BN.com Gift Guide

Networking Essentials Exam Guide

Overview

Written by a team of experts and reviewed by Microsoft, this book/CD-ROM set is a complete training guide for those studying to pass the Networking Essentials exam--a key test required for MCSE certification. It's a must-have resource for programmers, consultants, MIS staff, expert users, and networking system administrators wanting to build a solid understanding of the networking architecture and standards.
  • Each chapter contains core information, instructor notes, study tips, ...
See more details below
Available through our Marketplace sellers.
Other sellers (Hardcover)
  • All (5) from $1.99   
  • New (2) from $60.00   
  • Used (3) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$60.00
Seller since 2014

Feedback rating:

(193)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$60.00
Seller since 2014

Feedback rating:

(193)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Written by a team of experts and reviewed by Microsoft, this book/CD-ROM set is a complete training guide for those studying to pass the Networking Essentials exam--a key test required for MCSE certification. It's a must-have resource for programmers, consultants, MIS staff, expert users, and networking system administrators wanting to build a solid understanding of the networking architecture and standards.
  • Each chapter contains core information, instructor notes, study tips, and sidebars that highlight pertinent information and help clarify difficult concepts
  • Covers all tested areas and includes case study questions to help users build real-world savvy while studying
  • CD-ROM contains integrated skills assessment tests, chapter review tests, and a final exam to effectively prepare users for the actual test
Read More Show Less

Editorial Reviews

Booknews
A book/CD-ROM aid to preparing for the Networking Essentials Microsoft Certified Systems Engineer Exam, presenting essential information on installing and supporting computer networks. Sequential chapters include skills prerequisites, key concepts, notes, and tips. Appendices offer lab exercises arranged by topic, sample tests, a glossary, a certification checklist, testing tips, Microsoft contacts, and print and electronic resources. The CD-ROM contains review questions and a practice final exam. Assumes familiarity with computers, their components, and Windows products. Annotation c. by Book News, Inc., Portland, Or.
Read More Show Less

Product Details

  • ISBN-13: 9780789711939
  • Publisher: Macmillan Computer Publishing
  • Publication date: 6/28/1997
  • Pages: 827
  • Product dimensions: 7.66 (w) x 9.45 (h) x 2.30 (d)

Table of Contents








[Figures are not included in this sample chapter]


Networking Essentials Exam Guide


Contents



  • Introduction

    • Benefits for Your Organization
    • Personal Benefits For You
    • How to Use This Networking Essentials Exam Guide to Prepare for the Exam
    • How to Study with This Book
    • How This Book Is Organized
    • Special Features of This Book






  • Chapter 1 - Microsoft Certified Professional Program

    • Exploring Available Certifications
    • Understanding the Exam Development Process
    • Microsoft Certified Systems Engineer Core Exams
    • Electives for the Microsoft Certified Systems Engineers
    • Continuing Certification Requirements






  • Chapter 2 - Introduction to Networks

    • Why Should You Use Networks?
    • Network Terminology
    • Types of Networks
    • Types of Servers
    • Network Media
    • Summary
    • Taking the Disc Test
    • From Here...






  • Chapter 3 - The OSI Reference Model

    • The Need for a Conceptual Framework
    • Layered Networking
    • The Seven Layers of the OSI Reference Model
    • IEEE 802 Enhancements to the OSI Model
    • Real-World Application of the OSI Reference Model
    • Summary
    • Taking the Disc Test
    • From Here...






  • Chapter 4 - Network Topology

    • What Is a Topology?
    • Bus Topology
    • Star Topology
    • Ring Topology
    • Hybrid Networks
    • Choosing the Appropriate Topology
    • Summary
    • Taking the Disc Test
    • From Here...






  • Chapter 5 - The Physical Connection

    • Making the Connection
    • Twisted-Pair Cable
    • Coaxial Cable
    • Fiber-Optic Cable
    • Choosing the Right Cable
    • Summary
    • Taking the Disc Test
    • From Here...






