2.1 Overview of the OSI Model


There are many different parts of network systems that must interact to allow devices to communicate with each other. People can make each of those various parts in different companies across the world, but the parts must still function together. The ability of a program written in Seattle to work on a computer made in Boston and communicate over a network in Australia is achieved through strict adherence to published global standards.

Networked devices use standards based on the OSI reference model. This model has different layers , requiring component creators to focus on compatibility with the standardized layers just above and below, and not with all the rest. This saves time and keeps applications from becoming too complex. Thus, engineers need only know the details of the layer that is their responsibility in order to create an application that will perform properly with other applications.

2.1.1 OSI Layers and Functions

There are seven layers in the OSI model. These layers are stacked vertically, passing information up and down to each other (Figure 2-1 illustrates these layers).

  • Application layer ”Layer 7, the application layer, is at the top of the stack. It is the program that the user accesses to send or receive information on the networked device. E-mail, World Wide Web, and FTP are all popular applications that transfer information. The information from this layer is sent to the presentation layer for formatting.

  • Presentation layer ”Layer 6, the presentation layer, is responsible for formatting and presents data to the application layer in a manner that the application will understand. For example, if you are watching video online, this layer presents the video format that the application (video viewer) will understand and be able to present properly for the user. It can translate 64-bit integers to 32 bits or invert for medium access control (MAC), Motorola to Wintel bit orders. The data is then sent to the session layer to have a connection created to send the data.

  • Session layer ”Layer 5, the session layer, is responsible for initiating and closing down communications on behalf of the upper two layers. When data requires transmission, the session layer can start the process of communicating that information to a distant location. When you are ready to send e-mail, this layer opens the session to the server to which the e-mail will be sent, then sends the data to the transport layer. The session layer keeps track of the communication and ensures that it is completely sent. When it has been, the session layer tears down the communications channel.

  • Transport layer ”Layer 4, the transport layer, works by chopping up the data into usable segments and determines how the data will be sent. For example, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are two different protocols that the transport layer can use to send data. TCP is connection-oriented, where two devices will acknowledge the data being sent. UDP is connectionless and is sent without any acknowledgment of a successful and complete transmission. (TCP and UDP are discussed further later in this chapter.) After segmentation and sequencing, the data is sent down to the network layer for network addressing in a packet.

  • Network layer ”Layer 3, the network layer, is the one we are most concerned about in routing. This is the OSI layer that assigns and structures addressing for the Internet, which is known as IP addressing. IP addressing allows data to travel across many networks to a unique specific destination. This is analogous to the address on a letter that ensures the letter gets to its destination: The network layer ensures that the data gets to the proper recipient. It takes the segments from the transport layer and forms a packet around the segment. This packet has the IP addressing information for the destination. (IP and addressing are discussed in greater detail later in this chapter.)

  • Data link layer ”Layer 2, the data link layer, sets up the data for sending in the physical layer. Although the network layer destination address might be many devices away, the data link layer is only worried about getting it to the next device on the route. The data link layer takes the packet from the network layer and encapsulates it in a frame, transferring it into a form that can then be passed to the physical layer for transmission into bits. Ethernet and Frame Relay are two very popular data link technologies. (These Layer 2 protocols and more are discussed more in depth later in this chapter.)

  • Physical layer ”Layer 1, the physical layer, is the first layer and describes the set of standards that convey the actual digital data. The data link layer sends a stream of binary data to the physical layer that actually sends the 1s and 0s to the next device along the route to the destination. Shielded wire, twisted pair, fiber, infrared, and radio wave are all mediums in which devices can communicate on the physical layer. When you plug a fiber cable into a port, the port is actually the start of the physical layer.

Figure 2-1. The OSI Model Network Standard

graphics/02fig01.gif

Note

The physical layer is one of the most important places to start troubleshooting. Hours upon end can be spent troubleshooting networks because a cable or connector was bent and not making contact. Standard troubleshooting techniques involve starting at the physical layer and working your way up.


A device will communicate down the OSI stack, across the network, and up the OSI stack of the receiving device. This process ensures that as information is manipulated on leaving the sending device, those manipulations are equally copied in reverse order by the receiving device. In Figure 2-2, the application layer sends information down through the layers on PC A, across the network, to PC B, which will then send the information up the OSI stack to the application layer on the receiver. Once the application layer processes the data on the receiver, it can then be useful to the user.

