1. Trang chủ
  2. » Kỹ Thuật - Công Nghệ

Tài liệu Managing TCP/IP Networks P2 docx

20 329 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề The ISO reference model
Định dạng
Số trang 20
Dung lượng 168,37 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

However, since the TCP/IP protocol suite has a layered structure, we will ®rst examine the ISO Reference Model and the subdivision of its second layer by the Institute of Electrical and

Trang 1

Now that we have an appreciation for the evolution of the Internet and the TCP/IP protocol suite, let us turn our attention to the structure of the protocol suite However, since the TCP/IP protocol suite has a layered structure, we will ®rst examine the ISO Reference Model and the subdivision

of its second layer by the Institute of Electrical and Electronic Engineers (IEEE) to provide a standardized frame of reference

2.3 THE ISO REFERENCE MODEL

The International Organization for Standardization is an agency of the United Nations headquartered in Geneva, Switzerland The ISO is tasked with the development of worldwide standards to facilitate the international exchange

of goods and services The membership of the ISO consists of the national standards organization of most countries, with over 100 countries participat-ing in its work One of the most notable achievements of the ISO in the ®eld of data communications was its development of the seven-layer Open Systems Interconnection (OSI) Reference Model This model de®nes the communica-tions process as a set of seven layers, with speci®c funccommunica-tions isolated and associated with each layer

Figure 2.2 illustrates the seven layers of the ISO Reference Model Each layer covers lower layer processes, effectively isolating them from higher layer functions In this way, each layer performs a set of functions necessary to provide a set of services to the layer above it Layer isolation permits the characteristics of a given layer to change without impacting the remainder of the model, provided that the supporting services remain the same This layering was developed as a mechanism to enable users to mix and match OSI-conforming communications products to tailor their communications systems to satisfy a particular networking requirement Although OSI-conforming communications products never gained a signi®cant degree of acceptance, the OSI Reference Model provides a framework for comparing

Figure 2.2 The International Organization for Standardization (ISO) Open System Interconnection (OSI) Reference Model

Trang 2

and contrasting the features and structure of other protocol suites In addition, by understanding the structure of the model and the subdivision of its second layer by the IEEE, we can also obtain an appreciation of the capabilities and limitations of other protocol suites as well as the manner by which those suites support data ¯ow from source to destination

2.3.1 Layers of the OSI Reference Model

With the exception of layers 1 and 7, each layer in the ISO Reference Model is bounded by the layers above and below it Layer 1, the physical layer, which

is responsible for moving bits in electrical or optical form, can be considered

to be bound below by the interconnecting medium over which transmission

¯ows In comparison, layer 7 is the upper layer and has no upper boundary Within each layer is a group of functions that can be viewed as providing a set

of de®ned services to the layer that bounds it from above, resulting in layer n using the services of layer n-1 To obtain an appreciation of the manner in which the ISO's Reference Model operates, let us turn our attention to each of the layers in the model

Layer 1: the physical layer

At the lowest or most basic layer, the physical layer represents a set of rules that speci®es the electrical, optical, and physical connection between devices and the transmission medium Typically, the physical layer can include the coding method by which data is placed onto the medium as well as the cabling interface to include the operation of different pins on the cabling connection

Layer 2: the data link layer

The data link layer de®nes how a device gains access to the medium speci®ed

by the physical layer as well as the data formats to include framing, error control procedures, and other link control activities The data format speci®cation includes procedures employed to correct transmission errors, thus, layer 2 becomes responsible for the reliable delivery of information

At the data link layer information is grouped into entities referred to as frames As a minimum, each frame contains control information that enables the receiver to synchronize itself to an incoming frame, addressing information that identi®es the source and destination, a ®eld containing the actual information being transmitted from source to destination, and a

®eld used for verifying the integrity of the data

One important characteristic of data link protocols is the fact that they do not have network addresses and as such are non-routable As we will note later in this chapter, Ethernet, Token-Ring, and FDDI represent examples of data link protocols

Trang 3

Because the development of OSI layers was originally targeted towards wide area networking, its applicability to local area networks required a degree of modi®cation Under IEEE 802 standards, the data link layer was subdivided into two sublayers: Logical Link Control (LLC) and Media Access Control (MAC) The LLC layer is responsible for generating and interpreting commands that control the ¯ow of data and perform recover operations in the event of errors In comparison, the MAC layer is responsible for providing access to the local area network, which enables a station on the network to transmit information Later in this chapter we will discuss the subdivision in additional detail

