Chapter 2 - Review

Network+ Guide to Networks, Chapter 2 Review
Networking Standards and the OSI Model


When trying to grasp a new theoretical concept, it often helps to form a picture of that concept in your mind. In the field of chemistry, for example, even though you can’t see a water molecule, you can represent it with a simple drawing of two hydrogen atoms and one oxygen atom. Similarly, in the field of networking, even though you can’t see the communication that occurs between two nodes on a network, you can use a model to depict how the communication takes place. The model commonly used to describe network communications is called the OSI (Open Systems Interconnection) model.

Networking Standards Organizations

Standards are documented agreements containing technical specifications or other precise criteria that stipulate how a particular product or service should be designed or performed. Many different industries use standards to ensure that products, processes, and services suit their purposes. For example, the construction industry follows standards to ensure a building’s safety and accessibility, such as those defining the width and slope of wheelchair ramps. The airline industry adheres to standards that specify the precise contents of jet fuel. Because of the wide variety of hardware and software in use today, standards are especially important in the world of networking. Without standards, it would be very difficult to design a network because you could not be certain that software or hardware from different manufacturers would work together. For example, if one manufacturer designed a network cable with a 1-centimeter-wide plug and another company manufactured a wall plate with a 0.8-centimeter-wide opening, you would not be able to insert the plug into the wall plate. When purchasing networking equipment, therefore, you want to verify that equipment meets the standards your network requires. However, bear in mind that standards define the minimum acceptable performance of a product or service—not the ideal. So, for example, you might purchase two different network cables that comply with the minimum standard for transmitting at a certain speed, but one cable might exceed that standard, allowing for better network performance. In the case of network cables, exceeding minimum standards often follows from the use of quality materials and careful production techniques. Because the computer industry grew so quickly out of several technical disciplines, many different organizations evolved to oversee its standards. In some cases, a few organizations are responsible for a single aspect of networking. For example, both the American National Standards Institute (ANSI) and IEEE are involved in setting standards for wireless networks. Whereas ANSI prescribes the kind of NIC (network interface card) that the consumer needs to accept a wireless connection, IEEE prescribes, among other things, how the network will ensure that different parts of a communication sent through the atmosphere arrive at their destination in the correct sequence. A complete list of the standards that regulate computers and networking would fill an encyclopedia. Although you don’t need to know the fine points of every standard, you should be familiar with the groups that set networking standards and the critical aspects of standards required by your network.

ANSI:
ANSI (American National Standards Institute) is an organization composed of more than a thousand representatives from industry and government who together determine standards for the electronics industry and other fields, such as chemical and nuclear engineering, health and safety, and construction. ANSI also represents the United States in setting international standards. This organization does not dictate that manufacturers comply with its standards, but requests voluntarily compliance. Of course, manufacturers and developers benefit from compliance; because compliance assures potential customers that the systems are reliable and can be integrated with an existing infrastructure. New electronic equipment and methods must undergo rigorous testing to prove they are worthy of ANSI’s approval. You can purchase ANSI standards documents online from ANSI’s Web site (www.ansi.org) or find them at a university or public library. You need not read complete ANSI standards to be a competent networking professional, but you should understand the breadth and significance of ANSI’s influence.

EIA and TIA
Two related standards organizations are EIA and TIA. EIA (Electronic Industries Alliance) is a trade organization composed of representatives from electronics manufacturing firms across the United States. EIA not only sets standards for its members, but also helps write ANSI standards and lobbies for legislation favorable to the growth of the computer and electronics industries. In 1988, one of the EIA’s subgroups merged with the former United States Telecommunications Suppliers Association (USTSA) to form TIA (Telecommunications Industry Association). TIA focuses on standards for information technology, wireless, satellite, fiber optics, and telephone equipment. Both TIA and EIA set standards, lobby governments and industry, and sponsor conferences, exhibitions, and forums in their areas of interest. Probably the best known standards to come from the TIA/EIA alliance are its guidelines for how network cable should be installed in commercial buildings, known as the “TIA/EIA 568-B Series.”

IEEE
The IEEE (Institute of Electrical and Electronics Engineers), or “I-triple-E,” is an international society composed of engineering professionals. Its goals are to promote development and education in the electrical engineering and computer science fields. To this end, IEEE hosts numerous symposia, conferences, and local chapter meetings and publishes papers designed to educate members on technological advances. It also maintains a standards board that establishes its own standards for the electronics and computer industries and contributes to the work of other standards-setting bodies, such as ANSI. IEEE technical papers and standards are highly respected in the networking profession.
Among other places, you will find references to IEEE standards in the manuals that accompany NICs. You can purchase IEEE documents online from IEEE’s Web site (www.ieee.org) or find them in a university or public library.

ISO
ISO (International Organization for Standardization), headquartered in Geneva, Switzerland, is a collection of standards organizations representing 162 countries. ISO’s goal is to establish international technological standards to facilitate global exchange of information and barrier free trade. Given the organization’s full name, you might expect it to be called IOS, but ISO is not meant to be an acronym. In fact, iso is the Greek word for equal. Using this term conveys the organization’s dedication to standards.
ISO’s authority is not limited to the information-processing and communications industries. It also applies to the fields of textiles, packaging, distribution of goods, energy production and utilization, shipbuilding, and banking and financial services. The universal agreements on screw threads, bank cards, and even the names for currencies are all products of ISO’s work. In fact, fewer than 3000 of ISO’s more than 18,500 standards apply to computer-related products and functions. You can find out more about ISO at its Web site: www.iso.org.

ITU
The ITU (International Telecommunication Union) is a specialized United Nations agency that regulates international telecommunications, including radio and TV frequencies, satellite and telephony specifications, networking infrastructure, and tariffs applied to global communications. It also provides developing countries with technical expertise and equipment to advance those nations’ technological bases. The ITU was founded in Paris in 1865. It became part of the United Nations in 1947 and relocated to Geneva, Switzerland. Its standards arm contains members from 193 countries and publishes detailed policy and standards documents that can be found on its Web site: www.itu.int. Typically, ITU documents pertain more to global telecommunications issues than to industry technical specifications. However, the ITU is deeply involved with the implementation of worldwide Internet services. As in other areas, the ITU cooperates with several different standards organizations, such as ISOC (discussed next), to develop these standards.

ISOC
ISOC (Internet Society), founded in 1992, is a professional membership society that helps to establish technical standards for the Internet. Some current ISOC concerns include the rapid growth of the Internet and keeping it accessible, information security, and the need for stable addressing services and open standards across the Internet. ISOC’s membership consists of more than 44,000 Internet professionals from over 80 chapters around the world.
ISOC oversees groups with specific missions, such as the (Internet Architecture Board). IAB is a technical advisory group of researchers and technical professionals interested in overseeing the Internet’s design and management. As part of its charter, IAB is responsible for Internet growth and management strategy, resolution of technical disputes, and standards oversight. Another ISOC group is the IETF (Internet Engineering Task Force), the organization that sets standards or how systems communicate over the Internet—in particular, how protocols operate and interact. Anyone can submit a proposed standard for IETF approval. The standard then undergoes elaborate review, testing, and approval processes. On an international level, IETF works with the ITU to help give technical standards approved in the United States international acceptance. You can learn more about ISOC and its member organizations, IAB and IETF, at their Web site: www.isoc.org.

IANA and ICANN
You have learned that every computer on a network must have a unique address. On the Internet, this is especially important because millions of different computers must be available to transmit and receive data at any time. Addresses used to identify computers on the Internet and other TCP/IP-based networks are known as IP (Internet Protocol) addresses. To ensure that every Internet-connected device has a unique IP address, organizations across the globe rely on centralized authorities. In early Internet history, a nonprofit group called the IANA (Internet Assigned Numbers Authority) kept records of available and reserved IP addresses and determined how addresses were doled out. Starting in 1997, IANA coordinated its efforts with three RIRs (Regional Internet Registries): ARIN (American Registry for Internet Numbers), APNIC (Asia Pacific Network Information Centre), and RIPE (Reseaux IP Europeens). An RIR is a not-for-profit agency that manages the distribution of IP addresses to private and public entities. In the late 1990s, the United States Department of Commerce (DOC), which funded IANA, decided to overhaul IP addressing and domain name management. The DOC recommended the formation of ICANN (Internet Corporation for Assigned Names and Numbers), a private, nonprofit corporation. ICANN is now ultimately responsible for IP addressing and domain name management. Technically speaking, however, IANA continues to perform the system administration. Individuals and businesses do not typically obtain IP addresses directly from an RIR or IANA. Instead, they lease a group of addresses from their ISP (Internet service provider),a business that provides organizations and individuals with access to the Internet and often, other services, such as e-mail and Web hosting. An ISP, in turn, arranges with its RIR for the right to use certain IP addresses on its network. The RIR obtains its right to dole out those addresses from ICANN. In addition, the RIR coordinates with IANA to ensure that the addresses are associated with devices connected to the ISP’s network. You can learn more about IANA and ICANN at their Web sites, www.iana.org and www.icann.org, respectively.