Figure 2-2. OSI Communications between Devices

graphics/02fig02.gif

2.1.2 IP Suite

IP was originally developed by the U.S. government for research. The original IP specification was four layers and was known as the DoD IP model after the U.S. Department of Defense, which developed the Internet for U.S. government agency communications. Owing to the widespread use of the model, it is known now as the Internet Protocol Suite.

The four layers of the DoD IP model and how they map to the OSI reference model are shown in Figure 2-3. Layer 4 of the DoD model is the application services layer and represents all of the functions of the top three layers of the OSI model. Layer 3 of the DoD model is the transport layer, which is responsible for the same functions of acknowledgment and sequencing as the OSI third layer. Layer 2 of the DoD model is known as the Internet layer and is the responsible for IP addressing. Layer 1 of the DoD model combines the physical and data link layers of OSI and is known as the network access layer.

Figure 2-3. The IP Suite ”A Common Protocol Implementation

graphics/02fig03.gif

A good analogy of OSI stack system operation is the process of one person drafting and sending a letter to another. There are some predefined rules between the sender and the recipient that the sender would use to ensure the intended receiver was able to receive the letter, keep the pages in order, and understand what information the sender wished to convey. The purpose of drawing this analogy is to show that as things change at Layers 1 and 2, the upper layer information stays the same. In this way, data can be sent across various networks without being altered .

How does this model allow for layered separation and why the letter analogy? This is how encapsulation works. Encapsulation is the process of taking one piece of data and adding a front (header) and a back (trailer). This allows for different devices to use only those layers they need through the process of chopping, packetizing, and framing the upper layer data in a standard format. The following details how data would be transmitted according to this analogy.

  • Layer 7 ”Application: A letter is written in a computer application (e.g., Netscape Communicator or Microsoft Outlook).

  • Layer 6 ”Presentation: A common language and style would have to be used.

  • Layer 5 ”Session: A standard envelope with a return receipt would be used. The return of this receipt would acknowledge and end the mail sending process.

  • Layer 4 ”Transport: If multiple pages were created, they would be numbered. If too many pages for one envelope were drafted, then several envelopes could be used, and they too would be numbered as 1 of 4, 2 of 4, and so on, so that the correct order could be kept on the receiving end.

  • Layer 3 ”Network: A destination address and a sending address (the source) would be added to ensure that the letter reached the correct individual and the receiver knew whence the letter originated.

  • Layer 2 ”Data link: The envelope with the far end address would be put into a mailbag for use on trucks .

  • Layer 1 ”Physical: The truck mailbag would be put on the truck and travel until it reached the end of the truck's route.

  • Layer 2 ”Data link: The address envelope (Layer 3 packet or package) would be taken out of the truck mailbag and put in an airplane mailbag.

  • Layer 1 ”Physical: The airplane mailbag would then be placed on an airplane and continue on until it was ready to be transferred again to a truck, which would require a truck-type mail bag.

Just as in the analogy above, Layers 1 and 2 can be changed several or even many times as the packet makes progress towards the destination. Once the destination has been reached, Layers 3, then 4 can be stripped by the receiver and the return receipt signed (Layer 5) to present the data to the reader, ending the communications channel. The letter inside, the envelope, and the destination-addressing scheme are never altered by the lower two layers' independent processes. The truck and the airplane transportation are not affected by what is in the envelope. The Layer 3 address would be looked at to forward the letter appropriately, but it would not be altered. This is the layer separation that allows the different components to work together as long as the standards are adhered to.

2.1.3 Encapsulation at the Lower Layers

Networking in general is predominately focused on Layers 1 to 4, or the lower layers (with the upper layers consisting of 5 to 7). When discussing networks or systems, quite often the terms upper layer and lower layer are used. Layers 1 to 4 are the layers that Juniper Networks routers use to accomplish the task of getting data from point A to point B. Although most routing functions do take place on Layer 3 at the network address, Layer 4 TCP/UDP ports can be used for giving preference or forwarding decisions for packets.

Components of Layers 1 to 4 accomplish network transmission and reception of the upper-layered data. You can think of Juniper Networks routers as a very fast transportation system. Figure 2-4 illustrates the encapsulation of data as it moves down the layers for transmission. As the data moves down the stack, each layer adds information for the corresponding layer on the receiver. At Layer 4, a segment of data is created, then encapsulated in a Layer 3 network packet, which gets wrapped in a Layer 2 data link frame, then transmitted on the physical Layer 1.

