CCNA Exam Cram[tm] 2 (Exams 640-821, 640-811, 640-801)
The OSI reference model breaks network communication into seven distinct layers. These layers are then divided into upper layers and lower layers, and one layer is further divided into two sub-layers. To further confuse things, the layers are often referred to by their name , number, or a combination of both. All of this can be a bit confusing, but if you keep the following points in mind, eventually it will become clearer:
The description of the OSI model in this chapter is consistent with what you will find on the test. Pay particular attention to any areas that conflict with your understanding of the model. If you are sure your understanding is correct, remember the two rules for passing a Cisco certification exam: Rule #1 ” Cisco's interpretation is correct. Rule # 2 ” If Cisco's interpretation is not correct, see rule number one. Layer One, the Physical Layer
The major function of this Physical layer is to place data on the network medium and ensure that the medium is capable of carrying that data. The type and gauge of wire, voltage levels, connectors, maximum distances, and other specifications for the medium are all found at this layer. The Physical layer is the lowest layer in the OSI model and as such is part of the OSI lower layers. (See Figure 2.1.) Figure 2.1. The seven layers of the OSI model.
Figure 2.1 shows the seven layers of the OSI model as you will see it on the test. The Application layer or Layer 7 (the layer names and numbers are used interchangeably) is always at the top with the other layers listed in descending order. This figure also breaks the OSI model into upper layers and lower layers . Layer 2, the Data Link Layer
The Data Link layer or Layer 2 is responsible for low-level error-free communication between two network devices or nodes. The Data Link layer is a part of the lower layers and the only layer that is broken into sub-layers . Sub-layers are always referred to by their name or initials and do not have a number. The Media Access Control ( MAC ) sub-layer is the lower of these two sub-layers, and is extremely important because it defines the addressing used by the nodes of all networks. Every device or node attached to a network is required to have a unique MAC address . Fortunately each device also requires a Network Interface Card ( NIC ) to physically attach to a network and this is where the MAC address resides. The address is actually burned into a chip on the NIC by the manufacturer, which brings up an interesting question: How do the numerous manufacturers of NICs know that the MAC address they are using is unique? The MAC sub-layer specifies a way to ensure uniqueness. MAC addresses are 48 bits long and usually written as three groups of hexadecimal digits, like this:
081F.E453.5547 The first 24 bits (6 digits) is unique vendor code given to the manufacturer. The last 24 bits (6 digits) is assigned by the manufacturer as a serial number. So long as everybody plays by the rules, any complete MAC address will be unique. The Logical Link Control ( LLC ) sub-layer rests on top of the MAC sub-layer and provides the functionality required for connectionless and connection-oriented communication. LLC is the layer where protocol types are identified and where they can be encapsulated. Connection-oriented communication is much like a telephone circuit, which is set up at the beginning of a conversation, maintained throughout the conversation, and then released at the end of the conversation. Connectionless communication is done on a frame-by-frame basis. Because each frame is autonomous, no link is established or maintained . Connectionless communication is faster than connection-oriented, but not quite as reliable. Each provides a way for upper-layer protocols to share transmission media, which is the main function of the LLC layer. Layer 3, the Network Layer
Path determination and switching packets between networks are the primary functions performed at Layer 3, which is also considered a lower layer. However, before these functions can be performed, a structure of network addressing must be established. Layer 2 already provides MAC addresses for every node on a network, so why do we need another addressing function at Layer 3? The reason is that MAC addressing uses a flat structure and is limited as to the number of addresses available. If we tried to use MAC addresses for communication across all networks, we would quickly run out of unique addresses or the addresses themselves would have to be so large as to be unusable. A higher level of addressing structure is clearly needed and that is provided by a Layer 3 routable protocol . There are several routable protocols available, including Internet Protocol (the IP portion of TCP/IP), Novell's Internet Packet Exchange (IPX), and AppleTalk from Apple Computers. Each will provide a network addressing scheme and use packets that have a field for network addresses.
Layer 4, the Transport Layer
The Transport layer is part of the lower layers of the OSI model. Establishing end-to-end connection-oriented communications, dividing upper layer communications into autonomous segments, and ensuring reliable data flow are all services provided by the Transport layer. Layer 5, the Session Layer
The Session layer establishes, manages , and terminates communications by coordinating service requests and responses between two or more stations . Sun's Network File System ( NFS ) and IBM's Structured Query Language ( SQL ) are representative of protocols used at the Session layer.
Layer 6, the Presentation Layer
The Presentation layer ensures that information delivered to the Application layer is readable and in the proper format. This includes the functions of data encryption/decryption, data compression/ decompression , and data representation. Examples of data formats used at the Presentation layer include ASCII, EBCDIC, MIDI, MPEG, JPEG, and GIF to name a few. Layer 7, the Application Layer
The Application layer is at the top of the OSI stack and closest to user applications. User applications providing communication functionality are considered part of the Application layer. A word processing application by itself would not be part of the Application layer. However, if the word processor provided email capabilities, it would definitely be included in Layer 7.
|