The OSI Model

In the early 1980s, ISO began work on a universal set of specifications that would enable computer platforms across the world to communicate openly. The result was a helpful model for understanding and developing computer-to-computer communications over a network. This model, called the OSI (Open Systems Interconnection) model, divides network communications into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application. At each layer, protocols perform services unique to that layer. While performing those services, the protocols also interact with protocols in the layers directly above and below. In addition, at the top of the OSI model, Application layer protocols interact with the software you use (such as an e-mail or spreadsheet program). At the bottom, Physical layer services act on the networking cables and connectors to issue and receive signals. You have already learned that protocols are the rules by which computers communicate. A protocol is simply a set of instructions written by a programmer to perform a function or group of functions. Some protocols are included with a computer’s operating system. Others are files installed with software programs. The OSI model is a theoretical representation of what happens between two nodes communicating on a network. It does not prescribe the type of hardware or software that should support each layer. Nor does it describe how software programs interact with other software programs or how software programs interact with humans. Every process that occurs during network communications can be associated with a layer of the OSI model, so you should be familiar with the names of the layers and understand the key services and protocols that belong to each.


Application (Layer 7)
Provides interface between software applications and a network for interpreting applications’ requests and requirements.
Presentation (Layer 6)
Allows hosts and applications to use a common language; performs data formatting, encryption, and compression.
Session     (Layer 5)
Establishes, maintains, and terminates user connections.
Transport (Layer 4)
Ensures accurate delivery of data through flow control, segmentation and reassembly, error correction, and acknowledgment.
Network (Layer 3)
Establishes network connections; translates network addresses into their physical counterparts and determines routing
Data Link (Layer 2)
Packages data in frames appropriate to network transmission method.
Physical Layer 1
Manages signaling to and from physical network connections.
OSI Model Layers and Functions

The path that data takes from one computer to another through the OSI model is:
First, a user or device initiates a data exchange through the Application layer. The Application layer separates data into PDUs (protocol data units), or discrete amounts of data. From there, Application layer PDUs progress down through OSI model layers 6, 5, 4, 3, 2, and 1 before being issued to the network medium—for example, the wire. The data traverses the network until it reaches the second computer’s Physical layer. Then at the receiving computer the data progresses up the OSI model until it reaches the second computer’s Application layer. This transfer of information happens in milliseconds. Logically, however, each layer communicates with the same layer from one computer to another. In other words, the Application layer protocols on one computer exchange information with the Application layer protocols of the second computer. Protocols from other layers do not attempt to interpret Application layer data. In the following sections, the OSI model layers are discussed from highest to lowest, beginning with the Application layer, where the flow of information is initiated. Bear in mind that the OSI model is a generalized and sometimes imperfect representation of network communication. In some cases, network functions can be associated with more than one layer of the model, and in other cases, network operations do not require services from every layer.

Application Layer
The top, or seventh, layer of the OSI model is the Application layer. Contrary to what its name implies, the Application layer does not include software programs, such as Microsoft Word or Firefox. Instead, the Application layer facilitates communication between such programs and lower-layer network services. Services at this layer enable the network to interpret a program’s request and the program to interpret data sent from the network. Through Application layer protocols, programs negotiate their formatting, procedural, security, synchronization, and other requirements with the network. Note that not all these requirements are fulfilled by Application layer protocols. They are merely agreed upon at this stage. For example, when you choose to open a Web page in Firefox, an Application layer protocol called HTTP (Hypertext Transfer Protocol) formats and sends your request from your client’s browser (a software application) to the server. It also formats and sends the Web server’s response back to your client’s browser. Suppose you choose to view the Library of Congress’s Web site. You type www.loc.gov/index.html in Firefox and press Enter. At that point, Firefox’s API (application programming interface), a set of routines that make up part of the software, transfers your request to the HTTP protocol.  HTTP prompts lower-layer protocols to establish a connection between your computer and the Web server. Next, HTTP formats your request for the Web page and sends the request to the Web server. One part of the HTTP request includes a command that begins with “GET” and tells the server what page you want to retrieve. Other parts of the request indicate what version of HTTP you’re using, what types of graphics and what language your browser can accept, and what browser version you’re using, among other things. After receiving your computer’s HTTP request, the Web server responsible for www.loc.gov responds, also via HTTP. Its response includes the text and graphics that make up the Web page, plus specifications for the content contained in the page, the HTTP version used, the type of HTTP response, and the length of the page.However, if the Web page is unavailable, the host, www.loc.gov, sends an HTTP response containing an error message, such as “Error 404 - File Not Found.” After receiving the Web server’s response, your workstation uses HTTP to interpret this response so that Firefox can present the www.loc.gov/index.html Web page in a format you’ll recognize, with neatly arranged text and images. Note that the information issued by one node’s HTTP protocol is designed to be interpreted by the other node’s HTTP protocol. However, as you will learn in later sections, HTTP requests cannot traverse the network without the assistance of lower-layer protocols.

Presentation Layer
Protocols at the Presentation layer accept Application layer data and format it so that one type of application and host can understand data from another type of application and host. In other words, the Presentation layer serves as a translator. If you have spent any time working with computer graphics, you have probably heard of the GIF, JPG, and TIFF methods of compressing and encoding graphics. MPEG and QuickTime are two popular methods of compressing and encoding audio and video data. The popular audio format MP3, for example, uses MPEG compression. It can turn a music track that would require 30 MB of space on a CD into a file no larger than 3 MB—or even smaller, if lower quality were acceptable. In the previous example of requesting a Web page, the Presentation layer protocols would interpret the JPG files transmitted within the Web server’s HTTP response. Presentation layer services also manage data encryption (such as the scrambling of passwords) and decryption. For example, if you look up your bank account status via the Internet, you are using a secure connection, and Presentation layer protocols will encrypt your account data before it is transmitted. On your end of the network, the Presentation layer will decrypt the data as it is received.

Session Layer
Protocols in the Session layer coordinate and maintain communications between two nodes on the network. The term session refers to a connection for ongoing data exchange between two parties. Historically, it was used in the context of terminal and mainframe communications, in which the terminal is a device with little (if any) of its own processing or disk capacity that depends on a host to supply it with software and processing services. Today, the term session is often used in the context of a connection between a remote client and an access server or between a Web browser client and a Web server. When thinking in terms of the OSI model, however, this is misleading. Modern networks don’t make use of Session layer protocols for routine data exchange, such as Web page retrieval or file sharing. Yet applications that require precisely coordinated data exchanges, such as videoconferencing or voice (telephone) communication, still use Session layer protocols. Among the Session layer’s functions are establishing and keeping alive the communications link for the duration of the session, keeping the communication secure, synchronizing the dialogue between the two nodes, determining whether communications have been cut off, and, if so, figuring out where to restart transmission, and terminating communications. Session layer services also set the terms of communication by deciding which node communicates first and how long a node can communicate. If a connection is lost, the Session layer protocols will detect that and initiate attempts to reconnect. If they cannot reconnect after a certain period of time, they will close the session and inform your client software that communication has ended. Finally, the Session layer monitors the identification of session participants, ensuring that only the authorized nodes can access the session.

Transport Layer
Protocols in the Transport layer accept data from the Session layer and manage end-to-end delivery of data. That means they can ensure that the data are transferred from point A to point B reliably, in the correct sequence, and without errors. Without Transport layer services, data could not be verified or interpreted by its recipient. Transport layer protocols also handle flow control, which is the process of gauging the appropriate rate of transmission based on how fast the recipient can accept data. Dozens of different Transport layer protocols exist, but most modern networks, such as the Internet, rely on only a few. In the example of retrieving a Web page, a Transport layer protocol called TCP (Transmission Control Protocol) takes care of reliably transmitting the HTTP protocol’s request from client to server and vice versa.  Some Transport layer protocols take steps to ensure that data arrives exactly as it was sent. Such protocols are connection oriented because they establish a connection with another node before they begin transmitting data. TCP is one example of a connection-oriented protocol.In the case of requesting a Web page, the client’s TCP protocol first sends a SYN (synchronization) packet request for a connection to the Web server. The Web server responds with a SYN-ACK (synchronization-acknowledgment) packet, or a confirmation, to indicate that it’s willing to make a connection. Then, the client responds with its own ACK (acknowledgment).Through this three-step process, also known as a three-way handshake, a connection is established. Only after TCP establishes this connection does it transmit the HTTP request for a Web page.

