MeyersCompTIANet+Gde6eChap001PPT-edit

.pptx
School
Holland College**We aren't endorsed by this school
Course
CIS 123
Subject
Computer Science
Date
Jan 12, 2025
Pages
104
Uploaded by ChancellorCaribou4797
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Network ModelsChapter 1
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.ObjectivesDescribe how models such as the OSI seven-layer model and the TCP/IP model help technicians understand and troubleshoot networksExplain the major functions of network hardware with the OSI seven-layer modelDescribe the major functions of networks with the TCP/IP model
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Overview
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Two Network ModelsThe OSI seven-layer and TCP/IP models provide:A powerful tool for diagnosing problemsA common language to describe networks
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.1 Using OSI terminology in device documentation
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.ModelsWhat does “model” mean to you?All models are a simplified representation of the real thing
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.ModelsFigure 1.2 Types of modelsComputer models that predict weather, plastic model airplane, fashion model
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.A Model: An ExampleA model has all the major functions of the real itemFigure 1.3 Simple model airplane
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Network Models: OverviewWhat functions define all networks?What details can be omitted?ISO (International Organization for Standardization) proposed the OSI seven-layer model
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Layer 7 - ApplicationLayer 6 - PresentationLayer 5 - SessionLayer 4 - TransportLayer 3 - NetworkLayer 2 - Data LinkLayer 1 - PhysicalThe OSI Model
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.All People Seem To Need Digital ProcessingorPlease Do Not Throw Sausage Pizza AwayMneunomic trick
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.One of the workers has just completed a new employee handbookShe needs to transfer the Word document to the other worker for reviewShe Could:Copy the file to a flash drive and walk it over to the other person (Sneakernet)Transfer the file using the networkOSI Model in Action (an example)
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Let’s Get Physical—Network Hardware and Layers 1–2
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Most networks use unshielded twisted pair (UTP) cable as a physical channel to move the bits of data between systemsCablingFigure 1.5 UTP cabling
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Central BoxEach computer system has a cable leading to a central boxThe central box sends the data received from one system to all the other systems attached to itFigure 1.6 Typical central box
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.7 The network so far, with the Physical layer hardware installed
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Network Interface Cards (NICs)NICs are built into the motherboardNetwork cables attach to the NICsFigure 1.8 Typical NIC
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.NIC to Central Box ConnectionsCables run from the NIC to a jack on the wallInside the wall another cable runs all the way back to the central boxFigure 1.9 Dongle NIC with cable connecting the laptop to the wall jack
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.10 The MHTechEd network
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Each system must have a unique identifierMedia access control address or MAC addressA unique address burned into a ROM chip on the NICEach MAC address is 12 hex characters or 48 bits in lengthThe NIC
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.11 MAC addressThe MAC address is printed on the surface of the chip and burned into the ROM chip
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.MAC addresses are 48 bits longUsually represented using hexadecimal characters (12 hex digits = 48 bits)A typical MAC address: 00-40-05-60-7D-49No two MAC addresses are ever the same!MAC AddressesOrganizationally Unique Identifier (OUI)Device ID
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.12 Output from ipconfig /all
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.13 Output from ip ain Kali Linux
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.NICs send and receive data as pulses of electricity, light, or radio wavesFigure 1.14 Data moving along a wire
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1-15 Oscilloscope of data
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.16 Data as ones and zeroes
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.17 Inside the NIC
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.FramesA frame is basically a container for a chunk of data moving across a networkContains the recipient’s MAC address, the sender’s MAC address, the Type field, the data itself, and a frame check sequence (FCS)Figure 1.18 Generic frame
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.FramesFrame Sequence Checking (FCS) uses binary math called cyclic redundancy check (CRC) for error checkingFrame can be thought of as having three sectionsHeader (MAC addresses and Type), payload and trailerNIC does not care what is inside the data part of the frame
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.19 Frame as a canister
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Frame SizeDifferent types of networks use different sizes of framesMany frames hold at most 1500 bytes of dataThe sending software breaks up large amounts of data into smaller chunksThe receiving system’s software must recombine the data chunks
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Into the Central BoxWhen a system sends a frame out on the network, the frame goes into the central boxThe technology of the central box determines the next steps for the frame
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.In the early days, the central box was called a hubThe hub made copies of a frame and sent a copy to every other system on the networkEvery frame sent on a network was received by every NICOnly the NIC with the matching MAC address would process that particular frameThe Central Box: Hubs
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.19 Incoming frame!