Layer 3: the network layer

The third layer in the ISO Reference Model is the network layer As its name implies, this layer is responsible for arranging a logical connection through a network to include the selection and management of a route for the ¯ow of information between source and destination based upon the available paths

in a network Services provided by this layer are associated with the movement of data packets through a network, including addressing, routing, switching, sequencing, and ¯ow control procedures In a complex network, the source and destination may not be directly connected by a single path, but instead require a path to be established that consists of many subpaths Thus, routing of data through the network onto the correct paths is an important feature of this layer

Several protocols represent commonly used layer 3 protocols Those protocols include the X.25 packet protocol, which governs the ¯ow of information within a packet network, Novell's Internet Packet Exchange (IPX), and the Internet Protocol (IP)

Layer 4: the transport layer

The fourth layer in the ISO's Reference Model is the transport layer This layer

is responsible for guaranteeing that the transfer of information occurs correctly after a route has been established by the network layer protocol Thus, the primary function of this layer is to control the communications session between nodes once a path has been established by the network control layer Error control, sequence checking, and other end-to-end data reliability factors are the primary concern of this layer In addition, to support the transfer of different types of data between source and destination, this layer is also responsible for multiplexing and de-multiplexing data streams between upper layer application processes

Although most transport layer protocols provide an end-to-end reliability mechanism, this is an optional feature associated with this layer Similarly, although most transport layer protocols are connection-oriented, requiring the destination to acknowledge its ability to receive data prior to a transmission session being established, this is also an optional feature

Trang 4

Instead of operating as a connection-oriented protocol, a transport layer protocol can operate on what is referred to as a best-effort basis This means that the protocol will initiate transmission without knowing if the destination

is ready to receive data or even if it is powered on and operational Although this method of operation may appear awkward, the originator will set a timer that decrements in value If no response is received to the initial packet ¯ow

by the time the timer expires, the originator will assume that the destination

is not reachable and terminate the session The use of a connectionless protocol avoids the relatively long handshaking process associated with some connection-oriented transport layer protocols Examples of transport layer protocols include Novell's Sequenced Packet Exchange (SPX) as well as the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) TCP is a connection-oriented, error-free delivery protocol In comparison, UDP is a connectionless, best effort protocol

Layer 5: the session layer

The ®fth layer in the OSI Reference Model is the session layer This layer provides a set of rules for establishing and terminating data streams between nodes in a network The services that the session layer can provide include establishing and terminating node connections, ¯ow control, dialogue control, and end-to-end data control

Layer 6: the presentation layer

The sixth layer in the ISO's OSI Reference Model is the presentation layer This layer is primarily responsible for formatting, data transformation, and syntax-related operations One of the primary functions of this layer that is both visible and probably overlooked as we take it for granted is the conversion of transmitted data at the receiver into a display format for a receiving device Concerning the receiving device, different presentation layers reside on different devices, since the manner in which data is displayed on a PC would more than likely differ from the manner in which data is displayed on a dumb terminal Other functions that can be performed

by the presentation layer include encryption/decryption and compression/ decompression

Layer 7: the application layer

The seventh and top layer of the OSI Reference Model is the application layer This layer can be viewed as functioning as a window through which the application gains access to all of the services provided by the seven-layer model Examples of functions that can be performed at the application layer include ®le transfer, electronic mail transmission, and remote terminal access

Trang 5

While the ®rst four layers in the Reference Model are fairly well de®ned, the functions associated with the upper three layers can vary considerably, based upon the application, the type of data transported, and the manner in which the attributes of the display of a device are used for the presentation of information As we will note later in this chapter, such popular Internet protocols as the File Transfer Protocol (FTP), Telnet, and the HyperText Transport Protocol (HTTP) represent a blend of layer 5 through layer 7 functions