  • Chapter 6 - Wireless Connections

    • The Lure of Wireless Media
    • The Electromagnetic Spectrum
    • Radio
    • Microwave
    • Infrared
    • Applications for Wireless Media
    • Looking to the Future
    • Summary
    • Taking the Disc Test
    • From Here...






  • Chapter 7 - Data Transmission

    • Network Interface Cards
    • Drivers
    • Getting Data on the Network
    • Summary
    • Taking the Disc Test
    • From Here...






  • Chapter 8 - Network Architecture

    • Ethernet
    • Token Ring
    • ARCnet
    • AppleTalk
    • FDDI
    • Summary
    • Taking the Disc Test
    • From Here...






  • Chapter 9 - Network Protocols

    • The Role of Protocols
    • Protocols
    • Configuring Protocols
    • The Role of NDIS and ODI
    • NetBIOS Name Resolution
    • Summary
    • Taking the Disc Test
    • From Here...






  • Chapter 10 - Network Operating Systems

    • Functions of a Network Operating System
    • Software Components
    • Network Services
    • Summary
    • Taking the Disc Test
    • From Here...

  • Chapter 11 - Network Applications

    • Applications in a Network Environment
    • Electronic Mail
    • Scheduling
    • Groupware
    • Shared Databases
    • Summary
    • Taking the Disc Test
    • From Here...






  • Chapter 12 - Remote Access

    • Modems
    • Types of Connections
    • Remote Access Software
    • Remote Communication Protocols
    • Security over Remote Connections
    • Summary
    • Taking the Disc Test
    • From Here...






  • Chapter 13 - Creating Larger Networks

    • LAN Expansion
    • Internetworking
    • Summary
    • Taking the Disc Test
    • From Here...






  • Chapter 14 - Wide Area Networks (WANs)

    • Overview of Wide Area Network Connectivity
    • Types of Connections
    • WAN Technologies
    • Summary
    • Taking the Disc Test
    • From Here...






  • Chapter 15 - The Internet

    • Origins of the Internet
    • Internet Services
    • The Domain Name System
    • Getting Connected to the Internet
    • Security and the Internet
    • Summary
    • Taking the Disc Test
    • From Here...






  • Chapter 16 - Network Administration

    • Administering a Network
    • Domains and Workgroups
    • Creating Users and Groups
    • Network Security
    • Summary
    • Taking the Disc Test
    • From Here...






  • Chapter 17 - Network Problem Prevention

    • Protecting Your Network
    • Documentation
    • Network Performance Monitoring
    • Backup Systems
    • Uninterruptible Power Supply
    • Fault-Tolerant Disk Storage
    • Disaster Recovery Plan
    • Summary
    • Taking the Disc Test
    • From Here...






  • Chapter 18 - Troubleshooting

    • Troubleshooting Overview
    • A Structured Approach
    • Troubleshooting Tools
    • Resources for Troubleshooting
    • Common Problems
    • Summary
    • Taking the Disc Test
    • From Here...






  • A - Glossary





  • B - Certification Checklist

    • Get Started
    • Get Prepared
    • Get Certified
    • Get Benefits






  • C - How Do I Get There from Here?

    • What Will I Be Tested On?
    • Analysis Is Good, but Synthesis Is Harder
    • Exam Objectives
    • What Kinds of Questions Can I Expect?
    • How Should I Prepare for the Exam?
    • How Do I Register for the Exam?