Acknowledgments are also used in subsequent communications to ensure that data was properly delivered. For every data unit a node sends, its connection-oriented protocol expects an acknowledgment from the recipient. For example, after a client’s TCP protocol issued an HTTP request, it would expect to receive an acknowledgment from the Web server proving that the data arrived. If data isn’t acknowledged within a given time period, the client’s protocol assumes the data was lost and retransmits it. To ensure data integrity further, connection-oriented protocols such as TCP use a checksum. A checksum is a unique character string that allows the receiving node to determine if an arriving data unit exactly matches the data unit sent by the source. Checksums are added to data at the source and verified at the destination. If at the destination a checksum doesn’t match what the source predicted, the destination’s Transport layer protocols ask the source to retransmit the data. As you will learn, protocols at other layers of the OSI model also use checksums. Not all Transport layer protocols are concerned with reliability. Those that do not establish a connection before transmitting and make no effort to ensure that data is delivered free of errors are called connectionless protocols. A connectionless protocol’s lack of sophistication makes it more efficient than a connection-oriented protocol and renders it useful in situations in which data must be transferred quickly, such as live audio or video transmissions over the Internet. In these cases, connection-oriented protocols—with their acknowledgments, checksums, and flow control mechanisms—would add overhead to the transmission and potentially bog it down. In a video transmission, for example, this could result in pictures that are incomplete or aren’t updated quickly enough to coincide with the audio. In addition to ensuring reliable data delivery, Transport layer protocols break large data units received from the Session layer into multiple smaller units, called segments. This process is known as segmentation.  On certain types of networks, segmentation increases data transmission efficiency. In some cases, segmentation is necessary for data units to match a network’s MTU (maximum transmission unit), the largest data unit it will carry. Every network type specifies a default MTU (though its size can be modified to some extent by a network administrator). For example, by default, Ethernet networks cannot accept packets with data payloads larger than 1500 bytes. Suppose an application wants to send a 6000-byte unit of data. Before this data unit can be issued to an Ethernet network, it must be segmented into units no larger than 1500 bytes. To learn a network’s MTU size (and thereby determine whether it needs to segment packets), Transport layer protocols perform a discovery routine upon establishing a connection with the network. Thereafter, the protocols will segment each data unit as necessary until closing the connection. Segmentation is similar to the process of breaking down words into recognizable syllables that a child uses when learning to read. Reassembly is the process of reconstructing the segmented data units. To continue the reading analogy, when a child understands the separate syllables, he can combine them into a word—that is, he can reassemble the parts into a whole. To learn how reassembly works, suppose that you asked this  in history class: “Ms. Jones? How did poor farming techniques contribute to the Dust Bowl?” but that the words arrived at Ms. Jones’s ear as “poor farming techniques Ms. Jones? how did to the Dust Bowl? contribute.” On a network, the Transport layer recognizes this kind of disorder and rearranges the data pieces so that they make sense. Sequencing is a method of identifying segments that belong to the same group of subdivided data. Sequencing also indicates where a unit of data begins, as well as the order in which groups of data were issued and, therefore, should be interpreted. While establishing a connection, the Transport layer protocols from two devices agree on certain parameters of their communication, including a sequencing scheme. For sequencing to work properly, the Transport layer protocols of two nodes must synchronize their timing and agree on a starting point for the transmission.

Network Layer
The primary function of protocols at the Network layer, the third layer in the OSI model, is to translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver. Addressing is a system for assigning unique identification numbers to devices on a network. Each node has two types of addresses. One type of address is called a network address. Network addresses follow a hierarchical addressing scheme and can be assigned through operating system software. They are hierarchical because they contain subsets of data that incrementally narrow down the location of a node, just as your home address is hierarchical because it provides a country, state, zip code, city, street, house number, and person’s name. Network layer address formats differ depending on which Network layer protocol the network uses. Network addresses are also called Network layer addresses, logical addresses, or virtual addresses. The second type of address assigned to each node is called a physical address. For example, a computer running on a TCP/IP network might have a Network layer address of 10.34.99.12 and a physical address of 0060973E97F3. In the classroom example, this addressing scheme is like saying that “Ms. Jones” and “United States citizen with Social Security number 123-45-6789” are the same person.  Even though there may be other people named “Ms. Jones” in the United States, only one person has the Social Security number 123-45-6789. Within the confines of your classroom, however, there is only one Ms. Jones, so you can be certain the correct person will respond when you say, “Ms. Jones?”  There’s no need to use her Social Security number. Network layer protocols accept the Transport layer segments and add logical addressing information in a network header. At this point, the data unit becomes a packet. Network layer protocols also determine the path from point A on one network to point B on another network by factoring in:

·         Delivery priorities (for example, packets that make up a phone call connected through the Internet might be designated high priority, whereas a mass e-mail message is low priority)
·         Network congestion
·         Quality of service (for example, some packets may require faster, more reliable delivery)
·         Cost of alternative routes
·          
The process of determining the best path is known as routing. More formally, to route means to intelligently direct data based on addressing, patterns of usage, and availability. Because the Network layer handles routing, routers—the devices that connect network segments and direct data—belong in the Network layer. Although there are numerous Network layer protocols, one of the most common, and the one that underlies most Internet traffic, is the IP (Internet Protocol). In the example of requesting a Web page, IP is the protocol that instructs the network where the HTTP request is coming from and where it should go. On TCP/IP-based networks (such as the Internet), Network layer protocols can perform an additional function called fragmentation. In fragmentation, a Network layer protocol (such as IP) subdivides the segments it receives from the Transport layer into smaller packets. If this process sounds familiar, it’s because fragmentation accomplishes the same task at the Network layer that segmentation performs at the Transport layer. It ensures that packets issued to the network are no larger than the network’s maximum transmission unit size. However, if a Transport layer protocol performs segmentation, fragmentation may not be necessary. For greater network efficiency, segmentation is preferred. Not all Transport layer protocols are designed to accomplish segmentation. If a Transport layer protocol cannot perform segmentation, Network layer protocols will perform fragmentation, if needed.

