Sie sind auf Seite 1von 8

Basic Networking Idea : Packets/Data Source ---------------> Destination

The 7 OSI Layers : ________________ ________________

OSI Model :

Application Layer - Layer 7 :FTP, HTTP, TFTP, SNMP - E-mail Transfers et c. | | Presentation Layer - Layer 6 :Checks for syntax | | Session Layer - Layer 5 :Establishes sessions | | Transport Layer - Layer 4 :Protocols : TCP & UDP | -------------------------------------------------------------------------| Network Layer - Layer 3 Devices : Routers | _ LLC : Logical Link Control Layer | | DataLink Layer - Layer 2 Devices : Switches,Bridges and Hubs---| |_ MAC : Media Access Control Layer | Physical Layer - Layer 1 Devices: PC, Physical Connections like Ether net, Cable etc.

The OSI, or Open System Interconnection, model defines a networking framework to implement protocols in seven layers. This article explains the 7 Layers of the OSI Model. The OSI, or Open System Interconnection, model defines a networking framework to implement protocols in seven layers. Control is passed from one layer to the ne xt, starting at the application layer in one station, and proceeding to the bott om layer, over the channel to the next station and back up the hierarchy. ________________________________________________________________________________ _________________

**** To Remember the OSI Layers from Layer 1 to 7 in order **** : Remember this line : "(P)lease (D)o (N)ot (T)hrow (S)tuffed (P)arotas (A)way." Bracketed letters indicate the Layer names as above in the figure. ________________________________________________________________________________ _________________ ***NOTE*** : (Concentrate more on Layer 1 , 2 and 3 as basic questions mainly wo uld be from these 3 layers. But, also go through the other 4 layers & understand them as reference to answer any other questions.Please be fully thorough in OSI Model, its layers and function of each layer and what it consists. As they are the basics. This document will help you definitely to understand the same.) ________________________________________________________________________________ _____________________

DESCRIPTION OF EACH LAYER : _____________________________

Application (Layer 7) : This layer supports application and end-user processes. Communication partners a re identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything a t this layer is application-specific. This layer provides application services f or file transfers, e-mail, and other network software services. Telnet and FTP a re applications that exist entirely in the application level. Tiered application architectures are part of this layer.

Presentation (Layer 6) : Is your network ready for the cloud? Find out : read Five Reasons Classic Ethern et Switches Won't Support the Cloud and learn how to examine your network s strengt h and eliminate any weak points. This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. T he presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a netw ork, providing freedom from compatibility problems. It is sometimes called the s yntax layer. Session (Layer 5) : This layer establishes, manages and terminates connections between applications.

The session layer sets up, coordinates, and terminates conversations, exchanges , and dialogues between the applications at each end. It deals with session and connection coordination.

Transport (Layer 4) : This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures co mplete data transfer. It consists of protocols namely : *TCP & UDP*. TCP : Transmission Control Protocol for Reliable communication & UDP : User Datagram Protocol : for Unreliable communication.

Network (Layer 3) : This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing.

Data Link (Layer 2) :

At this layer, data packets are encoded and decoded into bits. It furnishes tran smission protocol knowledge and management and handles errors in the physical la yer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Contr ol (LLC) layer. The MAC sub layer controls how a computer on the network gains a ccess to the data and permission to transmit it. The LLC layer controls frame sy nchronization, flow control and error checking.

Physical (Layer 1) :

This layer conveys the bit stream - electrical impulse, light or radio signal -through the network at the electrical and mechanical level. It provides the har dware means of sending and receiving data on a carrier, including defining cable s, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components. Layer 1 consists of Physical Connection like Fast Ethernet, GigabitEthernet, Ten Gigabit Ethernet depending on the speed of the data transfer through it.

2 models : OSI Model & TCP/IP Model : ____________________________________ OSI - 7 Layers TCP/IP - 4 Layers - Physical, Datalink, Internet Layer & Application Layer. IP Address : Layer 3 (via Internet Protocol : IP) MAC Address : Layer 2 (via Address Resolution Protocol : ARP) ___________________ IP Address Classes : ___________________ An IP address has two components : the network address and the host address. A subnet mask separates the IP address into the network and host addresses. CLASS A : 0-127 Subnet Mask : 255.0.0.0 CLASS B : 128-191 Subnet Mask : 255.255.0.0 CLASS C : 192-223 Subnet Mask : 255.255.255.0 Subnet Mask is made by setting network bits to all "1"s and setting host bits to all "0"s. Within a given network, two host addresses are reserved for special p urpose. The "0" address is assigned a network address and "255" is assigned to a broadcast address, and they cannot be assigned to a host. Difference b/w Hub, Switch, Bridge, Gateway & Router : ___________________________________________ In an ethernet network there are 4 devices that from the the outside look very s imilar. In this article we will look at the difference between hubs, switches, b ridges, and routers.