Figure 2-4. Data Encapsulation

graphics/02fig04.gif

In the receiving stack each layer reads the necessary information for its particular layer, strips that information off, and forwards the data upwards.

2.1.4 Network Devices

Different network devices were created to aid in the transmission of data at the different layers. At the data link layer, bridges and switches are used. Bridges and switches work at Layer 2. They can connect various physical media as long as the data link protocol is the same. At Layer 3, the network layer, routers from companies such as Juniper Networks are used. Routers can connect different data link networks as long as they use the same network layer protocol. Each of these devices forwards data based on the standards of the layer on which they work.

Most network devices and technologies can be thought of as part of one of two groups, local or wide. Local-area network (LAN) devices usually connect users centered in a close geographical area. These devices are usually switches or small-access routers. WAN devices typically connect groups of LAN devices over long distances. For the most part, a Juniper Networks router is a device that can connect groups of LANs and WANs together. Since the OSI layers work together, different data link layers can be used to forward a single type of network layer data. Going back to the example of the letter, the envelope can travel in a truck, then an airplane, then in a truck again. The truck is used locally and the airplane transports the letter across long distances.

So too can networking use different methods of transportation. It is very typical for data to move from LAN to WAN to LAN in order to get from the sender to receiver. In Figure 2-5, there is a sender A and a receiver B. The data has to go through the LAN in Washington D.C. to get to the WAN that will allow it to be transferred up the East Coast WAN to the LAN in Boston. A Juniper Networks router connects the LAN to the WAN. One port of the router is connected to the LAN and one is connected to the WAN. In addition, the cloud representing the WAN could be made up of many Juniper Networks routers in a network. Juniper Networks has developed a wide variety of ports, allowing them the ability to forward data from and to LANs through WANs for many situations.

Figure 2-5. LAN-WAN-LAN Communication

graphics/02fig05.gif

Bridges and Switches

A bridge is normally used to connect two groups of similar data link devices, such as PCs on Ethernet. A bridge can divide an overloaded LAN network in two groups, managing the communications between them. This allows the LAN to continue to function seemingly as a single group . As the LANs get larger, more ports are needed on a bridge to divide the LAN into more groups. Eventually each data device is able to have its own port; the bridge is then called a switch because it switches data between the ports. A switch greatly increases a LAN's communication efficiency. Every device has its own port ”it's own private connection. With every device having a dedicated, rather than a shared, connection, a device is able to send and receive more data through LANs and ultimately through WANs. The switch can manage the communication between LAN devices much more quickly and efficiently than the devices themselves when all of them are essentially trying to talk at the same time.

Note

A bridge that connects dissimilar data link devices is called a translational bridge and one that connects similar data link devices is properly called a transparent bridge.


Other types of switches operate in the WAN. These use protocols like ATM or frames from a Frame Relay network. These are the types of switches in the middle of large networks to which Juniper Networks routers are connected in order to pass data.

2.1.5 Routers

Routers work at the network layer. They look at the destination address of the IP packet and forward the packet in the right direction. Juniper Networks routers can connect different types of LANs and WANs. In addition, Juniper Networks routers can connect different types of WANs together on a very large scale. In Figure 2-6, a Juniper Networks router takes in a frame from the Layer 2 data link LAN protocol (2L), then strips off the Layer 2 LAN information to look at the Layer 3 network information. The Layer 3 information must be looked at to determine where the data must be sent, but it is not manipulated or changed; it is merely observed . This is called a Layer 3 lookup because the device is looking at the Layer 3 protocol address to determine the correct path to forward it upon. Higher-layer information is usually not looked at. The router then decides in which direction (out of which port) to forward the information, changes any Layer 3 information needed (e.g, TTL), adds Layer 2 WAN (2W) information, encapsulates the packet, and the router sends the data on its way.

Figure 2-6. Layer 3 Lookup

graphics/02fig06.gif



Juniper Networks Reference Guide. JUNOS Routing, Configuration, and Architecture
Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture: JUNOS Routing, Configuration, and Architecture
ISBN: 0201775921
EAN: 2147483647
Year: 2002
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net