  • D - Testing Tips

    • Before the Test
    • During the Test
    • After the Test






  • E - Contacting Microsoft

    • Microsoft Certified Professional Program
    • Sylvan Prometric Testing Centers
    • Microsoft Sales Fax Service
    • Education Program and Course Information
    • Microsoft Certification Development Team
    • Microsoft TechNet Technical Information Network
    • Microsoft Developer Network (MSDN)
    • Microsoft Technical Support Options
    • Microsoft Online Institute (MOLI)






  • F - Suggested Resources

    • Titles from Que
    • Other Titles






  • G - Internet Resources

    • World Wide Web
    • Newsgroups






  • H - Using the CD-ROM

    • Using the Self-Test Software
    • Equipment Requirements
    • Running the Self-Test Software






  • I - Lab Exercises

    • Equipment Requirements
    • Lab 1: Installing and Configuring a Network Interface Card
    • Lab 2: Installing TCP/IP
    • Lab 3: Joining a Workgroup
    • Lab 4: Using Shared Folders
    • Lab 5: Using Shared Printers
    • Lab 6: Microsoft Networking from the Command Line
    • Lab 7: Administering User Accounts
    • Lab 8: Administering Group Accounts
    • Lab 9: Joining a Windows NT Domain
    • Lab 10: Implementing User-level Security
    • Lab 11: Establishing an Audit Policy
    • Lab 12: Monitoring Network Connections with Net Watcher
    • Lab 13: Using Performance Monitor
    • Lab 14: Backing Up Data






  • J - Sample Tests

    • Self-Assessment Test
    • Answer Key for Self-Assessment Test
    • Chapter Tests
    • Answer Key for Chapter Tests
    • Mastery Test
    • Answer Key for Mastery Test
    • Chapter - Index




Read More Show Less

First Chapter








[Figures are not included in this sample chapter]


Networking Essentials Exam Guide




- 3 -

The OSI Reference Model


This chapter introduces the Open Systems Interconnection (OSI) Reference Model
that will serve as a framework for discussion throughout this book. The OSI Model
will be described in detail in both a theoretical and real-world context.


Specific topics will include:


  • The need for a conceptual framework


  • The seven layers of the OSI Reference Model



  • IEEE enhancements to the OSI Model



  • Real-world applications of the OSI Model

The Need for a Conceptual Framework


Have you gone shopping for a computer recently? Or looked at advertisements for
computers? If so, you'll know that it is extremely easy to become completely overwhelmed
by the sheer number of options available. Different manufacturers make various models
with a whole range of capabilities. Yet, as you are swept away in the sea of acronyms
and computer jargon, some of it actually makes sense and ultimately you are able
to make some comparisons between computers.


Why? Well, if you think about it, most of us have an idea of what the basic components
of a personal computer are. For instance, your component list may resemble:




























  • Processor chip/CPU



  • Monitor



  • Memory/RAM



  • Keyboard



  • Hard-disk drive



  • Mouse



  • Floppy disk drive



  • Sound card



  • CD-ROM drive



  • Modem



  • Printer


Additionally, the processor is going to have a type (Pentium Pro, Pentium, 486, and
so on) and a clock speed (200MHz, 160MHz, and so on). The memory will be measured
in terms of megabytes, and the hard disk drive will be measured in terms of megabytes
or gigabytes.


You know all this because it is part of the reference model that you can use to
think about computers. This model allows you to compare different computers and have
some understanding as to their differences. It allows you to use a common notation
to describe computers.


Like the process of describing a computer, describing a network can be quite difficult.
Networks are by their very nature quite complex, and some framework is needed within
which to discuss their existence.


In the late 1970s, the International Standards Organization (ISO) began to develop
a theoretical network model. In 1978, the organization released the first version
of what was to become know as the Open Systems Interconnection (OSI) Reference Model.
In 1984, a revision was published that has now become an international standard and
the basis for most discussions of networking.





NOTE The term open systems relates to the fact that the model was designed
to allow connections between dissimilar computer systems. As such, it was not bound
by any one vendor's proprietary systems.



Layered Networking


The OSI Reference Model described networked communication as a series of layers.
To understand the concepts of layered communication, you should consider an example
of how communication can happen in the physical world.