Data Link Layer
In the second layer of the OSI model, the Data Link layer, protocols divide data they receive from the Network layer into distinct frames that can then be transmitted by the Physical layer. A frame is a structured package for moving data that includes not only the raw data, or “payload,” but also the senders and receiver’s network addresses, and error checking and control information. The addresses tell the network where to deliver the frame, whereas the error checking and control information ensure that the frame arrives without any problems. To understand the function of the Data Link layer fully, pretend for a moment that computers communicate as humans do. Suppose you are in Ms. Jones’s large classroom, which is full of noisy students, and you need to ask the teacher a . To get your message through, you might say, “Ms. Jones? Can you explain more about the effects of railroads on commerce in the mid-nineteenth century?” In this example, you are the sender (in a busy network) and you have addressed your recipient, Ms. Jones, just as the Data Link layer addresses another computer on the network. In addition, you have formatted your thought as a , just as the Data Link layer formats data into frames that can be interpreted by receiving computers. What happens if the room is so noisy that Ms. Jones hears only part of your ? For example, she might receive “on commerce in the late-nineteenth century?” This kind of error can happen in network communications as well (because of wiring problems, for example). The Data Link layer protocols find out that information has been dropped and ask the first computer to retransmit its message—just as in a classroom setting Ms. Jones might say, I didn’t hear you. Can you repeat the ?” The Data Link layer accomplishes this task through a process called error checking.  Error checking is accomplished by a 4-byte FCS (frame check sequence) field, whose purpose is to ensure that the data at the destination exactly match the data issued from the source. When the source node transmits the data, it performs an algorithm (or mathematical routine) called a CRC (cyclic redundancy check). CRC takes the values of all of the preceding fields in the frame and generates a unique 4-byte number, the FCS. When the destination node receives the frame, its Data Link layer services unscramble the FCS via the same CRC algorithm and ensure that the frame’s fields match their original form. If this comparison fails, the receiving node assumes that the frame has been damaged in transit and requests that the source node retransmit the data. Note that the receiving node, and not the sending node, is responsible for detecting errors. In addition, the sender’s Data Link layer waits for acknowledgment from the receiver’s Transport layer that data was received correctly. If the sender does not get this acknowledgment within a prescribed period of time, its Data Link layer gives instruction to retransmit the information. The Data Link layer never tries to figure out what went wrong. Similarly, as in a busy classroom, Ms. Jones will probably say, “Pardon me?” rather than, “It sounds as if you might have a  about railroads, and I heard only the last part of it, which dealt with commerce, so I assume you are asking about commerce and railroads; is that correct? Obviously, the former method is more efficient.Another communications mishap that might occur in a noisy classroom or on a busy network is a glut of communication requests. For example, at the end of class, 20 people might ask Ms. Jones 20 different s at once. Of course, she can’t pay attention to all of them simultaneously. She will probably say, “One person at a time, please,” then point to one student who asked a . This is just like what the Data Link layer does for the Physical layer. One node on a network (a Web server, for example) may receive multiple requests that include many frames of data each. The Data Link layer controls the flow of this information, allowing the NIC to process data without error. In fact, the IEEE has divided the Data Link layer into two sublayers. The reason for this change was to allow higher-layer protocols (for example, those operating in the Network layer) to interact with Data Link layer protocols without regard for Physical layer specifications. The upper sublayer of the Data Link layer, called the LLC (Logical Link Control) sublayer, provides an interface to the Network layer protocols, manages flow control, and issues requests for transmission for data that have suffered errors. The MAC (Media Access Control) sublayer, the lower sublayer of the Data Link layer, manages access to the physical medium. It appends the physical address of the destination computer onto the data frame. The physical address is a fixed number associated with a device’s network interface. It is assigned to each NIC at the factory and stored in the NIC’s on-board memory. Because this address is appended by the MAC sublayer of the Data Link layer, it is also known as a MAC address or a Data Link layer address. Sometimes, it’s also called a hardware address. You can find a NIC’s physical address through your computer’s protocol configuration utility or by simply looking at the NIC. The physical address will be stamped directly onto the NIC’s circuit board or on a sticker attached to some part of the NIC. Physical addresses contain two parts. The first part, known as the OUI (Organizationally Unique Identifier), is a character sequence assigned by IEEE that identifies the NIC’s manufacturer. For example, a series of Ethernet NICs manufactured by the 3Com Corporation begins with the hexadecimal characters “00608C,” while a series of Ethernet NICs manufactured by Intel begins with “00AA00.” Some manufacturers have several different OUIs. IEEE also uses the term company_id to refer to the OUI. Traditionally, this portion of a physical address is sometimes called the block ID. The remaining characters in a physical address, known as the extension identifier, identify the interface. Vendors such as 3Com and Intel assign each NIC a unique extension identifier, based on the NIC’s model and manufacture date. By assigning unique extension identifiers, companies ensure that no two NICs share the same physical address. Extension identifiers may also be known as device IDs. In traditional physical addressing schemes, the OUI is six characters (or 24 bits) long and the extension identifier is also six characters long. Together, the OUI and extension identifier form a whole physical address. For example, IBM might assign one of its NICs the extension identifier 005499. The combination of the IBM OUI and this extension identifier result in a unique, 12-character, or 48-bit address of 00608C005499.  Physical addresses are frequently depicted as hexadecimal numbers separated by colons—for example,  0:60:8C:00:54:99.Whereas the traditional MAC addressing scheme assigns interfaces a 48-bit address, IEEE’s newer EUI-64 (Extended Unique Identifier-64) standard calls for a 64-bit physical address. In the EUI-64 standard, the OUI portion is 24 bits in length. A 40-bit extension identifier makes up the rest of the physical address to total 64 bits. Hexadecimal, or base 16, is a numeral system that uses 0 through 9 to represent its first 10 numbers, and then uses the letters A through F to represent the next six numbers.

Decimal: 0123456789101112131415
Hexadecimal: 0123456789 A B C D E F

In hexadecimal notation, the decimal number 12 is represented by the letter C, for example. Starting with the decimal number 16, hexadecimal notation uses a 1 to represent the previous 15 digits and begins counting again at 0. In other words, a decimal number 16 is represented as 10 in hexadecimal and a decimal number 32 is represented as 20 in hexadecimal, or 2 x 16 + 0 x 1. You can convert a hexadecimal number to a decimal number by multiplying the decimal equivalent of the digit in each position by its hexadecimal value for that position. Each value is an exponential value of 16. For instance, the value at position 3 equals 16 3 or 4096. The value associated with positions is shown below (note that positions can extend beyond the 4 Hexadecimal position: 4 3 2 1 0th position): Hexadecimal value: 65536 4096 256 16 1 The decimal equivalent of the hexadecimal number C0F is 12 x 256 + 0 x 16 + 15 x 1, or 3072 + 0 + 15, or 3087. In computer science, hexadecimal notation (sometimes called, simply, “hex”) is used as a shorter, readable version of the binary numbers that computers interpret. If you know a computer’s physical address, you can determine which company manufactured its NIC by looking up its block ID. IEEE maintains a database of block IDs and their manufacturers, which is accessible via the Web. At the time of this writing, the database search page could be found at: http://standards.ieee.org/regauth/oui/index.shtml. Because of their hardware addressing function, NICs can be said to perform in the Data Link layer of the OSI model. However, they also perform services in the Physical layer, which is described next.

The Physical layer is the lowest, or first, layer of the OSI model. Protocols at the Physical layer accept frames from the Data Link layer and generate signals as changes in voltage at the NIC. (Signals are made of electrical impulses that, when issued in a certain pattern, represent information.) When the network uses copper as its transmission medium, these signals are also issued over the wire as voltage. In the case of fiber-optic cable, signals are issued as light pulses. When a network uses wireless transmission, the signals are sent from antennas as electromagnetic waves. When receiving data, Physical layer protocols detect and accept signals, which they pass on to the Data Link layer. Physical layer protocols also set the data transmission rate and monitor data error rates. However, even if they recognize an error, they cannot perform error correction. When you install a NIC in your desktop PC and connect it to a cable, you are establishing the foundation that allows the computer to be networked. In other words, you are providing a Physical layer. Simple connectivity devices such as hubs and repeaters operate at the Physical layer. NICs operate at both the Physical layer and at the Data Link layer. As you would expect, physical network problems, such as a severed wire or a broken connectivity device, affect the Physical layer. Similarly, if you insert a NIC but fail to seat it deeply enough in the computer’s main circuit board, your computer will experience network problems at the Physical layer. Most of the functions that network administrators are most concerned with happen in the first four layers of the OSI model: Physical, Data Link, Network, and Transport. Software programmers, on the other hand, are more apt to be concerned with what happens at the Application, Presentation, and Session layers.

