WAN and
LAN.
All in all, the physical layer technologies generally deal with the actual ones and zeroes that are
sent over the network.
For example, when considering network interconnection devices, the simplest ones operate at the
physical layer: repeaters, conventional hubs and transceivers. These devices have absolutely no
knowledge of the contents of a message. They just take input bits and send them as output.
Devices like switches and routers operate at higher layers and look at the data they receive as
being more than voltage or light pulses that represent one or zero.
8
Created by Sorcia Kristi-Rose DArceuil
9
Created by Sorcia Kristi-Rose DArceuil
Network Layer
In contrast to the previous layer which only deals with devices that are local to each other, the
network layer is concerned with getting data, packaging output with the correct network address,
selecting routes and maintaining the quality of service when a data sequences is transmitted from
one computer to another destination host on a different network. Transition really begins at this
layer from the more abstract functions (higher layers) into the tasks required to get data to its
destination. This layer also recognizes and forwards to the transport layer incoming messages for
local host domains. The internet is possible at the network layer because routers are able to
perform at this level by sending data throughout the extended network. The network layer might
also perform fragmentation and reassembly and report delivery errors. The transport layer, in
relation to the transport layer continues this abstraction transition as you go up the OSI protocol
stack.
Transport Layer
As with any act of communication there must be a channel through which the communication
must move through. When humans verbally communicate, they do so by speaking, this is a
channel. Writing a letter is another channel. The Transport layer acts as the channel by which
networking can travel to from one device to another. Thus the overall job of the transport layer is
to provide the necessary functions to enable communication between software application
processes on different computers as it acts as a liaison between the abstract world of
applications at the higher layers and the concrete functions of layers one to three. Not only can
the line of communication at the transport layer be horizontal but also data can be moved to
upper layers as well. Thus, despite being associated the lower layers the transport of data results
in the layer having a fair bit in common with the layers 5 through 7. Flow control, segmentation/
de-segmentation and error control are the means by which this layer controls the reliability of
any given link and it can retransmit any link that fails.
10
Created by Sorcia Kristi-Rose DArceuil
Session layer
Likewise to the previous layers, the name of the session layer implies its function. A session is a
link between two software applications which allows them to exchange data over a prolonged
period of time. The session layer is also the 5th layer and it is the first layer of the higher levels
for the OSI model to be focused mainly on software application issues rather than all practical
matters related to addressing, packing and delivery of data. The primary job of session layer is to
provide the means necessary to manage, set up and end sessions although the session layer
software products are more a set of tools than specific protocols. These session-layer tools are
normally provided to higher layer protocols through command sets often called application
program interfaces or APIs. Common APIs include NetBIOS, TCP/IP Sockets and Remote
Procedure Calls (RPCs). Most programmers are interested in the tools (APIs) of the session
layer as they are used to develop application software that is able to communicate using TCP/IP
without having to know the implementation details of how TCP/IP works.
11
Created by Sorcia Kristi-Rose DArceuil
Presentation Layer
The personation layer is it in self a very unique layer. It is second from the top and has a limited
responsibility in the reference model protocol stack. The name of this layer suggests its main
function as well: it deals with the presentation of data, more specifically it is in charge of taking
care of any issues that might arise when data sent from a system needs to be viewed in a different
way by the other system. Additionally this layer takes care of any special processing that must be
done to data from the time an application tries to send it until the time it is sent over the network.
Syntax and Semantics are used mainly by the higher level entities (application layer) to transfer
data. The presentation layer then provides the mapping for the transfer to occur and it does so by
the encapsulation of the presentation service data units into session protocol data units which are
then passed down the stack. Thus providing independence from data representation by
translating between application and network formats. One of the three (Translation, Compression
and encryption) most important tasks undertaken by the presentation layer is translation.
Different types of computer systems (PCs, Macintoshes and UNIX systems) have distinct
characteristics and represent data in different ways, it is the job of the presentation layer to hide
these differences between machines. The compression function improves the throughput of data
while the encryption function ensures the security of the data as it travels down the protocol
stack.
12
Created by Sorcia Kristi-Rose DArceuil
Application Layer
This is the final layer of the protocol stack and it is the only layer that is closest to program user.
The main responsibilities at this layer are simply to implement the functions that are needed by
users of the network and to issue the appropriate commands to make use of the services provided
by the lower layers. However, the application layer is not limited to this, in the OSI model the
application layer provides services for user applications to employ thus they implement the
functions performed by uses to accomplish various task of the network. For example, when using
a web browser, the browser is actually a software application on your PC. It doesnt reside at the
application layer rather, it makes use of the services offered by a protocol that operates at the
application layer, which is called the Hypertext Transfer Protocol (HTTP). The distinction
between the browser and HTTP is subtle, but important. Nonetheless there exist many
application layer protocols that enable various functions at this layer some more include; FTP,
SMTP, DHCP, NFS, Telnet, SNMP, POP3, NNTP. Nonetheless not all application users use the
application layer of a network in the same way, in addition to, not all uses of the application
layer are by applications the operating system itself can and does use services directly at the
application layer.
13
Created by Sorcia Kristi-Rose DArceuil
encoding
Signaling
Physical Data Trasmissions
Hardware Specifications
Phyiscal
Data Link
LLC
Meida Access Conrol
Dat framing
Adressing
Error Detection & Handling
Local Addressing
Datagram Encapsulation
Fragmentation and Reassembly
Error Handling & Diagnostics
Network
Trasport
Process-Level Addresing
Multiplexing/ Demultiplexing
Connections
Sedmentations & Reassembly
Acknowledgments &
Retransmissions
Session Establishment
Management & Termination
Session
Presentation
Application
14
Created by Sorcia Kristi-Rose DArceuil
References
1. The TCP/IP Guide, Version 3.0 - Version Date: September 20, 2005.
http://www.tcpipguide.com/free/t_PhysicalLayerLayer1.htm
2. Introduction: Classification of Network Architecture
http://www.cs.toronto.edu/~marbach/COURSES/CSC358_S14/classification.pdf
3. Stephen McQuerry, Cisco Systems, CCNA Self-Study: Interconnecting Cisco Network Devices,
2nd Edition. Published Nov 19, 2003.
4. Matthew Gast. O'Reilly Media, Inc. 2005, 802.11 Wireless Networks
5. Stephen McQuerry, Cisco Systems, CCNA Self-Study: Introduction to Cisco Networking
Technologies (INTRO). Published Mar 9, 2004
15
Created by Sorcia Kristi-Rose DArceuil