2.3.2 Data ¯ow

As data ¯ows within an ISO network each layer appends appropriate heading information to frames of information ¯owing within the network while removing the heading information added by a lower layer In this manner, layer n interacts with layer n-1 as data ¯ows through an ISO network Figure 2.3 illustrates the appending and removal of frame header information as data ¯ows through a network constructed according to the ISO Reference Model Since each higher level removes the header appended

by a lower level, the frame traversing the network arrives in its original form

at its destination

2.3.3 Layer subdivision

Prior to examining the major components of the TCP/IP protocol suite, a discussion of layer subdivision resulting from the efforts of the Institute of Electrical and Electronic Engineers (IEEE) is in order The IEEE is responsible for developing LAN standards in the USA, and its efforts are commonly incorporated by the American National Standards Institute (ANSI) into US standards, either as is or with slight modi®cation

During the early development of LAN standards, the IEEE recognized that it would be desirable to subdivide the data link layer The result of this subdivision was the creation of Logical Link Control (LLC) and Media Access Control (MAC) sublayers The MAC sublayer, which resides at the bottom of the portion of the data link layer that was subdivided, de®nes the manner by which a station gains access to a LAN Examples of MAC methods include Ethernet's Carrier Sense Multiple Access/Collision Detection (CSMA/CD) scheme and Token-Ring's free token acquisition method Above the MAC layer, which differs for each type of LAN, is the LLC layer The LLC layer, which is common for each IEEE network, is used for controlling the establishment, maintenance, and termination of logical connections between stations on a network

Addressing

Access to an IEEE network is accomplished through the MAC layer Frames placed on an IEEE network include two address-related ®elds: destination and source address Each address normally represents a 6-byte address burnt into read-only memory (ROM) on the network adapter card of the frame

Trang 6

2.3 THE ISO REFERENCE MODEL 23

Trang 7

originator (source address) and the frame recipient (destination address) The

®rst three bytes of the 6-byte network adapter card address are assigned by the IEEE to an adapter card manufacturer, and represent the manufacturer identi®cation (ID) portion of the address The next three bytes are used by the adapter card manufacturer to uniquely identify each adapter card that it manufactures If the manufacturer is so successful that it runs out of its allocated 3-byte sequence of numbers, it will request another manufacturer

ID from the IEEE and use that ID for producing a new series of network adapter cards

Figure 2.4 illustrates the general format of an IEEE Mac address When used as a source address, a bit composition of all binary 1s represents a broadcast address and results in each station copying the contents of the frame off the network Depending upon the type of LAN, the setting of different bits within the 6-byte source MAC address can be used to identify different groups Then, each workstation associated with the group identi®er would copy the frame off the network If the frame's destination address is neither a broadcast nor a group address, it will only be copied off the network by the station whose adapter address matches the destination address in the frame

Universally vs locally administered addresses

Two types of addresses can be associated with stations on an IEEE network: universally administered and locally administered When a burnt-in ROM address is used, it is referred to as a universally administered address, as it is uniquely assigned by the IEEE In comparison, a second type of address results from the effort of a LAN administrator or network manager to override the universally administered address This second type of MAC address results from the creation of a batch ®le statement being used to set a locally generated address that overrides the burnt-in ROM address Because this address is developed locally, it is referred to as a locally administered address Note that, regardless of the type of MAC address, it is a layer 2 address that is 48 bits in length Because TCP/IP addresses are 32 bits in length (IPv4) and represent both a network address and a host address on a network, a translation process is required to associate a layer 3 IP address to

a layer 2 MAC address Later in this book we will examine the address resolution process that performs the required translation

2.4 THE TCP/IP PROTOCOL SUITE

In the previous section we have an overview of the functions of the seven layers in the ISO Reference Model to provide a frame of reference when examining the TCP/IP protocol suite In actuality, TCP/IP represents one of the earliest developed layered protocol suites and preceded the development

of the ISO's OSI Reference Model by approximately 20 years Although it predates the OSI Reference Model, we can obtain an appreciation of the protocol suite by comparing it with that model

Trang 8

2.4.1 Comparison with the ISO Reference Model

Similar to the ISO Reference Model, the TCP/IP protocol suite is subdivided into distinct layers, commencing at the network layer Although the protocol suite does not include equivalents to the lower two layers of the ISO Reference Model, it does provide a mechanism to translate addressing from the network layer of the reference model to MAC addresses used by LANs at the lower portion of the data link layer This enables the TCP/IP protocol suite to use the physical layer supported by different LANs

