Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

Similar documents
TCP/IP Overview. Basic Networking Concepts. 09/14/11 Basic TCP/IP Networking 1

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

TCP/IP THE TCP/IP ARCHITECTURE

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Defining Networks with the OSI Model. Module 2

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

Chapter 7. Local Area Network Communications Protocols

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

Chapter -4 OSI Reference Model

Peer entities. Protocol Layering. Protocols. Example

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Transport Layer TCP & UDP Week 7. Module : Computer Networks Lecturers : Lucy White Office : 324

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

The Data Link Layer. 32 PART I Networking Basics

Computer Networks (Introduction to TCP/IP Protocols)

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

Chapter 2 Network Models 2.1

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc.

Networks: Access Management

Need For Protocol Architecture

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

TSIN02 - Internetworking

Copyleft 2005, Binnur Kurt. Objectives

NT1210 Introduction to Networking. Unit 10

Introduction to Open System Interconnection Reference Model

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

System Programming. Introduction to computer networks

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

Introduction to computer networking

Chapter 16 Networking

OSI Transport Layer. objectives

CPS221 Lecture: Layered Network Architecture

Networking Applications

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Data & Computer Communication

Need For Protocol Architecture

Chapter 12 Network Protocols

The Transmission Control Protocol (TCP)

Communicating over the Network

TSIN02 - Internetworking

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

Introduction to Protocols

Lecture-4. TCP/IP-Overview:

SUBJECT: DATA COMMUNICATION AND NETWORK SEMESTER: V SEMESTER COURSE: BCA SUBJECT TEACHER: Dr.K.Chitra Assistant Professor, Department of Computer

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

KillTest ᦝ䬺 䬽䭶䭱䮱䮍䭪䎃䎃䎃ᦝ䬺 䬽䭼䯃䮚䮀 㗴 㓸 NZZV ]]] QORRZKYZ PV ٶ瀂䐘މ悹伥濴瀦濮瀃瀆ݕ 濴瀦

Data Communication and Network. Introducing Networks

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Internetworking Models The OSI Reference Model

products. OSI is an ISO Standard: OSI was officially adopted as an international standard by the International Organisation of Standards (ISO).

ch02 True/False Indicate whether the statement is true or false.

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

TCP /IP Fundamentals Mr. Cantu

Introduction to TCP/IP networking

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

CS-461 Internetworking. Dr. Mohamed Aboutabl

Introduction and Layered Network Architecture. EEE 538 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

TSIN02 - Internetworking

ITEC 3800 Data Communication and Network. Introducing Networks

Scribe Notes -- October 31st, 2017

Cross Layer Protocol Design. Radio Communication III

Network Architecture Models

Network Model: Each layer has a specific function.

Network Reference Models

Overview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers.

4.0.1 CHAPTER INTRODUCTION

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

UDP, TCP, IP multicast

Chapter 2 Network Architectures A global view

EE 610 Part 2: Encapsulation and network utilities

CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers

Chapter 09 Network Protocols

Networking interview questions

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

TSIN02 - Internetworking

CS3600 SYSTEMS AND NETWORKS

Introduction to Networking

Chapter 2 Network Models 2.1

Transport Layer. Gursharan Singh Tatla. Upendra Sharma. 1

Reti di Calcolatori I

OSI ISO, OSI Reference Model

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

Data Transport over IP Networks

Lecture (02) Network Protocols and Standards

Cisco Cisco Certified Network Associate (CCNA)

Interconnecting Networks with TCP/IP

NETWORK PACKET ANALYSIS PROGRAM

CSCD 433/533 Advanced Networks

Data and Computer Communications

QUESTION BANK ENGINEERS ACADEMY. Computer Networks Computer Network Basics Segentation is done in. 12. Session layer is used for

TCP/IP protocol suite

Transcription:

Part VI Appendixes Appendix A OSI Model and Internet Protocols Appendix B About the CD

OSI Model and Internet Protocols APPENDIX A In this appendix, you will Learn about the OSI model Review the network protocols associated with the Internet Networks are interconnected groups of computers and specialty hardware designed to facilitate the transmission of data from one device to another. The basic function of the network is to allow machines and devices to communicate with each other in an orderly fashion. Networking Frameworks and Protocols Today s networks consist of a wide variety of types and sizes of equipment from multiple vendors. To ensure an effective and efficient transfer of information between devices, agreements as to how the transfer should proceed between vendors are required. The term protocol refers to a standard set of rules developed to facilitate a specific level of functionality. In networking, a wide range of protocols have been developed, some proprietary and some public, to facilitate communication between machines. Just as speakers need a common language to communicate, or they must at least understand each other s language, computers and networks must agree on a common protocol. Communication requires that all parties have a common understanding of the object under discussion. If the object is intangible or not present, each party needs some method of referencing items in such a way that the other party understands. A model is a tool used as a framework to give people common points of reference when discussing items. Mathematical models are common in science, because they give people the ability to compare answers and results. In much the same way, models are used in many disciplines to facilitate communication. Network models have been developed by many companies as ways to communicate among engineers what specific functionality is occurring when and where in a network. As the Internet took shape, a series of protocols was needed to ensure interoperability across this universal network structure. The Transmission Control Protocol (TCP), 601