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Switches replaced hubsA frame is sent only to the correct recipient MAC addressSwitches maintain a table that maps MAC addresses to switch portsThe Central Box: Switches
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Getting the Data on the LineSince the cable is shared, only one system may speak at a timeNetworks use frames to restrict the amount of data a NIC can send at onceNICs handle these and other issues on their own without our help
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Getting to Know YouUsually two devices have talked before, so the destination MAC address is already knownIf the MAC address is not known, a broadcast message is sent over the networkThe destination device will respond by sending its MAC addressThe MAC broadcast address is FF-FF-FF-FF-FF-FF
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.21 Building the frame
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.22 Adding the data and FCS to the frame
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.23 Sending the frame
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.24 Reading an incoming frame
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.The receiving NIC uses the FCS to verify that the data is validIf the data is valid, the receiving NIC strips off all the framing information and sends the data to the software—the operating system—for processing After the Frame is Received
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure. Layer 1 and Layer 2 when using hubs (older approach)
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.25 Layer 1 and Layer 2 using switches (modern approach)
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.The Two Aspects of NICsLogical Link Control (LLC): the aspect of the NIC that talks to the system’s operating system (usually via device drivers)Handles multiple network protocols and provides flow controlMedia Access Control (MAC): the role in which frames are created and addressed
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.26 LLC and MAC, the two parts of the Data Link layer
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Beyond the Single Wire— Network Softwareand Layers 3–7
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.A logical addressing method:Ignores the hardwareEnables breaking a large network into subnets A network protocol creates:Unique identifiers for each systemA set of communication rules for issues, e.g. how to get packets from one subnet to anotherHow Does Data Get from One System to Another in Large Networks?
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.27 Large LAN complete (left) and broken into two subnets (right)
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Packets are created and addressedThe Internet Protocol is the primary logical addressing protocol for TCP/IPA router connects each of the subnetsThe IP address is used to forward dataIP—Playing on Layer 3, the Network Layer
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.28 Typical small router
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.29 MHTechEd addressing
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Packets Within FramesTo send data successfully in a TCP/IP networkData is wrapped up in two distinct containersInner container is called a packetFigure 1.30 IP packet
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Packets Within FramesIP packet is handed to the NICNIC encloses the IP packet in a regular frameFigure 1.31 IP packet in a frame (as a canister)
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Packets Within FramesPacket is enclosed within a frameContains sending and receiving MAC addressesFigure 1.32 IP packet in a frame
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.The Process of Sending DataData sent from one computer to another on a TCP/IP network can go through many routersEach router strips off the incoming frameExamines the IP address in the packet to determine where to send the dataCreates a new frame needed for the connection (e.g., cable or DSL network)Sends the packet within the new frame to next router
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.The Process of Sending Data (cont’d)The IP packet inside remains unchanged
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Once the packet reaches the destination subnet’s router, that router:Strips off the incoming frameLooks at the destination addressAdds a frame with the appropriate MAC addressReceiving NIC strips away the Ethernet framePasses the remaining packet off to the softwareThe networking software built into the operating system handles the rest of the workThe Process of Sending Data (cont’d.)
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.33 Router removing network frame and adding one for outgoing connection
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Most data is much larger than a single frameThe transport protocol Breaks up the data into chunks called segments or datagrams (depending on the specific transport protocol used) Gives each segment some type of sequence number Assembly and Disassembly—Layer 4, the Transport Layer
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.The transport protocol breaks data into segments and gives each segment a sequence numberThe sequence numbers notify the receiving system of the total number of segments and how to put them togetherSimilar to the numbering of boxes by UPSAssembly and Disassembly—Layer 4, the Transport Layer (cont’d.)