Communication between Two Systems
Based on what you have learned about the OSI model, it should be clear to you that data issued from a software application are not in the same form as the data that your NIC sends to the network. At each layer of the OSI model, some information—for example, a format specification or a network address—is added to the original data. After it has followed the path from the Application layer to the Physical layer, data are significantly transformed. The following paragraphs describe this process in detail. To understand how data changes, it is useful to trace the steps in a typical client/server exchange, such as retrieving a mail message from a mail server. Suppose that you connect to your company’s network from your home computer via a broadband Internet connection, log on, start your e-mail application, and then click a button in the e-mail application to retrieve your mail from the server. At that point, Application layer services on your computer accept data from your mail application and formulate a request meant for the mail server software. They add an application header to the data that the program wants to send. The application header contains information about the e-mail application’s requirements, so that the mail server can fulfill its request properly. The Application layer transfers the request to the Presentation layer, in the form of a protocol data unit (PDU). The Presentation layer first determines whether and how it should format or encrypt the data request received from the Application layer. For example, if your mail client requires encryption, the Presentation layer protocols will add that information to the PDU in a presentation header. If your e-mail message contains graphics or formatted text, that information will also be added.  Then, the Presentation layer sends its PDU to the Session layer, which adds a session header that contains information about how your home computer communicates with the network. For example, the session header might indicate that your Internet connection can only transmit and receive data at 512 Kbps. The Session layer then passes the PDU to the Transport layer. At the Transport layer, the PDU—your request for mail and the headers added by previous layers—is broken down into smaller pieces of data, or segments. The segments’ maximum size is dictated by the type of network transmission method in use (for example, Ethernet). Suppose your mail request PDU is too large to be a single segment. In that case, Transport layer protocols subdivide it into two or more smaller segments and assign sequence identifiers to all of the smaller segments. This information becomes part of the transport header. Protocols also add checksum, flow control, and acknowledgment data to the transport header. The Transport layer then passes these segments, one at a time, to the Network layer. Next, Network layer protocols add logical addressing information to the segments, so that your request will be properly routed to the mail server and the mail server will respond to your computer. This information is contained in the network header. With the addition of network address information, the pieces of data are called packets. The Network layer then passes the packets to the Data Link layer. At the Data Link layer, protocols add a header to the front of each packet and a trailer to the end of each packet to make frames. (The trailer indicates where a frame ends.) In other words, the Data Link layer protocols encapsulate the Network layer packets. Encapsulation is frequently compared with placing an envelope within a larger envelope. This analogy conveys the idea that the Data Link layer does not attempt to interpret any information added in the Network layer, but simply surrounds it. Using frames reduces the possibility of lost data or errors on the network because built into each frame is a way of checking for errors. After verifying that the data have not been damaged, the Data Link layer then passes the frames to the Physical layer. Finally, your request for mail, in the form of many frames, hits the NIC at the Physical layer. The Physical layer does not interpret the frames or add information to the frames; it simply transmits them over the broadband connection to your LAN, across your office network, and to the mail server after the binary digits (bits), or ones and zeroes, have been converted to electrical pulses. As the frames arrive at the mail server, the server’s Physical layer accepts the frames and transfers them to the Data Link layer. The mail server begins to unravel your request, reversing the process just described, until it responds to your request with its own transmission, beginning from its Application layer.
The terms frame, packet, datagram, and PDU are sometimes used interchangeably to refer to a small piece of data formatted for network transmission. Technically, however, a packet is a piece of information that contains network addressing information, and a frame is a piece of data enclosed by a Data Link layer header and trailer. Datagram is synonymous with packet. PDU generically refers to a unit of data at any layer of the OSI model. However, networking professionals sometimes use the term packet to refer to frames, PDUs, and Transport layer segments alike.

Frame Specifications
You have learned that frames are composed of several smaller components, or fields. The characteristics of these components depend on the type of network on which the frames run and on the standards that they must follow. By far, the most popular type of networking technology in use today is Ethernet, which uses Ethernet frames. You’ll learn much more about Ethernet in Chapter 5, but the following serves as an introduction, as well as a comparison between this favored network type and its historical rival, token ring. Ethernet is a networking technology originally developed at Xerox in the early 1970s and improved by Digital Equipment Corporation, Intel, and Xerox. There are four different types of Ethernet frames. The most popular form of Ethernet is characterized by the unique way in which devices share a common transmission channel, described in the IEEE 802.3 standard. A much less-common networking technology, token ring, was developed by IBM in the 1980s. It relies upon direct links between nodes and a ring topology. Nodes pass around tokens, special control frames that indicate to the network when a particular node is about to transmit data. Although this networking technology is nearly obsolete, there is a remote chance that you might work on a token ring network. The IEEE has defined token ring technology in its 802.5 standard. Ethernet frames are different from token ring frames, and the two will not interact with each other on a network. In fact, most LANs do not support more than one frame type because devices cannot support more than one frame type per physical interface, or NIC. (NICs can, however, support multiple protocols.) Although you can conceivably transmit both token ring and Ethernet frames on a network, Ethernet interfaces cannot interpret token ring frames, and vice versa. Normally, LANs use either Ethernet or token ring, and almost all contemporary LANs use Ethernet.
It is important to know what frame type (or types) your network environment requires. You will use this information when installing network operating systems, configuring servers and client workstations, installing NICs, troubleshooting network problems, and purchasing network equipment.

IEEE Networking Specifications

In addition to frame types and addressing, IEEE networking specifications apply to connectivity, networking media, error-checking algorithms, encryption, emerging technologies, and more. All of these specifications fall under the IEEE’s Project 802, an effort to standardize physical and logical elements of a network. IEEE developed these standards before the OSI model was standardized by ISO, but IEEE’s 802 standards can be applied to the layers of the OSI model. The section below describes just some of the IEEE 802 specifications. The Network+ certification exam includes questions about IEEE 802 specifications, with an emphasis on the technologies described by 802.3 and 802.11.

802.1 - Bridging and Management; Routing, bridging, and network-to-network communications
802.2 - Logical Link Control; Error and flow control over data frames
802.3 - Ethernet; All forms of Ethernet media and interfaces
802.5 - Token Ring LAN; All forms of token ring media and interfaces
802.11- Wireless LANs; Standards for wireless networking for many different broadcast frequencies and usage techniques.
802.15 - Wireless PANs; The coexistence of wireless personal area networks with other wireless devices in unlicensed frequency bands
802.16 - Broadband Wireless MANs; The atmospheric interface and related functions associated with broadband wireless connectivity; also known as WiMAX
802.17 - Resilient Packet Rings; Access method, physical layer specifications, and management of shared packet-based transmission on resilient rings (such as SONET)
802.20 - Mobile Broadband; Wireless Access; Packet handling and other specifications for multivendor, mobile high-speed wireless transmission, nicknamed “mobile WiMAX
802.22 -Wireless Regional Area Networks; Wireless, broadcast-style network to operate in the UHF/VHF frequency bands formerly used for TV channels

Chapter Summary
  • Standards are documented agreements containing precise criteria that are used as guidelines to ensure that materials, products, processes, and services suit their purpose. Standards also help to ensure interoperability between software and hardware from different manufacturers.
  •  Some of the significant standards organizations are ANSI, EIA/TIA, IEEE, ISO, ITU, ISOC, IANA, and ICANN.
  • ISO’s OSI (Open Systems Interconnection) model represents communication between two computers on a network. It divides networking architecture into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application. Each layer has its own set of functions and interacts with the layers directly above and below it.
  • Protocols in the Application layer, the seventh layer of the OSI model, enable software programs to negotiate their formatting, procedural, security, synchronization, and other requirements with the network.
  • Protocols in the Presentation layer, the sixth OSI model layer, serve as translators between the application and the network, using a common language for different hosts and applications to exchange data.
  • Protocols in the Session layer, the fifth OSI model layer, coordinate and maintain links between two devices for the duration of their communication. They also synchronize dialogue, determine whether communications have been cut off, and, if so, figure out where to restart transmission.
  • The primary function of protocols in the Transport layer, the fourth OSI model layer, is to oversee end-to-end data delivery. In the case of connection-oriented protocols, this means data are delivered reliably. They verify that data are received in the same sequence in which they were sent. They are also responsible for flow control, segmentation, and reassembly of packets. Connectionless Transport layer protocols do not offer such guarantees.
  • Protocols in the Network layer, the third OSI model layer, manage logical addressing and determine routes based on addressing, patterns of usage, and availability. Routers belong to the Network layer because they use this information to intelligently direct data from sender to receiver.
  • Network layer addresses, also called logical or virtual addresses, are assigned to devices through operating system software. They are composed of hierarchical information, so they can be easily interpreted by routers and used to direct data to their destination.
  • The primary function of protocols at the Data Link layer, the second layer of the OSI model, is to organize data they receive from the Network layer into frames that contain error-checking routines and can then be transmitted by the Physical layer.
  • The Data Link layer is subdivided into the Logical Link Control and MAC sublayers. The LLC sublayer ensures a common interface for the Network layer protocols. The MAC sublayer is responsible for adding physical address data to frames.
  • Physical addresses (also known as MAC addresses) are 48- or 64-bit unique identifiers assigned to each network interface. They consist of an OUI (Organizationally Unique Identifier), which is assigned to manufacturers by IEEE, and an extension identifier, a unique number assigned to each NIC by the manufacturer.
  • Protocols at the Physical layer generate and detect signals so as to transmit and receive data over a network medium. These protocols also set the data transmission rate and monitor data error rates, but do not provide error correction.
  • A data request from a software program is received by the Application layer protocols and is transferred down through the layers of the OSI model until it reaches the Physical layer (the network cable, for example). At that point, data is sent to its destination over the network medium, and the Physical layer protocols at the destination send it back up through the layers of the OSI model until it reaches the Application layer.
  • Data frames are small blocks of data with control, addressing, and handling information attached to them. Frames are composed of several fields. The characteristics of these fields depend on the type of network on which the frames run and the standards that they must follow. Ethernet and token ring networks use different frame types, and one type of network cannot interpret the others’ frames.
  • In addition to frame types and addressing schemes, the IEEE networking specifications apply to connectivity, networking media, error-checking algorithms, encryption, emerging technologies, and more. All of these specifications fall under the IEEE’s Project 802, an effort to standardize the elements of networking.
  • Significant IEEE 802 standards are 802.3, which describes Ethernet; 802.11, which describes wireless networking; and 802.16, which describes broadband wireless metropolitan area networks.
Keyterms
802.2
The IEEE standard for error and flow control in data frames. 