CompTIA Security+ All-in-One Exam Guide, 3rd Edition 602 User Datagram Protocol (UDP), and Internet Protocol (IP) are three of the commonly used protocols that enable data movement across the Internet. As these protocols work in concert with one another, you typically see TCP/IP or UDP/IP as pairs in use. A basic understanding of the terms and of the usage of protocols and models is essential to discuss networking functionality, for it provides the necessary points of reference to understand what is happening where and when in the complex stream of operations that are involved in networking. OSI Model To facilitate cross-vendor and multicompany communication, in 1984 the International Organization for Standardization (ISO) created the Open Systems Interconnection (OSI) model for networking. The OSI model is probably the most referenced and widely discussed model in networking. Although it never fully caught on in North America, portions of it have been adopted as reference points, even to the extent of being incorporated into company names. Layer 2, layer 3, network layer, level 3 these are all references to portions of the OSI model. These references allow people to communicate in a clear and unambiguous fashion when speaking of abstract and out of context issues. These references provide context to detail in the complex arena of networking. The terms level and layer have been used interchangeably to describe the sections of the OSI model, although layer is the more common term. The OSI model is composed of seven layers stacked in a linear fashion. These layers are, from top to bottom, application, presentation, session, transport, network, datalink, and physical. You can use a mnemonic to remember them: All People Seem To Need Data Processing. Each layer has defined functionality and separation designed to allow multiple protocols to work together in a coordinated fashion. Although the OSI model is probably the most referenced, standardized network model, a more common model, the Internet model, has risen to dominate the Internet. The OSI model enjoys the status of being a formal, defined international standard, while the Internet model has never been formally defined. The Internet model is basically the same as the OSI model, with the top three OSI layers combined into a single application layer, leaving a total of five layers in the Internet model. Both models are shown in Figure A-1. One aspect of these models is that they allow specific levels of functionality to be broken apart and performed in sequence. This delineation also determines which layers can communicate with others. At each layer, specific data forms and protocols can exist, which makes them compatible with similar protocols and data forms on other machines at the same layer. This makes it seem as if each layer is communicating with its counterpart on the same layer in another computer, although this is just a virtual connection. The only real connection between boxes is at the physical layer of these models. All other connections are virtual although they appear real to a user, they do not actually exist in reality. The true communication between layers occurs vertically, up and down each layer can communicate only with its immediate neighbor above and below. In Figure A-2,

Appendix A: OSI Model and Internet Protocols 603 Figure A-1 OSI and Internet network models the direct communication path is shown as a bold line between the two physical layers. All data between the boxes traverses this line. The dotted lines between higher layers represent virtual connections, and the associated activities and protocols are also listed PART VI Figure A-2 Network model communication paths

CompTIA Security+ All-in-One Exam Guide, 3rd Edition 604 for most layers (the protocols are also listed in Table A-1). These dotted lines are virtual data does not actually cross them, although it appears as though it does. The true path of data is down to the physical layer and back up to the same layer on another machine. Application Layer The application layer is the typical interface to the actual application being used. This is the layer of the communication stack that is typically responsible for initiating the request for communication. For example, Internet Explorer is an application program that operates in the application layer using HTTP to move data between systems. This layer represents the user s access to the system and the network. While it appears that the application is communicating directly with an application on another machine, this is actually a virtual connection. The application layer is also sometimes referred to as layer 7 in the OSI model. Several protocols are commonly found in the application layer, including Hypertext Transfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), and Simple Network Management Protocol (SNMP). In the OSI model, the application layer actually communicates with the presentation layer only on its own machine. In the Internet model, the immediate level below the application layer is the transport layer, and this is the only layer directly called by the application layer in this model. As a result of the missing presentation and session layers in the Internet model, the functionality of these OSI layers is performed by the application layer. The session layer functionality present in the Internet model s application layer includes the initiation, maintenance, and termination of logical sessions between endpoints in the network communication. The session layer functionality also includes session level accounting and encryption services. The presentation layer functionality of the OSI model is also included in the Internet model s application layer, specifically functionality to format the display parameters of the data being received. Any other functions not specifically included in the lower layers of the Internet model are specifically included in the application layer. Layer Commonly Used Protocols Application HTTP, SNMP, SMTP, FTP, Telnet Presentation XDR Session SSL, TLS Transport TCP, UCP Network IP, ICMP Data-link IEEE 802.3 (Ethernet), IEEE 802.5 (Token Ring), ARP, RARP Physical IEEE 802.3 (Ethernet) hardware, IEEE 802.5 (Token Ring) hardware Table A-1 Common Protocols by OSI Layer

