Network Standards: (The Osi Reference Model & Ieee 802.X Standard)
Network Standards: (The Osi Reference Model & Ieee 802.X Standard)
NETWORK STANDARDS
(THE OSI REFERENCE MODEL & IEEE 802.x Standard)
Standards have, in fact, been responsible for the success and growth of both the
computer and networking products industries.
1
4. 2. The OSI Reference Model
The International Organization for Standardization (ISO) is a Paris-based
organization of member countries, each of which is represented by its leading
standard-setting organization. For example, American National Standards
Institute (ANSI) represents the United States, and the British Standards
Institution (BSI) represents the United Kingdom. Other organizations represented
at the ISO include:
Governmental bodies such as the U.S. State Department.
Businesses.
Educational institutes.
Research organizations. etc
The ISO works to establish international standardization of all services and
manufactured products.
In the area of computing, the ISO's goal is to establish global standards for
communications and information exchange. The standards will promote open
networking environments that let multivendor computer systems communicate with
one another using protocols that have been accepted internationally by the ISO
membership.
The ISO's major achievement in the area of networking and communications has
been to define a set of standards, known as the OSI (Open Systems
Interconnection) reference model which defines standards for the interaction of
computers connected by communications networks.
The OSI original document applied to systems that were open to each other
because they could all use the same protocols (the procedures used to control the
orderly exchange of information between stations on a data communication
network) and standards to exchange information.
The OSI reference model is the best-known and most widely used guide for
visualizing networking environments. Manufacturers adhere to the OSI reference
model when they design network products. It provides a description of how
network hardware and software work together in a layered fashion to make
communications possible. The model also helps to troubleshoot problems by
providing a frame of reference that describes how components are supposed to
function.
The main objective of dividing into seven layers include creating a manageable
layers by breaking down the complex network operations and allowing specialization
of research and development on each component of the OSI layer.
2
In general, the Benefits of the OSI Reference model is given below
Reduces complexity
Standardizes interfaces
Accelerates evolution
Client A Client B
3
The user interfaces with the computer
Provides network services to application processes
such as Electronic mail, file transfer, database
access
Initiates a request or accepts a request to send a
packet
4
Network Layer - Layer 3
5
In short, the logical presentation of the seven layers is shown in the diagram
below.
ClientA ClientB
At each layer, information relevant to that layer is added to the data. This information is
for the use of the corresponding layer in the receiving computer. The data-link layer in
the receiving computer, for instance, will read information added at the data-link layer in
the sending computer. The figure below shows the assembly of a packet in the sending
workstation and the disassembly of the packet in the receiving workstation.
6
igure 4 packet assembly/encapsulation and disassembly/decapsulation
process in the OSI model
At the transport layer, the original block of data is broken into the actual packets. The
protocol defines the structure of the packets used by the two computers.
When the packet reaches the transport layer, sequence information is added that guides
the receiving computer in reassembling the data from packets.
7
When the packets finally pass through the physical layer on their way to the cable, they
contain information from each of the other six layers.
Project 802 defined network standards for the physical components of a network (the
interface card and the cabling) that are accounted for in the physical and data-link layers
of the OSI reference model.
The 802 specifications define the ways NICs access and transfer data over physical
media. These include connecting, maintaining, and disconnecting network devices.
NOTE : Choosing which protocol to run at the data-link layer is the single most important
decision you make when designing a LAN. This protocol defines the speed of the network,
the method used to access the physical network, the types of cables you can use, and the
NICs and drivers you install.
The IEEE 802 project incorporated the specifications in those two layers to create standards that
have defined the dominant LAN environments. Figure 6 shows the data-link layer and its two
sublayers.
After deciding that more detail was needed at the data-link layer, the 802 standards committee
divided the data-link layer into two sublayers:
Logical Link Control (LLC) Establishing and terminating links, controlling frame
traffic, sequencing frames, and acknowledging frames
Media Access Control (MAC) Managing media access, delimiting frames, checking
frame errors, and recognizing frame addresses
This defines how packets are placed on the media (cable). Contention media (Ethernet) access is
first come first served access where everyone shares the same bandwidth. Physical addressing is
defined here. What's Physical addressing? It's simple.