Let's say that Fred is an executive with a large corporation in one city who would
like to send a document to Sally, an executive with the same corporation but in another
city.


The process on Fred's end might occur as follows:


1. Fred writes or dictates his document and passes it to his assistant.



2. His assistant types up the document.



3. The assistant then puts the document into an interoffice mail envelope,
addresses it, and leaves it out for pickup.



4. The internal mail clerk picks up the envelope and delivers it to the mail
room.



5. The mail room staff reads the address and determines whether the envelope
is for a local recipient or, if not, to which office the mail should be routed.



6. The staff determines how that mail should be delivered. Can it be sent
with a courier service? Should an overnight express service be used?



7. The staff then places the envelope inside another envelope for the appropriate
service.



8. They fill out whatever forms are necessary, determine how much it will
cost, and the appropriate payment options.



9. They arrange for a pickup of the package.

At this point the package enters the network of the transportation provider. In
most cases, it is probably brought to a central hub and then sent to a regional facility,
where ultimately it winds up in some van or truck being driven to Sally's location.


Now let's look at the process on Sally's end:


1. The package is delivered to the mail room at Sally's facility.



2. The mail room staff removes the outer envelope.



3. They determine who the mail is for and sort it into the appropriate pile
for delivery.



4. A mail clerk takes the mail for Sally's area, goes to that area, and starts
delivering envelopes.



5. Fred's envelope is delivered along with other mail to Sally's assistant.



6. Her assistant opens the mail and screens the material.



7. In the end, Fred's document is delivered to Sally.

All these steps are necessary simply to deliver a document. Yet through this layered
approach, documents do get delivered from office to office. Notice that there was
a sequence followed on both ends of the communication path. Several layers were involved
before the document even reached the transportation provider. Likewise, several layers
were involved after the package reached the destination building.

The Seven Layers of the OSI Reference Model


For a computer network, the OSI Reference Model breaks down the communication
into seven layers, as shown in Figure 3.1.



FIG. 3.1 The OSI Reference Model consists of seven layers.



At the top of the model in the Application Layer are the actual programs operated
by the computer users. A program of this type could be an e-mail package, database
program, or something as basic as the Windows File Manager or Explorer. On the bottom
is the Physical Layer comprised of the network media that makes the actual physical
connection between computers. In between lie all the layers that make the actual
communication occur.


Before discussing the individual layers, you should first understand a bit more
about how the model actually works.


Each computer on a network needs to have a protocol stack (sometimes referred
to as a protocol suite) which provides the software necessary for the computer to
communicate on the network. Common protocol stacks include:


  • The ISO/OSI protocol stack





  • TCP/IP (also known as the Internet protocol suite)





  • Novell NetWare





  • IBM's System Network Architecture (SNA)





  • Microsoft's NetBEUI





  • Apple's AppleTalk

These stacks are each comprised of several different protocols that perform the
functions of the various layers of the OSI Reference Model. For more information
about how different protocol stacks fit the OSI Reference Model, see "Real-World
Application of the OSI Reference Model" later in this chapter.


When an application sends information from one computer to another, that data
is passed down through the protocol stack on the sending computer, across the network,
and then up through the protocol stack on the receiving computer. This relationship
is shown in Figure 3.2.



FIG. 3.2 When two computers communicate, data passes down through the sender's
protocol stack, across the network, and up through the receiver's protocol stack.





The actual process is a bit more complex. In truth, at each level of the process,
header information is attached to the data as it is sent. On the receiving end, those
headers are stripped off until the data is finally available to the receiving application.
The actual transmission resembles Figure 3.3.


Each layer can only communicate with the layer above and below it. A request from
one computer for a file on another computer must pass down through all the layers
on the sending computer and up through all the layers on the receiving computer.
Each layer knows only how to transfer the information to the layer above or below
it, but does not know (or need to know) how that information is passed on to the
lower (or upper) layers.