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.34 Labeling the boxes
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.It is the assembler/disassembler softwareAlso initializes requests for packets that were not received in good orderThe Functions of the Transport Layer
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.35 OSI updated
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Segmentation and Reassembly—Layer 4, the Transport LayerConnection-oriented vs. connectionless communicationConnection-oriented protocols require a connection between client and server before communication can startTransmission Control Protocol (TCP)Connectionless protocols start communicating without first verifying a connection existsUser Data Protocol (UDP)
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.36 Connection between e-mail client and server
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.37 Connectionless communication
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Segmentation and Reassembly—Layer 4, the Transport LayerSegments within packetsTCP segmentRemains after stripping away IP addresses from an IP packet and contains many fieldsTCP segment portA number between 1 and 65,536—a logical value assigned to specific applications or servicesExample: Web server “listens” or looks for TCP segments with the destination port numbers 80 or 443
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1-38 TCP segment
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Segmentation and Reassembly—Layer 4, the Transport LayerTransport layer receives application layer data Breaks the application data into chunksAdds port numbers and sequence numbersCreates the TCP segmentHands the TCP segment to the Network layer, which creates the IP packetTCP/IP network uses TCP at the Transport layer
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Segmentation and Reassembly—Layer 4, the Transport LayerUDP datagram created in the Transport layerIncludes port and length numbers plus a checksum as a headerCombines that header with dataUDP datagram lacks most of the extra fields found in TCP segmentsDoes not care if receiving computer gets its data
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1-39 UDP datagram
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.One system may be talking to many other systems simultaneouslySession software connects applications to applicationsSession layer handles all the sessionsInitiates sessions, accepts incoming sessions, and opens and closes existing sessionsIP address and port number used for a sessionTalking on a Network—Layer 5,the Session Layer
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.40 Handling multiple inputs
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.41 Each request becomes a session.
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.42 OSI updated
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.The Presentation layer translates data from lower layers into a format usable by the Application layer, and vice versaTCP/IP networks do not necessarily map directly to the OSI model Many protocols function on more than one OSI layer and can include Layer 6, Presentatione.g. Transport Layer Security (TLS) protocolTranslation—Layer 6, the Presentation Layer
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.43 OSI updated
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Network Applications—Layer 7, the Application LayerPeople use software applications to exchange data on a networkNetwork applet in Windows 10, Web browsers, and e-mail applicationsApplications may include additional functionsExamples: encryption, user authentication, and tools to control the look of data
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.44 Network applications at work
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Network Applications—Layer 7, the Application Layer (cont’d)Application layer (Layer 7) of the OSI modelRefers to code built into all operating systems that enables network-aware applicationsApplication Programming Interfaces (APIs)Included in all operating systemsUsed to make programs network-awareProvide a standard way for programmers to enhance or extend an application’s capabilities
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.Figure 1.45 OSI updated
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.The OSI Seven-Layer Model and Remote Work (1 of 7)A day in the life of a remote data analystAnalyst connects to Internet wirelessly with a laptopAccesses online services through a browserNote that the OSI layers apply in a wireless network
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.The OSI Seven-Layer Model and Remote Work (2 of 7)Figure 1.46 Reviewing some analysis on GitHub
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.The OSI Seven-Layer Model and Remote Work (3 of 7)Layer 1 examplesWireless radio waves connecting the laptop to a wireless access point (WAP)Physical wires connecting the WAP to the router, Internet service provider (ISP), and all the routers in between there and a corporate network and other Internet-based services
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.The OSI Seven-Layer Model and Remote Work (4 of 7)Figure 1.47 Wireless is “physical” too!
