Академический Документы
Профессиональный Документы
Культура Документы
Understanding the
Seven Layers of Computer Networks
Introduction
1
Common networking components
that function at layer 2 include:
Network interface cards
Ethernet and Token Ring switches
3
Bridges
Bridges and switches function in
a similar fashion; however,
bridging is normally a software
program on a CPU,
while switches use Application-
Specific Integrated Circuits
(ASICs) to perform the task in
dedicated hardware, which is
2 much faster.
NICs have a layer 2 or MAC
address.
A switch uses this address to filter
and forward traffic, helping
relieve congestion and collisions
on a network segment.
Layer 3 The Network Layer
6
5
When passing packets between different
networks, it may become necessary to
adjust their outbound size to one that is
compatible with the layer 2 protocol that is
being used.
Layer 3 The Network Layer
7
Two of the additional functions of the network
layer are diagnostics and the reporting of
logical variations in normal network
operation.
While the network layer diagnostics may be
8
initiated by any networked system, the
Some basic security
system discovering the variation reports it to
functionality can also be set
the original sender of the packet that is
up by filtering traffic using
found to be outside normal network
layer 3 addressing on routers
operation.
or other similar devices.
The variation reporting exception is content
validation calculations. If the calculation
done by the receiving system does not
match the value sent by the originating
system, the receiver discards the related
packet with no report to the sender.
Retransmission is left to a higher layers
protocol.
Layer 4 The Transport Layer
Functionality includes:
Virtual connection between
application entities
Synchronization of data flow
Creation of dialog units
Connection parameter
negotiations
Partitioning of services into
functional groups
Layer 5, the session layer, provides Acknowledgements of data
various services, including tracking the received during a session
number of bytes that each end of the
session has acknowledged receiving Retransmission of data if it is
from the other end of the session. not received by a device
This session layer allows applications
functioning on devices to establish,
manage, and terminate a dialog
through a network.
Layer 6 The Presentation Layer
Examples of presentation
layer functionality
include:
Encryption and decryption of
a message for security
Compression and expansion
of a message so that it travels
efficiently
Layer 6, the presentation layer, is
responsible for how an application Graphics formatting
formats the data to be sent out onto Content translation
the network.
System-specific translation
The presentation layer basically
allows an application to read (or
understand) the message.
Layer 7 The Application Layer
TCP/IP LAYERS
networking protocol
that use those seven 5 HOST TO HOST
layers, most networks
LAYER
OSI
today use TCP/IP. 4
But, networking
professionals 3 INTERNET LAYER
continue to describe
networking functions
in relation to the OSI 2 NETWORK ACCES
layer that performs
those tasks. LAYER
1
TCP/IP Model Overview
The TCP/IP model Things get a bit more The TCP/IP process
uses four layers to complicated at the layer, when used with
perform the functions host-to-host layer of TCP, provides the
of the seven-layer the TCP/IP model. functions of the OSI
OSI model. models presentation
If the host-to-host and application
The network access protocol is TCP, the layers (6 and 7).
layer is functionally matching
equal to a functionality is found When the TCP/IP
combination of OSI in the OSI transport transport layer
physical and data and session layers (4 protocol is UDP, the
link layers (1 and 2). and 5). process layers
functions are
The Internet layer Using UDP equates to equivalent to OSI
performs the same the functions of only session, presentation,
functions as the OSI the transport layer of and application
network layer (3). the OSI model. layers (5, 6, and 7).
Equipment at the Layers