Appendix A: Internetworking Basics


The server-based computing (SBC) paradigm is heavily dependent upon the capacity and performance of the internetwork that connects client nodes to the SBC server farm. In larger companies and enterprise environments, workload and associated technical expertise are typically divided among a number of "experts" or teams of specialists (network, database, mail server, web servers, and so on). At smaller companies on the other hand, there may be one or two experts responsible for all aspects of the organization's IT infrastructure. In either case, the focus of IT staff members charged with making the SBC network work is usually server-centric, in spite of the dependence on network services. These same systems administrators still need a clear understanding of networking to be able to plan and design (as discussed in the second section of this book), and then implement, operate, maintain, and troubleshoot (as discussed in the final section). This appendix provides a low-level networking introduction to provide common ground for discussing issues and concepts with other IT staff members, vendors, and service providers.

The OSI Model

The Open Systems Interconnection (OSI) model was originally developed by the International Standards Organization (www.iso.org) in 1974 to establish a standardized model for interconnecting networks and computers using multivendor networks and applications. Although originally envisioned as a formal standard, it has become less of an implementation standard and more a benchmark model. The principles applied when creating the OSI model were

  • A layer should be created where a different level of abstraction is needed.

  • Each layer should perform a well-defined function.

  • The function of each layer should be chosen with an eye toward defining internationally standardized protocols.

  • The layer boundaries should be chosen to minimize the information flow across the interfaces.

  • The number of layers should be large enough that distinct functions need not be thrown together in the same layer out of necessity, and small enough that the architecture does not become unwieldy.

The resulting effort defined a seven-layer model (Figure A-1) that allows information to be passed up and down through the hierarchy, layer to layer, such that each layer needs to only provide a standards-based interface to adjacent layers and has no dependence on non-adjacent layers. In simple terms, the network layer does not need to know anything about the physical media or the application data being transported, it only needs to know how to pass the information down to the data link layer or up to the transport layer.

click to expand
Figure A-1: Data flow and the OSI model

OSI Model Layers

Each of the layers defined by the OSI model (keep repeating—it's only a model, it's only a model) performs specific functions to allow applications to ultimately transmit data over the physical media. The model's seven layers (commonly a protocol stack) are used extensively to define equivalency of function in other protocol stacks such as the Internet Protocol Suite. Although most other protocol stacks do not have a one-to-one mapping to the OSI model's layers, the actual protocols are referred to by their OSI equivalent function. For example, Novell's Sequenced Packet Exchange (SPX) protocol does not fully map to the OSI model transport layer, but it is still functionally referred to as a transport-layer protocol. Within the model, layers 1 through 4 (the "lower" layers) support data transport between end nodes or devices while 5 through 7 (the "upper" layers) deal with application support.

The Application Layer

At the top of the "stack" is the application layer. It supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level.

The Presentation Layer

The presentation layer provides independence from differences in data representation by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.

The Session Layer

The session layer establishes, manages, and terminates connections between applications. It also sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end.

The Transport Layer

The transport layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer. The OSI model defines different transport services, four connection-oriented and one connectionless.

The Network Layer

The network layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control, and packet sequencing. Note that the term "switching" refers to path switching and has nothing to do with Ethernet switches. For any protocol stack to be viable in an enterprise environment, it must have a routable address at this layer.

The Data Link Layer

At the data link layer, data frames are encoded and decoded into bits for the physical media. This layer furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control, and frame synchronization. The data link layer is divided into two sublayers: the Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sublayer controls how a computer on the network gains access to the data and permission to transmit it (CSMA/CD for Ethernet) as well as logical addressing (MAC address). The LLC layer controls frame synchronization, flow control, and error checking.

The Physical Layer

The physical layer conveys the bit stream—electrical impulse, light, or radio signal—through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards, and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components.

OSI Model Data Flow

Understanding data flow through the OSI model, particularly the lower layers, is key to understanding network design, performance, and troubleshooting. Figure A-2 shows the process of data encapsulation from Layer 7 down to transmission on the wire at Layer 1. The original application message is encapsulated at each successive layer by appending and in some cases prepending the lower layers' protocol information to the payload. This layered functionality is what allows a single workstation to log on to a Novell server over IPX and a Windows server over TCP/IP.

click to expand
Figure A-2: Data encapsulation in the OSI model

Referring back to Figure A-1, the logical communication is peer-to-peer at the same layer. The Telnet client application on one host communicates to the Telnet server application on another host. The data link layer on one device communicates with the data link layer on another device. The physical data flow is up and down the protocol stack.

Intermediate nodes (the three-layer stack in the middle of Figure A-1) may only need functionality at the lower three layers, as they need not be aware of communication at the upper layers. As an example, a Telnet session from Dallas to Chicago may transit many intermediate nodes over the Internet. At each of those sites, data needs to be deencapsulated only as far as the network layer to allow path selection and forwarding.

From a LAN standpoint, a Layer-1 device refers to a device that functions at the physical layer. Repeaters and multiport repeaters (LAN hubs) are Layer-1 devices. They regenerate and retransmit an electrical signal consisting of ones and zeros.

A Layer-2 LAN device works at the data link layer, meaning it is protocol-aware at Layer 2 and recognizes Layer-2 frame formats and addresses (MAC addresses). LAN switches are Layer-2 devices; they forward (directed) or flood (broadcast) frames on the network, but each port is independent of the electrical signal and physical media on any other port.

Classifying a device as a Layer-3 device means the device works at the network layer and recognizes network layer addressing and protocol. Routers and Layer-3 LAN switches are at this layer. Communications between dissimilar LAN technologies such as between Token Ring and Ethernet requires Layer-3 functionality. For example, in a network with a Token Ring segment and an Ethernet segment, the Layer-2 frame formats are incompatible. To communicate from one segment to the other, the frame formats and media access control methods from one segment must be "stripped away" to allow the data to be reencapsulated in the correct format for the other segment.

The OSI Model as a Benchmark

Figure A-3 shows a greatly simplified correlation of the OSI model to common protocol stacks. Note that the Internet Protocol stack defines only four layers and that common network operating systems consistently have a clear separation between Layers 5 through 7 functions and Layer 4, primarily driven by the ubiquitous nature of TCP/IP.

click to expand
Figure A-3: Common protocol suites versus the OSI model




Citrix Metaframe Access Suite for Windows Server 2003(c) The Official Guide
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
ISBN: 0072262893
EAN: 2147483647
Year: 2003
Pages: 158

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net