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.The OSI Seven-Layer Model and Remote Work (5 of 7)Figure 1.48 Beth’s productivity tools
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.The OSI Seven-Layer Model and Remote Work (6 of 7)Layer 2 examplesWireless NIC in the laptop has a MAC address and connects to the WAP with framesThe WAP uses MAC addresses to connect to the local switchLayer 3 examplesTCP/IP is used for connections and interactionsBy definition, the laptop must have a valid IP address or two
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Sixth Edition (Exam N10-008)Copyright © 2022 by McGraw-Hill Education. All rights reserved.The OSI Seven-Layer Model and Remote Work (7 of 7)Layer 4 examplesTCP/IP is used for connections and interactionsThe laptop must encapsulate/decapsulate segments and datagrams at the Transport layerLayer 7 examplesWeb-based tools today rely on HTTP and TLS (HTTPS)
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Fifth Edition (Exam N10-007)Copyright © 2018 by McGraw-Hill Education. All rights reserved.Encapsulation: the entire process of preparing data to go onto a networkAll the steps from the application to the Application, Presentation, Session, Transport, Network, and Data Link layersDe-encapsulation: the reverse process of encapsulationStripping all the extra header information out as the data goes up the stackEncapsulation and De-Encapsulation
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Fifth Edition (Exam N10-007)Copyright © 2018 by McGraw-Hill Education. All rights reserved.Four layersApplicationTransportInternetLink/Network InterfaceThe TCP/IP Model
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Fifth Edition (Exam N10-007)Copyright © 2018 by McGraw-Hill Education. All rights reserved.TCP/IP does not have a standards body Results in a number of variations on the TCP/IP modelVersion 1 (four layers) is used by Cisco, Microsoft, and other major companiesThe TCP/IP Model (cont’d.)
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Fifth Edition (Exam N10-007)Copyright © 2018 by McGraw-Hill Education. All rights reserved.Corresponds to OSI model Layers 1 and 2 Handles “physical” elements (cabling, hubs, physical addresses, and NICs)Any part of the network that deals with complete frames is in the Link layerOnce the frame information is stripped away from an IP packet, we move into the Internet layerThe Link (Network Interface) Layer
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Fifth Edition (Exam N10-007)Copyright © 2018 by McGraw-Hill Education. All rights reserved.Figure 2.43 TCP/IP Link layer compared to OSI Layers 1 and 2
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Fifth Edition (Exam N10-007)Copyright © 2018 by McGraw-Hill Education. All rights reserved.The “IP packet” layerDeals with any device or application that uses IP protocols and IP addressing and routingRouters function at this layerMaps to the Network layer (Layer 3) of the OSI modelIP packets are created in this layerThe Internet Layer
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Fifth Edition (Exam N10-007)Copyright © 2018 by McGraw-Hill Education. All rights reserved.Figure 2.44 TCP/IP Internet layer compared to OSI Layer 3
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Fifth Edition (Exam N10-007)Copyright © 2018 by McGraw-Hill Education. All rights reserved.Maps to OSI Transport layer, Session layer, and some of the Application layerInvolved with assembly and disassembly of dataProvides both connection-oriented and connectionless communicationsThe Transport Layer
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Fifth Edition (Exam N10-007)Copyright © 2018 by McGraw-Hill Education. All rights reserved.Figure 2.45 TCP/IP Transport layer compared to OSI Layers 4, 5, and part of 6
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Fifth Edition (Exam N10-007)Copyright © 2018 by McGraw-Hill Education. All rights reserved.The TCP/IP Application layer maps to the top three layers of the OSI modelUses a unique port numbering system that gives each application a unique number between 1 and 65,535Allows Presentation layer formats, such as MIMEEvery TCP/IP application must be a part of a network to functionThe Application Layer
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Fifth Edition (Exam N10-007)Copyright © 2018 by McGraw-Hill Education. All rights reserved.Figure 2.48 TCP/IP Application layer compared to OSI Layers 5-7
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Fifth Edition (Exam N10-007)Copyright © 2018 by McGraw-Hill Education. All rights reserved.Figure 2.49 OSI model and TCP/IP model side by side
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Fifth Edition (Exam N10-007)Copyright © 2018 by McGraw-Hill Education. All rights reserved.Application layer: create the dataTransport layer: breaks the data into chunks, i.e., into TCP/UDP segmentsInternet layer: adds the IP addressing and creates the IP packetsLink layer: wraps the IP packet into a frame, with the MAC address information and a frame check sequence (FCS)Frames, Packets, and Segments/Datagrams, Oh My!
Background image
M ike M eyers’ CompTIA Network+®Guide to M anaging and Troubleshooting Networks, Fifth Edition (Exam N10-007)Copyright © 2018 by McGraw-Hill Education. All rights reserved.
Background image