You will come across 2 addressing terms, 1)Logical addressing 2)Physical addressing.
9
Logical addressing is basically the address which is given by software e.g IP address. When you
get an IP address, this is considered a "logical address" which is provided to you after your
TCP/IP stack is loaded.
Physical addressing is an address which is given not by the software, but the hardware. Every
network card has a "MAC" address which is burnt into the card's eprom (a special memory chip)
and this special address is used to uniquely identify your computer's network card from all the
others on the network.
This sublayer is responsible for identifying Network layer protocols and then encapsulating them
when they are about to be transmitted onto the network or decapsulate them when it receives a
packet from the network and pass it onto the layer above it, which is the Network layer. An LLC
header tells the Datalink layer what to do with a packet once a frame is received. For example, a
host (computer) will receive a frame and then look in the LLC header to understand that the
packet is destined for the IP protocol at the Network layer. The LLC can also provide flow
control and sequencing of control bits.
The LLC sublayer manages data-link communication and defines the use of logical interface
points called service access points (SAP). Other computers can refer to and use SAPs to transfer
information from the LLC sublayer to the upper OSI layers. Category 802.2 defines these
standards.
As Figure 7 indicates, the MAC sub layer is the lower of the two sublayers, providing shared
access to the physical layer for the computers' NICs. The MAC layer communicates directly with
the NIC and is responsible for delivering error-free data between two computers on the network.
Categories 802.3, 802.4, 802.5, and 802.12 define standards for both this sublayer and OSI layer
1, the physical layer.
IEEE 802 standards categories are listed in the left column. The right column represents the
description of what each category represents.
10
802.x Standard Basis for standard
802.1 Internetworking
802.2 Logical Link Control (LLC) sublayer
802.3 CSMA/CD Ethernet
802.4 Token Bus LAN
802.5 Token Ring LAN
802.6 Metropolitan Area Networks (MAN)
802.7 Broadband technologies
802.8 Fiber-optic technologies
802.9 Hybrid voice/data networks
802.10 Network security
802.11 Wireless networks
802.12 High-speed LANs
802.13 Unused.
802.14 Defines cable modem standards.
802.15 Defines wireless personal area networks (WPAN).
802.16 Defines broadband wireless standards.
You see, the IP address of a machine exists on the 3rd Layer of the OSI model and, when a
packet reaches the computer, it will travel from Layer 1 upwards, so we need to be able to
identify the computer before Layer 3.
11
This is where the MAC address - Layer 2 comes into the picture. The Physical Layer understands
the electrical signals on the network and creates the frame which gets passed to the Datalink
layer. If the packet is destined for the computer then the MAC address in the destination field of
the packet will match, so it will accept it and pass it onto the Layer above (3) which, in turn, will
check the network address of the packet (IP Address), to make sure it matches with the network
address to which the computer has been configured.
When looking at a MAC address, you will always see it in HEX format. It is very rare that a
MAC address is represented in Binary format because it is simply too long.
When a vendor, e.g Intel, creates network cards, they don't just give them any MAC address they
like, this would create a big confusion in identifying who created this network card and could
possibly result in clashing with another MAC address from another vendor e.g D-link, who
happened to choose the same MAC address for one of their network cards !
To make sure problems like this are not experienced, the IEEE group split the MAC address in
half, and used the first half to identify the vendor, and the second half is for the vendor to allocate
as serial numbers:
The Vendor code is specified by RFC - 1700. You might find a particular vendor having more
than just one code; this is because of the wide range of products they might have. They just apply
for more, as they need !
Keep in mind that even the MAC address is "burnt-in" to the network card's memory, some
vendors will allow you to download special programs to change the second half of the MAC
address on the card. This is because the vendors actually reuse the same MAC addresses for their
network cards because they create so many that they run out of numbers ! But at the same time,
the chances of you buying two network cards which have the same MAC address are so small
that it's almost impossible !
12