Presentation is loading. Please wait.

Presentation is loading. Please wait.

SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework.

Similar presentations


Presentation on theme: "SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework."— Presentation transcript:

1 SYSTEM ADMINISTRATION Chapter 2 The OSI Model

2 The OSI Model was designed by the International Standards Organization (ISO) as a structural framework for the rules of data communications. This model allows any vendor who adheres to the framework to design a component for data communications with the assurance that it can be used with products from any other vendor and provide seamless interoperability.

3 The Physical Layer The Physical layer defines the way data is transmitted over the physical connections of the network. Other component characteristics of this layer include physical topology, connection types, signal type, baseband and broadband, and bit synchronization.

4 Physical Topology The physical topology of the network defines the way the network is laid out, including: –Cabling (star, bus, mesh, ring, and wireless) –Interconnection of segments –Devices

5 Star The star topology is the most commonly used physical layout for networks today. When building a star topology, a hub or switch will be the central device connecting all nodes on the segment. When a node failure occurs, there are three places where the failure can take place: the port on the hub or switch, the cable connecting the node and the hub or switch, or the network interface on the node itself. A star topology is relatively easy to set up, and can be expanded so long as the physical limitations are not exceeded.

6 Bus The bus topology is the easiest to install and the most difficult to troubleshoot. Cables must be terminated. The bus topology has strict physical limitations of cable length and distance from other nodes.

7 Mesh Mesh networks provide redundant links between all nodes on the network, thus creating a fault-tolerant data communications topology. The mesh network is time-consuming and somewhat expensive to install because of the multiple connections between nodes. Troubleshooting mesh networks is relatively easy because the failure points are easily identified.

8 Ring The ring topology connects nodes in a circle, allowing only nodes directly connected to talk to each other. Data is transmitted in a single direction only. A node can accept and respond to packets addressed to it, then pass the packets on to the next node on the ring.

9 Wireless A wireless topology relies on either radio frequency (RF) or infrared (IR) frequencies, or channels, to connect directly to each other or to access points (APs). Wireless communication devices connect, or network, using either ad hoc or infrastructure networking.

10 Connection Types Point-to-point connections occur when two computers are connected and exchange information. An example is modem connections. Multipoint connections use many devices connected to transmission media, sharing the available bandwidth. The corporate network is an example.

11 Signal Types There are two broad categories of signal types: digital and analog. Analog signals use constantly varying voltages or waves. Digital signals use electrical pulses. All signals are subject to deterioration of signal over distance or attenuation. Each category of signal has a set of specific encoding schemes that allow for the efficient transmission of the data.

12 Baseband vs. Broadband Baseband and broadband refer to the way the signals are passed across the media. Baseband transmission allows a single transmission to use the entire bandwidth. Broadband transmission requires that many signals share the same bandwidth. Broadband traffic is more efficient for data transmission.

13 Bit Synchronization Baseband and broadband refer to the way the signals are passed across the media. Baseband transmission allows a single transmission to use the entire bandwidth. Broadband transmission requires that many signals share the same bandwidth. Broadband traffic is more efficient for data transmission.

14 The Datalink Layer The Datalink layer is subdivided into two sub-layers known as the Logical Link Control layer (LLC) and the Media Access Control layer (MAC). The LLC is responsible for the standards that govern how network communication will take place. The MAC layer maintains the physical addressing scheme used by network-connected nodes, allowing each node to be uniquely identified as a participant on the network.

15 The Network Layer The Network layer is responsible for two important functions: logical addressing of nodes on the network or internetwork and routing of packets from source to destination. The logical addressing scheme used most frequently is IP addressing, a binary method for building large numbers of unique addresses. Routing is a store and forward action that allows the best path to be chosen when sending a packet from source node to a destination node.

16 The Transport Layer The Transport layer makes sure that the data is transmitted reliably between nodes. This layer also segments large packets based on the type of network. Each segment is given a sequence number so that the receiving node can recreate the message correctly. Transport layer function also includes flow control, or the management of the rate of data transmission. To maintain reliable delivery of segments, this layer will issue either an ACK (acknowledgement) or a request for retransmission if errors are detected.

17 The Session Layer Session layer functions include the management of sessions or conversations between nodes.

18 The Presentation Layer The Presentation layer makes sure that both nodes understand in what format the data will arrive. Its function is that of translator when two different data formats are present. Encryption/decryption are managed at this layer. Compression/decompression of data is managed at this layer.

19 The Application Layer The Application layer provides services to software applications used by a user. Some of the services include file access services, printing services, e-mail services, file transfer services, and file management services.


Download ppt "SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework."

Similar presentations


Ads by Google