802.3
The IEEE standard for Ethernet networking devices and data handling (using the CSMA/CD access method). 

802.5
The IEEE standard for token ring networking devices and data handling. 

802.11
The IEEE standard for wireless networking. 

ACK
A response generated at the Transport layer of the OSI model that confirms to a sender that its frame was received. This packet is the third of three in the three-step process of establishing a connection. 

acknowledgment
See ACK. (Spelled Out) 

American National Standards Institute
See. ANSI. (Spelled Out) 

ANSI
An organization composed of more than 1000 representatives from industry and government who together determine standards for the electronics industry in addition to other fields, such as chemical and nuclear engineering, health and safety, and construction. 

API
A set of routines that make up part of a software application. 

Application layer
The seventh layer of the OSI model. This layer protocols enable software programs to negotiate formatting, procedural, security, synchronization, and other requirements with the network. 

application programming interface
See API. (Spelled Out) 

block ID
See OUI, company_id. 

checksum
A method of error checking that determines if the contents of an arriving data unit match the contents of the data unit sent by the source. 

company_id
See OUI, block ID. 

connection oriented
A type of Transport layer protocol that requires the establishment of a connection between communicating nodes before it will transmit data. 

connectionless
A type of Transport layer protocol that services a request without requiring a verified session and without guaranteeing delivery of data. 

CRC
An algorithm (or mathematical routine) used to verify the accuracy of data contained in a data frame. 

cyclic redundancy check
See CRC. (Spelled Out) 

Data Link layer
The second layer in the OSI model. This layer bridges the networking media with the Network layer. Its primary function is to divide the data it receives from the Network layer into frames that can then be transmitted by the Physical layer. 

Data Link layer address
See MAC address, physical address, hardware address. 

device ID
See extension identifier. 

EIA
A trade organization composed of representatives from electronics manufacturing firms across the United States that sets standards for electronic equipment and lobbies for legislation favorable to the growth of the computer and electronics industries. 

Electronic Industries Alliance
See EIA. (Spelled Out) 

Encapsulate
The process of wrapping one layer's PDU with protocol information so that it can be interpreted by a lower layer. For example, Data Link layer protocols _____ Network layer packets in frames. 

Ethernet
A networking technology originally developed at Xerox in the 1970s and improved by Digital Equipment Corporation, Intel, and Xerox. _____, which is the most common form of network transmission technology, follows the IEEE 802.3 standard. 

EUI-64
The IEEE standard defining 64-bit physical addresses. In the ____ scheme, the OUI portion of an address is 24 bits in length. A 40-bit extension identifier makes up the rest of the physical address to total 64 bits. 

Extended Unique Identifier-64
See EUI-64. (Spelled Out) 

Extension identifier
A unique set of characters assigned to each NIC by its manufacturer. In the traditional, 48-bit physical addressing scheme, it is 24 bits long. In EUI-64, it is 40 bits long. 

FCS
The field in a frame responsible for ensuring that data carried by the frame arrives intact. It uses an algorithm, such as CRC, to accomplish this verification. 

Flow control
A method of gauging the appropriate rate of data transmission based on how fast the recipient can accept data. 

fragmentation
A Network layer service that subdivides segments it receives from the Transport layer into smaller packets. 

Frame
A package for data that includes not only the raw data, or "payload," but also the sender's and recipient's addressing and control information. They are generated at the Data Link layer of the OSI model and are issued to the network at the Physical layer. 

Frame check sequence
See FCS. (Spelled Out) 

Hardware address
See MAC address, physical address, Data Link layer address. 

HTTP
An Application layer protocol that formulates and interprets requests between Web clients and servers. 

Hypertext Transfer Protocol
See HTTP. (Spelled Out) 

IAB
A technical advisory group of researchers and technical professionals responsible for Internet growth and management strategy, resolution of technical disputes, and standards oversight. 

IANA
A nonprofit, US government funded group established at University of Southern California and charged with managing IP address allocation and the DNS. Oversight for many of the organizations functions was given to ICANN in 1998; ____ continues to perform Internet addressing and DNS administration. 

ICANN
The nonprofit corporation currently designated by the United States government to maintain and assign IP addresses. 

IEEE
An international society composed of engineering professionals. Its goals are to promote development and education in the electrical engineering and computer science fields. 

IETF
An organization that sets standards for how systems communicate over the Internet (for example, how protocols operate and interact). 

Institute of Electrical and Electronics Engineers
See IEEE. (Spelled Out) 

International Organization for Standardization
See ISO. (Spelled Out) 

International Telecommunication Union
See ITU. (Spelled Out) 

Internet Architecture Board
See IAB. (Spelled Out) 

Internet Assigned Numbers Authority
See IANA. (Spelled Out) 

Internet Corporation for Assigned Names and Numbers
See ICANN. (Spelled Out) 

Internet Engineering Task Force
See IETF. (Spelled Out) 

Internet Protocol
See IP. (Spelled Out) 

Internet Protocol address
See IP address. (Spelled Out)


Internet service provider
See ISP. (Spelled Out) 

Internet Society
See ISOC. (Spelled Out)

IP
A core protocol in the TCP/IP suite that operates in the Network layer of the OSI model and provides information about how and where data should be delivered. The subprotocol that enables TCP/IP to internetwork. 

IP address
The Network layer address assigned to nodes to uniquely identify them on a TCP/IP network. IPv4 addresses consist of 32 bits divided into four octets, or bytes. IPv6 addresses are composed of eight 16-bit fields, for a total of 128 bits.

ISO
A collection of standards organizations representing 162 countries with headquarters located in Geneva, Switzerland. Its goal is to establish international technological standards to facilitate the global exchange of information and barrier-free trade. 

ISOC
A professional organization with members from 90 chapters around the world that helps to establish technical standards for the Internet. 

ISP
A business that provides organizations and individuals with Internet access and often, other services, such as e-mail and Web hosting. 

ITU
A United Nations agency that regulates international telecommunications and provides developing countries with technical expertise and equipment to advance their technological bases. 

LLC sublayer
The upper sublayer in the Data Link layer. Provides a common interface and supplies reliability and flow control services. 

logical address
See network address, Network layer address, virtual address. 

Logical Link Control sublayer
See LLC sublayer. (Spelled Out) 

MAC address
See physical address, Data Link Layer address, hardware address. 

MAC sublayer
The lower sublayer of the Data Link layer. Appends the physical address of the destination computer onto the frame.

maximum transmission unit
See MTU. (Spelled Out) 

Media Access Control sublayer
See MAC sublayer. (Spelled Out) 

MTU
The largest data unit a network (for example, Ethernet or token ring) will accept for transmission. 

Network address
A unique identifying number for a network node that follows a hierarchical addressing scheme and can be assigned through operating system software. Added to data packets and interpreted by protocols at the Network layer of the OSI model. 

Network layer
The third layer in the OSI model. Protocols in this layer translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver. 

Network layer address
See network address, logical address, virtual address. 

Open Systems Interconnection model
See OSI model. (Spelled Out) 

Organizationally Unique Identifier
See OUI. (Spelled Out) 

OSI model
A model for understanding and developing computer-to-computer communication developed in the 1980s by ISO. It divides networking functions among seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application. 

OUI
A 24-bit character sequence assigned by IEEE that appears at the beginning of a network interface's physical address and identifies the NIC's manufacturer. 

PDU
A unit of data at any layer of the OSI model. 

physical address
A 48- or 64-bit network interface identifier that includes two parts: the OUI, assigned by IEEE to the manufacturer, and the extension identifier, a unique number assigned to each NIC by the manufacturer. 

Physical layer
The lowest, or first, layer of the OSI model. Protocols in this layer generate and detect signals so as to transmit and receive data over a network medium. These protocols also set the data transmission rate and monitor data error rates, but do not provide error correction. 

Presentation layer
Sixth layer of OSI model. Protocols translate between application and network. Data are formatted in a schema that the network can understand, format varying according to type of network used. Also manages data encryption and decryption, such as scrambling of system passwords. 

protocol data unit
See PDU. (Spelled Out) 

reassembly
The process of reconstructing data units that have been segmented. 