FIG. 3.3 When data is sent between two protocol stacks, information is
added and removed at the beginning and end of the data packet as it passes through
a protocol stack.




The beauty of this approach is that a programmer can write an application that interacts
with the Application Layer of a protocol stack and the application should always
work with the network, regardless of whatever lower-level protocols are used. For
instance, the Windows File Manager or Explorer will allow you to access files on
a remote file server, regardless of whether the network is using a TCP/IP, NetBEUI,
or Novell NetWare protocol stack.


However, one of the details of this model is that each layer of the receiving
protocol stack must know how to remove the header information added by each layer
of the sending protocol stack. To go back to our earlier example, suppose that Fred
had written his document entirely in French and sent it on to Sally. Now if Sally
knows French, the communication can happen perfectly fine. However, if she does not,
Fred's letter will be meaningless, and the communication will fail.


As another variation, suppose that Fred and Sally both spoke English, but let's
change the scenario and say that Sally is with another company. All Fred has for
an address is a U.S. Post Office box. Because almost all overnight express services
(except, of course, the U.S. Postal Service) will not deliver to a P.O. Box, the
package will not be delivered to that address if Fred's mail-room staff tries to
send it through one of those services.


In both cases, the communication failed because somewhere along the way there
were significant differences in the layers of communication.


Back in the realm of computer networking, this same problem can occur when two
computers are set up to use two different types of networks. If one computer uses
IPX/SPX and the other computer uses TCP/IP, no communication can occur.


You should understand, too, that only the protocol stacks on the two computers
must be similar. One of the strengths of computer networking is that the actual computers
can be quite different. A Windows PC can easily communicate with an Apple Macintosh--provided
they both use the same protocol stack (for instance, TCP/IP).





NOTE It is possible in today's computer networks to actually run multiple
protocol stacks on one computer. For instance, a computer might run TCP/IP to communicate
with the Internet and UNIX workstations, but might also run Novell NetWare to communicate
with file servers. This will be discussed in more detail in Chapter 7, "Data
Transmission."



Application Layer


At the top of the OSI Reference Model, the Application Layer is primarily concerned
with the interaction of the user with the computer. Services at this level support
user applications such as electronic mail, database queries, and file transfer. Network
protocol stacks provide programmers with functions that allow the programmers to
interact with the network. This interaction is usually accomplished through an Application
Programming Interface (API) incorporated into the protocol stack.


Returning to our earlier interoffice mail example, this OSI layer could be compared
to Fred composing his document and again to Sally reading the document.



Key Concept

At the Application Layer, user applications interact with the network.

Presentation Layer


The Presentation Layer performs several functions with the data. Its main function
is to take the data from the Application Layer and translate it into a format understandable
to all computers. For instance, some computers encode the actual characters differently
from others. Other computers order the actual bits and bytes differently. The Presentation
Layer is responsible for translating the data to an intermediary format on outbound
messages, and translating the data from the intermediary format to the computer-specific
format on inbound messages.


If any type of encryption is used in the communication, this is the layer at which
the encryption occurs. Outbound messages are encrypted for transmission, and inbound
messages are decrypted for presentation to the Application Layer.


Finally, the Presentation Layer may apply some type of data compression to reduce
the size of the data as it goes across the network.


When the Presentation Layer is finished, the data is in its final form to be sent
across the network. It may be sliced into smaller pieces by the lower levels, but
there is no more manipulation of the actual data.


Going back to the interoffice mail example, the OSI Presentation Layer roughly
compares to Fred's assistant typing the message and placing it in an envelope for
transmission. The assistant is preparing it for transmission. Likewise, on the receiving
end, Sally's assistant opens the envelope and prepares the document to be seen by
Sally.





NOTE Within Microsoft networks, a service called a redirector operates at
this layer. Essentially, the redirector represents network information to the applications
that are calling network resources through the Application Layer. For example, when
you are in the Windows File Manager or Explorer and want to see the directory listing
of a folder on a server, the File Manager makes the same request that it would make
to a local disk drive. That request, however, is redirected to the appropriate network
server. The redirector intercepts that request and passes it along through the network.
The redirector also handles network printing requests.