Presentation Layer Appendix A: OSI Model and Internet Protocols 605 The presentation layer gets its name from its primary function: preparing for the presentation of data. It is responsible for preparing the data for different interfaces on different types of terminals or displays so the application does not have to deal with this task. Data compression, character set translation, and encryption are found in this layer. The presentation layer communicates with only two layers the application layer above it and the session layer below it. The presentation layer is also known as layer 6 of the OSI model. Session Layer The primary responsibility of the session layer is the managing of communication sessions between machines. The management functions include initiating, maintaining, and terminating sessions. Managing a session can be compared to making an ordinary phone call. When you dial, you initiate a session. The session must be maintained in an open state during the call. At the completion of the call, you hang up and the circuit must be terminated. As each session can have its own parameters, the session layer is responsible for setting them up, including security, encryption, and billing or accounting functions. The session layer communicates exclusively with the presentation layer above it and the transport layer below it. The session layer is also known as layer 5 of the OSI model. Transport Layer The transport layer is responsible for dealing with the end-to-end transport of data across the network connection. To perform this task, the transport layer handles data entering and leaving the network through logical connections. It can add and use address-specific information, such as ports, to accomplish this task. A port is an addressspecific extension that enables multiple simultaneous communications between machines. Should the data transmission be too large for a single-packet transport, the transport layer manages breaking up the data stream into chunks and reassembling it. It ensures that all packets are transmitted and received, and it can request lost packets and eliminate duplicate packets. Error checking can also be performed at this level, although this function is usually performed at the data-link layer. Protocols can be either connection oriented or connectionless. If the protocol is connection oriented, the transport layer manages the connection information. In the case of TCP, the transport layer manages missing packet retransmission requests via the sliding window algorithm. The transport layer communicates exclusively with the session layer above it and the network layer below it. The transport layer is also known as layer 4 of the OSI model. PART VI

CompTIA Security+ All-in-One Exam Guide, 3rd Edition 606 Network Layer The network layer is responsible for routing packets across the network. Routing functions determine the next best destination for a packet and will determine the full address of the target computer if necessary. Common protocols at this level include IP and Internet Control Message Protocol (ICMP). The network layer communicates exclusively with the transport layer above it and the data-link layer below it. The network layer is also known as layer 3 of the OSI model. Data-Link Layer The data-link layer is responsible for the delivery and receipt of data from the hardware in layer 1, the physical layer. Layer 1 only manipulates a stream of bits, so the data-link layer must convert the packets from the network layer into bit streams in a form that can be understood by the physical layer. To ensure accurate transmission, the data-link layer adds end-of-message markers onto each packet and also manages error detection, correction, and retransmission functions. This layer also performs the media-access function, determining when to send and receive data based on network traffic. At this layer, the data packets are technically known as frames, although many practitioners use packet in a generic sense. The data-link layer communicates exclusively with the network layer above it and the physical layer below it. The data-link layer is also known as layer 2 of the OSI model, and it is where LAN switching based on machine-address functionality occurs. Physical Layer The physical layer is the realm of communication hardware and software, where 1s and 0s become waves of light, voltage levels, phase shifts, and other physical entities as defined by the particular transmission standard. This layer defines the physical method of signal transmission between machines in terms of electrical and optical characteristics. The physical layer is the point of connection to the outside world via standard connectors, again determined by signal type and protocol. The physical layer communicates with the physical layer on other machines via wire, fiber-optics, or radio waves. The physical layer also communicates with the datalink layer above it. The physical layer is also referred to as OSI layer 1. Internet Protocols To facilitate cross-vendor product communication, protocols have been adopted to standardize methods. The Internet brought several new protocols into existence, a few of which are commonly used in routing of information. Two protocols used at the transport layer are TCP and UDP, whereas IP is used at the network layer. In each session, one transport layer protocol and one network layer protocol is used, making the pairs TCP/IP and UDP/IP.