Regional Internet Registry
See RIR. (Spelled Out) 

RIR
A not-for-profit agency that manages the distribution of IP addresses to private and public entities. ARIN covers North, Central, and South America and sub-Saharan Africa. APNIC covers Asia and the Pacific region. RIPE covers Europe and North Africa. 

route
To intelligently direct data between networks based on addressing, patterns of usage, and availability of network segments. 

router
A device that connects network segments and directs data based on information contained in the data packet. 

segments
Units of data that result from subdividing a larger protocol data unit. 

segmentation
The process of decreasing the size of data units when moving data from a network that can handle larger data units to a network that can handle only smaller data units. 

sequencing
The process of assigning a placeholder to each piece of a data block to allow the receiving node's Transport layer to reassemble the data in the correct order. 

session
A connection for data exchange between two parties. The term may be used in the context of Web, remote access, or terminal and mainframe communications, for example. 

Session layer
The fifth layer in the OSI model. This layer establishes and maintains communication between two nodes on the network. It can be considered the "traffic cop" for communications, such as videoconferencing, that require precisely coordinated data exchange. 

standard
A documented agreement containing technical specifications or other precise criteria that are used as guidelines to ensure that materials, products, processes, and services suit their intended purpose. 

SYN
The packet one node sends to request a connection with another node on the network. This packet is the first of three in the three-step process of establishing a connection. 

SYN-ACK
The packet a node sends to acknowledge to another node that it has received a SYN request for connection. This packet is the second of three in the three-step process of establishing a connection. 

synchronization
See SYN. (Spelled Out) 

synchronization-acknowledgment
See SYN-ACK. (Spelled Out) 

Telecommunication Industry Association
See TIA. (Spelled Out) 

terminal
A device with little (if any) of its own processing or disk capacity that depends on a host to supply it with applications and data-processing services. 

three-way handshake
A three-step process in which Transport layer protocols establish a connection between nodes. The three steps are: Node A issues a SYN packet to node B, node B responds with SYN-ACK, and node A responds with ACK. 

TIA
A subgroup of the EIA that focuses on standards for information technology, wireless, satellite, fiber optics, and telephone equipment. Best known standard __/EIA alliance are its guidelines for how network cable should be installed in commercial buildings, known as "__/EIA 568-B Series." 

token
A special control frame that indicates to the rest of the network that a particular node has the right to transmit data. 

token ring
A networking technology developed by IBM in the 1980s. It relies upon direct links between nodes and a ring topology, using tokens to allow nodes to transmit data. 

Transport layer
The transport layer is the fourth layer of the OSI model. In this layer, protocols ensure that data are transferred from point A to point B reliably and without errors. This layer services include flow control, acknowledgment, error correction, segmentation, reassembly, and sequencing. 

virtual address
See network address, logical address, network layer address.

Review Questions

1.   Your supervisor has asked you to correct several cable management problems that might be slowing down the network. Which organization’s standards will guide you in assessing your firm’s current cabling situation?
a ISO
b.   ITU
c TIA/EIA
d.   IEEE

2.   Which technology does the IEEE 802.11 specification describe?
a Network security
b.   Ethernet LANs
c Logical Link Control
d.  Wireless networks

3.   You are configuring clients to communicate over an Ethernet LAN. Which of the following IEEE specifications will identify which frame type your client should use?
a.  801.2
b.  802.3
c.  802.11
d.  801.16

4. Which layer of the OSI model is responsible for issuing acknowledgments (ACKs)?
a Application layer
b.   Data Link layer
c Network layer
d.  Transport layer

5.   Suppose your network is connected to another network via a router. Which OSI model layer provides the information necessary to direct data between the two networks ?
a Data Link layer
b.   Physical layer
c Network layer
d.   Session layer

6.  In which two layers of the OSI model do NICs belong?
a Presentation and Application layers
b.   Transport and Network layers
c Network and Data Link layers
d.  Physical and Data Link layers

7.   Which OSI model layer is responsible for keeping open a communications path between your computer and the server when you dial in to a remote access server?
a.   Session layer
b.   Data Link layer
c Presentation layer
d.   Physical layer
8.  Under what circumstances would the Transport layer use segmentation?
a When too many data frames are flooding into a receiving nodes NIC
b.   When more than 10 percent of transmitted frames are damaged
c When the destination node cannot accept the size of the data blocks transmitted by the source node
d.   When the source node requests that data blocks be segmented for faster processing

9.  Which OSI model layer generates and detects voltage so as to transmit and receive signals carrying data?
a.   Physical layer
b.   Data Link layer
c Network layer
d.   Transport layer

10. An IP address is an example of what type of address?
a Physical layer
b.  Network layer
c MAC sublayer
d.   Data Link sublayer

11. If the TCP protocol did not receive an acknowledgment for data it transmitted, what would it do?
a Issue its own acknowledgment, indicating to the recipient that it did not receive the acknowledgment it expected
b.   Issue a warning frame to tell the recipient it would retransmit the data if it did not receive the acknowledgment within a certain time frame
c Reestablish the connection with the recipient
d.  Retransmit the data to the recipient

12. Which part of a MAC address is unique to each manufacturer?
a The destination ID
b.  The OUI
c The physical node ID
d.   The SYN

13. What is the purpose of the trailer field added to a frame in the Data Link layer?
a To indicate the sum of the error-checking algorithm
b.   To signal the rate at which a node can receive the data
c To mark the end of a frame
d.   To represent the frames sequence number

14. Which layer of the OSI model encapsulates Network layer packets?
a Physical layer
b.   Session layer
c Data Link layer
d.   Transport layer

15.  At what OSI model layer do protocols manage data delivery priorities?
a Presentation layer
b.   Session layer
c Transport layer
d.  Network layer

16.  What are the sublayers of the Data Link layer as defined in the IEEE 802 standards?
a.   Logical Link Control sublayer and Media Access Control sublayer
b.   Transport Control sublayer and Media Access Control sublayer
c Logical Link Control sublayer and Physical Addressing sublayer
d.   Transport Control sublayer and Data Link Control sublayer

17. Suppose that, at the receiving node, a frames FCS doesnt match the FCS it was issued at the transmitting node. What happens as a result?
a The receiving node’s Transport layer assesses the error and corrects it.
b.   The transmitting nodes Data Link layer assesses the error and corrects it.
c The receiving node’s Data Link layer requests a retransmission.
d.   The transmitting nodes Transport layer immediately issues a replacement frame.

18. In which of the following situations would it be most desirable to use a connectionless Transport layer protocol?
a When retrieving a spreadsheet from a busy file server
b.  When viewing a movie on the Web
c When connecting to a graphics-intensive Web site
d.   When sending an e-mail message to a long list of recipients

19. Which of the following would be found in a Data Link layer header?
a The packets fragmentation offset
b.   The packets sequence number
c The sources logical address
d.  The source’s physical address

20. By default, what is the largest data payload that packets on an Ethernet network can accept?
a 64 bytes
b.   128 bytes
c 1500 bytes
d.   2400 bytes

Sample Quiz

1. By far, the most popular type of networking technology in use today is ________ .
a. Frame Relay           
b. Ethernet     
c. Broadband
d. Token Ring            

2. Simple connectivity devices such as hubs and repeaters operate at the ________ layer.
a. Network     
b. Physical      
c. Transport    
d. Data Link   

3. Within the OSI Model Transport layer, ________ is the process of gauging the appropriate rate of transmission based on how fast the recipient can accept data.
a. load balancing        
b. flow control           
c. capacity planning   
d. throughput management    

4. What organization is responsible for IP addressing and domain name management?
a. ISOC (Internet Society)     
b. ICANN (Internet Corporation for Assigned Names and Numbers)         
c. ISO (International Organization for Standardization)       
d. IETF (Internet Engineering Task Force)   

5. Data issued from a software application are not in the same form as the data that a NIC sends to the network.
a. True
b. False           

6. IEEE developed the EEE 802 specifications after the OSI model was standardized by ISO.
a. True
b. False           

7. Most LANs support more than one frame type.
a. True
b. False

8. The OSI model is a theoretical representation of what happens between two nodes communicating on a network.
a. True
b. False     

9. TCP is an example of a connection-oriented protocol.
a. True
b. False
  
10. The top, or seventh, layer of the OSI model is the ________ layer.
a. Application
b. Physical      
c. Transport    
d. Presentation
  