Key Concept

Think of the Presentation Layer as preparing the data to be presented to either the
network (if outbound) or the applications (if inbound).

Session Layer


Have you ever sat at a railroad crossing and waited for a very long train to pass?
If you haven't had that experience, I'm sure you can imagine that it isn't too much
fun. You sit there wishing that there could be a pause so that you could get across
the tracks and go on your way. The operators of the train, on the other hand, want
to move as much cargo as they can with the fewest number of trains.


Within a computer network, you frequently do want to move large amounts of data,
but you also want others to be able to use the network at the same time. To solve
this, networks break data down into small packets for transmission. When you save
a large document to a network file server, that document isn't just sent across the
network in one large block. It is actually broken down into many small packets and
sent individually.


Somehow, though, the receiving computer has to know when a transmission begins
and ends. This role belongs to the Session Layer. When you want to save that document,
your computer indicates to the file server that it wants to open a session with the
server. If security permissions are okay, the connection will begin. After that document
has been successfully saved, the Session Layer indicates that the transfer has been
successful and terminates the connection.


The Session Layer also performs an important function by placing and verifying
checkpoints in the data stream as the data is being sent out. If there should be
some temporary network failure, the sending computer will only need to retransmit
the data sent after the last checkpoint.



Key Concept

Remember the Session Layer as opening, using, and closing a session between two computers.

Transport Layer


Let's go back to our layered networking example with Fred and Sally. The mail
room staff may use a delivery service that requires that all packages not exceed
five pounds. If someone wants to send 12 pounds worth of documents from one office
to the other, the mail room staff is going to have to break that material up into
three separate boxes. Two of those boxes will have five pounds of material and the
last will contain two pounds. If the staff is cost-conscious, they will try to find
any additional mail that is going to that office to fill up the last box so that
it can be as close to five pounds as possible. Finally, they will number the boxes
("1 of 3", "2 of 3", "3 of 3") and ship them out.


On the receiving end, the other mail room staff will sign for the delivery to
acknowledge receipt. Next, they will open those boxes, reassemble the 12 pounds of
documents and also sort out any other mail that was sent along. If they notice that
a box is missing, they will call the sending office to track down the problem.


This, in essence, is what happens at the Transport Layer of the protocol stack.
Its mission is to deliver the data without any errors and in the proper sequence.
Protocols at this layer know the packet size required by the lower levels and break
the data into the appropriate-sized packets. They also combine smaller pieces of
data together to reach the optimum packet size.


On the receiving end, the Transport Layer typically acknowledges the receipt of
each packet and resequences the packets if they arrived out of order. If any packets
are missing, it will request a retransmission of the missing packet.



Key Concept

Remember the Transport Layer as ensuring error-free and properly sequenced transportation
for the data.

Network Layer


Returning to our interoffice mail example, when Fred's document reaches the mail
room, the mail room staff determines how the package should get to Sally. The staff
may evaluate different shipping options and choose the option best suited to deliver
Fred's document. Once the document is sent, it may travel through several different
mail hubs and be carried by multiple transportation devices, such as trucks or airplanes.
Fred doesn't care how the document gets to Sally as long as it gets there. His mail
room staff and the transportation company are responsible for the delivery.


This routing of messages to addresses is the primary responsibility of the Network
Layer in a computer network. The Network Layer is responsible for addressing a message
and determining the best route based on network traffic, priority levels, and other
conditions.


If one of those routes requires a different packet size than what was received
from the Transport Layer, the Network Layer can refragment data before it is sent.
On the receiving end, the Network Layer will reassemble the fragmented data.