A second key difference between the ISO Reference Model and the TCP/IP protocol suite occurs at the top of the suite TCP/IP applications can be considered to represent the equivalent of layers 5 through 7 of the OSI Reference Model Based upon the preceding, Figure 2.5 provides a general comparison of the TCP/IP protocol suite with the ISO Reference Model Note that, as previously mentioned, the TCP/IP protocol suite commences at the equivalent of layer 3 of the ISO Reference Model Thus, the dashed lines surrounding Ethernet, Token-Ring, and FDDI layer 2 protocols and their physical layers indicate that they are not actually part of the TCP/IP protocol suite Instead, the Address Resolution Protocol (ARP), which can be viewed as

a facility of the Internet Protocol (IP), provides the translation mechanism that enables IP addressed packets to be correctly delivered to workstations that use MAC addresses In fact, the TCP/IP protocol suite can also run over ATM, with a special type of address resolution used to resolve IP to ATM addresses Thus, address resolution enables the TCP/IP protocol suite to be transported by other protocols and use the physical layer speci®ed by those protocols

Now that we have an appreciation for the general relationship between the TCP/IP protocol stack and the ISO's Open System Interconnection Reference Model, let's turn our attention to the actual layers of the protocol suite

The network layer

The Internet Protocol (IP) represents the network layer protocol employed by the TCP/IP protocol suite IP packets are formed by the addition of an IP header to the layer 4 protocol data entity, which is either the Transport Control Protocol (TCP) or the User Datagram Protocol (UDP)

IP headers contain 32-bit source and destination addresses that are normally subdivided to denote a network address and host address on the

Figure 2.4 The IEEE MAC address format

Trang 9

network In actuality, the host address is really an interface on the network, since a host can have multiple interfaces, with each having a distinct address However, over the years the terms host address and interface address have been used synonymously Ð although this is not technically correct In Chapter 3 we will examine the IP header in detail

ICMP

The Internet Control Message Protocol (ICMP) represents a diagnostic testing and error reporting mechanism that enables devices to generate various types of status and error reporting messages Two of the more popularly employed ICMP messages are the Echo Request and Echo Response packets generated by the Ping application

Although Figure 2.5 indicates that ICMP is a layer 3 protocol, from a technical perspective an ICMP message is formed by the addition of an IP header to an ICMP message with the Type ®eld within the IP header set to indicate it is transporting an ICMP message When we examine IP in Chapter

3, we will also turn our attention to the Internet Message Protocol

The transport layer

The designers of the TCP/IP protocol suite recognized that two different types

of data delivery transport protocols would be required This resulted in two transport protocols supported by the protocol suite

TCP TCP is a reliable, connection-oriented protocol used to transport appli-cations that require reliable delivery and for which actual data should not be Figure 2.5 Comparing the TCP/IP Protocol Suite with the ISO Reference Model

Trang 10

exchanged until a session is established From Figure 2.5you will note that FTP, Telnet, SMTP, and HTTP are transported byTCP

Because TCP is a connection-oriented protocol, this means that actual data will not be transferred until a connection is established While this makes sense when you are transmitting a ®le or Web pages, it also delays actual data transfer

UDP A second transport protocol supported by the TCP/IP protocol suite is UDP UDP represents a connectionless protocol that operates on a best e¡ort basis This means that instead of waiting for con¢rmation that a destination is available, UDP will commence actual data transfer, leaving it to the application

to determine if a response was received Examples of applications that use UDP include SNMP, NFS, and BOOTP

The use of UDP and TCP results in the pre®x of an appropriate header to application data When TCP is used as the transport layer protocol, the TCP header and application data are referred to as a TCP segment When UDP is used as the transport layer protocol, the UDP header and application data transported by UDP is referred to as a UDP datagram

Port numbers BecauseTCP and UDP were designed to transport multiple types

of application data between a source and the same or di¡erent destinations, a mechanism was needed to distinguish one type of application from another This mechanism is obtained by port number ¢elds contained inTCP and UDP headers and explains how a Web server can also support FTP and other appli-cations In Chapter 4 we will turn our attention to the composition of TCP/IP transport protocol headers and the use of di¡erent port numbers

2.4.3 Application data delivery

In concluding this chapter we will examine the use of TCP/IP and LAN headers to facilitate the delivery of application data from a host on one

Figure 2.6 LAN delivery of TCP/IP application data

Ngày đăng: 23/12/2013, 17:15

TỪ KHÓA LIÊN QUAN

w