Switch ______ A switch steps up on a bridge in that it has multiple ports. When a packet comes through a switch it is read to determine which computer to send the data to. This leads to increased efficiency in that packets are not going to computers th at do not require them. Now the email analogy has multiple people able to send email to multiple users. The switch can decide where to send the mail based on the address. Most large networks use switches rather than hubs to connect computers within th e same subnet. SWITCH IS A LAYER 2 Device. But, few switches can be made to act as a Layer 3 de vice too. Layer 2 devices do not understand IP Addresses. So, they use MAC Addresses for t he communication.

A device that directs data packets along a path is a SWITCH. It may include the function of a router. In general, a switch is a simpler and faster mechanism tha n a router as it does not maintain knowledge of the networks. A switch is not al ways required in a network. Many LANs are organised so that the nodes inspect ea ch data packet. Router ______ A router is similar to a switch in that it forwards packets based on address. Bu t, instead of the MAC address that a switch uses, a router can use the IP addres s. This allows the network to go across different protocols. The most common home use for routers is to share a broadband internet connection . The router has a public IP address and that address is shared with the network . When data comes through the router it is forwarded to the correct computer. This comparison to email gets a little off base. This would be similar to the ro uter being able to receive a packet as email and sending it to the user as a fax . ROUTER is a LAYER 3 Device. Layer 3 devices use IP Address to identify the destination. Hub : _____ A hub is the simplest of these devices. Any data packet coming from sent to all other ports. It is then up to the receiving computer to e packet is for it. Imagine packets going through a hub as messages mailing list. The mail is sent out to everyone and it is up to the rty to decide if it is of interest. one port is decide if th going into a receiving pa

The biggest problem with hubs is their simplicity. Since every packet is sent ou t to every computer on the network, there is a lot of wasted transmission. This means that the network can easily become bogged down. Hubs are typically used on small networks where the amount of data going across the network is never very high. Hub is a Layer 2 device. Bridge : _______ A combination of hardware and software to link two similar networks. It often co nnects LANs that use the same protocol, such as Ethernet. A bridge examines each data packet on a LAN and forwards any data packets addressed to a connected LAN . Bridges are faster than routers because they connect networks that are using t he same protocol. A bridge goes one step up on a hub in that it looks at the destination of the pa cket before sending. If the destination address is not on the other side of the

bridge it will not transmit the data. A bridge only has one incoming and one outgoing port. To build on the email analogy above, the bridge is allowed to decide if the mess age should continue on. It reads the address bob@smith.com and decides if there is a bob@smith.com on the other side. If there isn t, the message will not be tran smitted. Bridges are typically used to separate parts of a network that do not need to co mmunicate regularly, but still need to be connected. Bridge is a Layer 2 device. Gateway : _______ A combination of hardware and software to link two different types of networks. This usually involves converting different protocols. For example, a gateway cou ld be used to convert a TCP/IP packet to a NetWare IPX packet. Other Basic Questions : _____________________

1. Define Network? A network is a set of devices connected by physical media links. A network is re cursively is a connection of two or more nodes by a physical link or two or more networks connected by one or more nodes.

2. What is a Link? At the lowest level, a network can consist of two or more computers directly con nected by some physical medium such as coaxial cable or optical fiber. Such a ph ysical medium is called as Link.

3. What is a node? A network can consist of two or more computers directly connected by some physic al medium such as coaxial cable or optical fiber. Such a physical medium is call ed as Links and the computer it connects is called as Nodes.

4. What is a gateway or Router? A node that is connected to two or more networks is commonly called as router or Gateway. It generally forwards message from one network to another. a). Define Routing?

The process of determining systematically how to forward messages toward the des tination nodes based on its address is called routing. 5. What is point-point link? If the physical links are limited to a pair of nodes it is said to be point-poin t link. 6. What is Multiple Access? If the physical links are shared by more than two nodes, it is said to be Multip le Access. 7. What Is a Server? In computer networking, a server is a computer designed to process requests and deliver data to other computers over a local network or the Internet. Common typ es of network servers include Web, proxy and FTP servers.

8. What Is a Network Protocol? Protocols serve as a language of communication among network devices. Network pr otocols like HTTP, TCP/IP, and SMTP provide a foundation that much of the Intern et is built on. Find out more about these protocols and how they work. a). What is Protocol? A protocol is a set of rules that govern all aspects of information communicatio n.

9. TCP/IP - Transmission Control Protocol / Internet Protocol TCP/IP provides connection-oriented communication between network devices. TCP/I P is very commonly used both on the Internet and in home computer networks.

10. Firewalls A network firewall guards a computer against unauthorized network access. Firewa lls are one of the essential elements of a safe home or business network. 11. Networking Basics: Ethernet Ethernet is a physical and data link layer technology for local area networks (L ANs). Ethernet is reliable and inexpensive, the leading standard worldwide for b uilding wired LANs. 12. Network Addresses :

Network addresses give computers unique identities they can use to communicate w ith each other. Specifically, IP addresses and MAC addresses are used on most ho me and business networks.

13. What are the criteria necessary for an effective and efficient network? a. Performance It can be measured in many ways, including transmit time and response time. b. Reliability It is measured by frequency of failure, the time it takes a link to recover f rom a failure, and the network's robustness. c. Security Security issues includes protecting data from unauthorized access and virues.

Das könnte Ihnen auch gefallen