11. What dictates a segments' maximum size?
a. The type of network transmission method in use  
b. The NIC manufacturer's specifications      
c. The network operating system       
d. The type of transmission media in use

12. What document contains technical specifications or other precise criteria stipulating how a particular product or service should be designed or performed?
a. Contracts    
b. Policies       
c. Guidelines  
d. Standards

13. Which IEEE 802 specification technologies are emphasized in the Network+ certification exam?
a. 802.3 (Ethernet) and 802.5 (Token Ring LAN)    
b. 802.5 (Token Ring LAN) and 802.11 (Wireless LANs)   
c. 802.11 (Wireless LANs) and 802.20 (Mobile Broadband Wireless Access)         
d. 802.3 (Ethernet) and 802.11 (Wireless LANs)

14. What OSI model layer manages data encryption and decryption?
a. Application
b. Presentation           
c. Transport    
d. Physical

15. Technically, a ________ is a piece of data enclosed by a Data Link layer header and trailer.
a. datagram    
b. packet         
c. frame          
d. PDU

Practice Quiz

 1.  Which standards organization requests voluntary compliance with their standards?
a.       IANA
b.      ISO
c.       ITU
d.      ANSI

2. Simple connectivity devices such as hubs and repeaters operate at the ____.
a.       Application layer
b.      Network layer
c.       Data Link Layer
d.      Physical layer

3. The Application layer transfers the request to the Presentation layer, in the form of a ____.
a.       protocol data unit
b.      packet
c.       datagram
d.      frame

 4. The top, or seventh, layer of the OSI model is the ____.
a.       Presentation layer
b.      Network layer
c.       Transport layer
d.      Application layer

 5. The ____ standard refers to packet handling and other specifications for multivendor, mobile high-speed wireless transmission, nicknamed "mobile WiMAX".
a.       802.20
b.      mobile broadband wireless network
 
 6. The Physical layer interprets and adds information to frames.
a.       True
b.      False
 
 7. The IP (Internet Protocol) operates in the Transport layer.
a.       True
b.      False
 
 8. A checksum is a unique character string that allows the receiving node to determine if an arriving data unit exactly matches the data unit sent by the source.
a.       True
b.      False

  9. Which standards organization is responsible for providing the OSI model?
a.       ISOC
b.      ANSI
c.       IEEE
d.      ISO
 
 10. A connectionless protocol's lack of sophistication makes it more efficient than a connection-oriented protocol and renders it useful in situations in which data must be transferred quickly, such as live audio or video transmissions over the Internet.
a.       True
b.      False

11. Standards define maximum acceptable performance.
a.       True
b.      False

12. Most LANs do not support more than one frame type, because devices cannot support more than one frame type per physical interface, or NIC.
a.       True
b.      False

 13. Which standards organization’s technical papers and standards are highly respected in the networking profession?
a.       ICANN
b.      ANSI       
c.       IEEE        
d.      ISO
 
 14. The ____ provides developing countries with technical expertise and equipment to advance those nations' technological bases.
a.       ITU
b.      IEEE
c.       ISO
d.      ANSI

15. Standards help to ensure interoperability between software and hardware from different manufacturers.
a.       True
b.      False
 
 16. The ____ layer serves as a translator.
a.       application
b.      presentation
c.       transport
d.      physical
 
 17. ITU oversees groups with specific missions, such as the IAB (Internet Architecture Board). IAB is a technical advisory group of researchers and technical professionals interested in overseeing the Internet's design and management.
a.       True
b.      False

   18. ____ is frequently compared to placing an envelope within a larger envelope.
a.       Standards
b.      Datagram
c.       Encapsulation
d.      Packet

 19. The ____ standard refers to the routing, bridging, and network-to-network communications.
a.       802.2        
b.      802.1
c.       802.3                    
d.      802.11

20. IEEE's 802 standards can be applied to the layers of the OSI model.
a.       True                      
b.      False

21. Which standards organization is a professional membership society that helps to establish technical standards for the Internet?
a.       ISOC
b.      ANSI       
c.       IEEE        
d.      ISO

22.  ____ not only sets standards for its members, but also helps write ANSI standards and lobbies for legislation favorable to the growth of the computer and electronics industries.
a.       ANSII
b.      EIA
c.       ISO
d.      ITU

23. By far, the most popular type of networking technology in use today is ____.
a.       checksum
b.      CRC
c.       IANA
d.      Ethernet

24. NICs operate at both the Physical layer and at the ____ layer.
a.       Session
b.      Transport
c.       Application
d.      Data Link

25. The Application layer includes software applications.
a.       True
b.      False

26. Which statement accurately describes the OSI model?
a.       It describes how software programs interact with humans.
b.      It prescribes the type of hardware or software that should support each layer.
c.       It describes how software programs interact with other software programs.
d.      It describes a theoretical representation of what happens between two nodes communicating on a network.

27. A network’s ____________________ represents the largest data unit the network will carry.
a.       SYN
b.      MTU
c.       IP
d.      ACK

28.  ____ is the process of reconstructing segmented data.
a.       Realigning
b.      Reassembly
c.       Reengineering
d.      Resegmenting

29. The ____ is a fixed number associated with a device’s NIC.
a.       LLC address
b.      frame address
c.       logical address
d.      physical address

30.  ____________________ are documented agreements containing technical specifications or other precise criteria that stipulate how a particular product or service should be designed or performed.
a.       Standards
b.      Sessions
c.       Packets
d.      Frames

31. ____ oversees the IAB (Internet Architecture Board).
a.       ISOC
b.      ISO
c.       EIA
d.      ICANN

32. Which IEEE standard describes Ethernet?
a.       802.1
b.      802.3
c.       802.5
d.      802.11

33. Network functions are associated with only one layer of the OSI model.
a.       True
b.      False

34. The Application layer separates data into ____________________, or discrete amounts of data.
a.       segments
b.      protocol data units (PDUs)
c.       frames
d.      packets

35. Each network node has ____ types of addresses.
a.       two
b.      three
c.       four
d.      five

36. ____________________ is the process of gauging the appropriate rate of transmission based on how fast the recipient can accept data.
a.       Encapsulate
b.      Flow Control
c.       Addressing
d.      Routing

37. In which OSI model layer(s) do NICs operate?
a.       Physical and Data Link
b.      Data Link
c.       Physical
d.      Network and Physical

38. Transport layer protocols break large data units into ____.
a.       block IDs
b.      frames
c.       segments
d.      PDUs

39. Which OSI model layer manages data encryption?
a.       Session
b.      Application
c.       Physical.   
d.      Presentation

40. Standards define the ____ performance of a product or service.
a.       maximum acceptable
b.      minimum acceptable
c.       most acceptable
d.      ideal

41. Not all Transport layer protocols are concerned with reliability.
a.       True
b.      False

42. The ____ is a specialized United Nations agency that provides developing countries with technical expertise and equipment to advance those nations’ technological bases.
a.       ISOC
b.      ANSI
c.       ITU
d.      ISO

43. Which type of protocol is useful when data must be transferred quickly?
a.       IP
b.      connection-oriented
c.       TCP
d.      connectionless

44. Which Data Link sublayer manages access to the physical medium?
a.       Addressing layer
b.      LLC
c.       Management layer
d.      MAC

45. In which OSI model layer do hubs operate?
a.       Physical and Data Link
b.      Network
c.       Data Link
d.      Physical

46. ____________________ protocols establish a connection with another node before they begin transmitting data.
a.       connection oriented
b.      connectionless
c.       wireless
d.      IP

47. Which OSI model layer initiates the flow of information?
a.       Presentation
b.      Application
c.       Physical
d.      Session

48. Which IEEE standard describes specifications for wireless transmissions?
a.       802.1
b.      802.3
c.       802.5
d.      802.11

49. The process of determining the best path from Point A on one network to Point B on another is known as ____.  
a.       reconfiguring
b.      enhancing 
c.       routing
d.      mapping

50. The goal of ____ is to establish international technological standards to facilitate the global exchange of information and barrier free trade.
a.       ITU
b.      ISO
c.       ISOC
d.      LLC

56. Which OSI model layer does TCP operate?    
a.       Physical
b.      Data Link
c.       Application
d.      Transport

57. Which Data Link sublayer manages flow control?
a.       LLC
b.      MAC

58. ______________ is a method of identifying segments that belong to the same group of subdivided data.
a.       Segmenting
b.      Sequencing
c.       Routing
d.      Addressing