TCP Appendix A: OSI Model and Internet Protocols 607 TCP is the primary transport protocol used on the Internet today, accounting for more than 80 percent of packets on the Internet. TCP begins by establishing a virtual connection through a mechanism known as the TCP handshake. This handshake involves three signals: a SYN signal sent to the target, a SYN/ACK returned in response, and then an ACK sent back to the target to complete the circuit. This establishes a virtual connection between machines over which the data will be transported, and that is why TCP is referred to as being connection oriented. TCP is classified as a reliable protocol and will ensure that packets are sent, received, and ordered using sequence numbers. Some overhead is associated with the sequencing of packets and maintaining this order, but for many communications, this is essential, such as in e-mail transmissions, HTTP, and the like. TCP has facilities to perform all the required functions of the transport layer. TCP has congestion- and flow-control mechanisms to report congestion and other trafficrelated information back to the sender to assist in traffic-level management. Multiple TCP connections can be established between machines through a mechanism known as ports. TCP ports are numbered from 0 to 65,535, although ports below 1024 are typically reserved for specific functions. TCP ports are separate entities from UDP ports and can be used at the same time. UDP UDP is a simpler form of transport protocol than TCP. UDP performs all of the required functionality of the transport layer, but it does not perform the maintenance and checking functions of TCP. UDP does not establish a connection and does not use sequence numbers. UDP packets are sent via the best effort method, often referred to as fire and forget, because the packets either reach their destination or they are lost forever. It offers no retransmission mechanism, which is why UDP is called an unreliable protocol. UDP does not have traffic-management or flow-control functions as TCP does. This results in much lower overhead and makes UDP ideal for streaming data sources, such as audio and video traffic, where latency between packets can be an issue. Essential services such as Dynamic Host Configuration Protocol (DHCP) and Domain Name Service (DNS) use UDP, primarily because of the low overhead. When packets do get lost, which is rare in modern networks, they can be resent. Multiple UDP connections can be established between machines via ports. UDP ports are numbered from 0 to 65,535, although ports below 1024 are typically reserved for specific functionality. UDP ports are separate entities from TCP ports and can be used at the same time. PART VI IP IP is a connectionless protocol used for routing messages across the Internet. Its primary purpose is to address packets with IP addresses, both destination and source, and

CompTIA Security+ All-in-One Exam Guide, 3rd Edition 608 to use these addresses to determine the next hop to which the packet will be transmitted. As IP is connectionless, IP packets can take different routes at different times between the same hosts, depending on traffic conditions. IP also maintains some traffic-management information, such as time-to-live (a function to give packets a limited lifetime) and fragmentation control (a mechanism to split packets en route if necessary). The current version of IP is version 4, referred to as IPv4, and it uses a 32-bit address space. The newer IPv6 protocol adds significant levels of functionality, such as security, improved address space, 128 bits, and a whole host of sophisticated traffic-management options. IPv4 addresses are written as four sets of numbers in the form v.x.y.z, with each of these values ranging from 0 to 255. As this would be difficult to remember, a naming system for hosts was developed around domains, and DNS servers convert the host names, such as www.ietf.org, to IP addresses, such as 4.17.168.6. Message Encapsulation As a message traverses a network from one application on one host, down through the OSI model, out through the physical layer, and up another machine s OSI model, the data is encapsulated at each layer. This can be viewed as an envelope inside an envelope scheme. As only specific envelopes are handled at each layer, only the necessary information for that layer is presented on the envelope. At each layer, the information inside the envelope is not relevant and previous envelopes have been discarded only the information on the current envelope is used. This offers efficient separation of functionality between layers. This concept is illustrated in Figure A-3. Figure A-3 OSI message encapsulation

Appendix A: OSI Model and Internet Protocols 609 As a message traverses the OSI model from the application layer to the physical layer, envelopes are placed inside bigger envelopes. This increases the packet size, but this increase is known and taken into account by the higher-level protocols. At each level, a header is added to the front end, and it acts to encapsulate the previous layer as data. At the physical level, the bits are turned into the physical signal and are transmitted to the next station. At the receiving station, the bits are turned into one large packet, which represents the original envelope-within-envelope concept. Then each envelope is handled at the appropriate level. This encapsulation exists at the transport layer and lower, as this is the domain of a packet within a session. Review To help variable systems understand the functions performed in network communication, a common framework is necessary. This framework is provided by the OSI and Internet network models, which specify which functions occur, and in what order, in the transmission of data from one application to another across a network. An understanding of the OSI model and thus the state in which the data exists as it transits a network enables a deeper understanding of issues related to security. Understanding that SSL occurs before TCP and IP allows you to understand how SSL protects TCP and IP from outside sniffing. Understanding the different protocols and what happens with data loss gives you a better understanding of how certain types of attacks are performed. The essence of a framework is to allow enhanced understanding of relationships, and these network models perform this function for network professionals. PART VI