In large networks, devices known as routers operate at the Network Layer to allow
packets to be sent between different networks or network segments. For instance,
if your organization is directly connected to the Internet, you will have a router
allowing computers on your network to interact with other routers out on the Internet.


Ultimately, the Network Layer is responsible for converting a logical name into
a physical address (such as the address of the Ethernet card) for delivery on a local
network. Even if the Network Layer determines that the packet must be sent to a router
for delivery to another network, it will still generate the physical address for
the router so that the packet can be delivered to the router.



Key Concept

Remember that the Network Layer routes messages to the appropriate address by the
best available path.

Data Link Layer


At the Data Link Layer, all these packets sent down from the upper layers are
placed into data frames for actual transmission by the Physical Layer. In addition
to header information, this layer usually adds a trailing Cyclical Redundancy Check
(CRC) that the receiving computer can use to verify that the data was received intact,
as shown in Figure 3.4.



FIG. 3.4 At the Data Link Layer, a CRC is added to the data frame.




The Data Link Layer is responsible for ensuring that the frames are received error-free.
After sending the frame, the layer waits for an acknowledgment from the recipient.
If no acknowledgment is received, the frame is resent.


On the receiving end, the Data Link Layer is responsible for uniquely identifying
the computer on the network (usually through the address encoded into the network
adapter card). When it detects an incoming packet to its address, it assembles all
the bits from the Physical Layer into a frame, verifies the CRC to check the integrity
of the packet, and then passes the packet up to the Network Layer. If the CRC check
fails, this layer will request that the packet be retransmitted.


This layer is also responsible for controlling which computer can access the physical
network connection at any given time. As you could imagine, if every computer on
the network started transmitting data all at once, it would be hard to determine
whose data belonged to whom. Several methods of controlling access will be discussed
in Chapter 7, "Data Transmission."


In large networks, devices called bridges typically work at this layer to essentially
combine different segments of a network into one large network.



Key Concept

Remember the Data Link Layer as the layer packaging data into frames and providing
an error-free link between two computers.

Physical Layer


Just as the communication between Fred and Sally ultimately uses trucks, trains,
and planes, all computer networking communication comes down to 1s and 0s, which
themselves are merely electrical impulses traveling across a wire. At the Physical
Layer, the data is finally converted into bits to be sent across whatever physical
media is being used to connect computers. In a protocol stack, this layer defines
the actual medium used for connection, as well as how that medium is connected to
the computer (for example, how many pins are used on the physical connector). This
layer defines the voltage used and any kind of encoding necessary to convert the
bits into electrical signals.


In most networks, devices such as hubs, repeaters, and transceivers operate at
this layer.



Key Concept

Remember the Physical Layer as the actual physical connection between computers.

IEEE 802 Enhancements to the OSI Model


At the same time as the International Standards Organization was developing the
OSI Reference Model, the Institute of Electrical and Electronics Engineers (IEEE)
was also engaged in the process of developing standards for the network interface
card and the physical connection. This effort became known as Project 802 (after
the year and month when it started--February 1980).


The IEEE project resulted in the 802 specifications, which define the way in which
data is actually placed on the physical network media by network interface cards.
The standards fall into 12 categories, as outlined in Table 3.1.

Table 3.1  IEEE 802 Specifications
























































Number Category
802.1 Internetworking
802.2 Logical Link Control
802.3 Carrier-Sense Multiple Access with Collision Detection LAN (CSMA/CD, or Ethernet)
802.4 Token-Bus LAN
802.5 Token-Ring LAN
802.6 Metropolitan Area Network (MAN)
802.7 Broadband Technical Advisory Group
802.8 Fiber-Optic Technical Advisory Group
802.9 Integrated Voice/Data Networks
802.10 Network Security
802.11 Wireless Networks
802.12 Demand Priority Access LAN, 100 BaseVG-AnyLAN





Tip For the exam, you should know that 802.3 signifies an Ethernet LAN, 802.4
signifies a Token Bus, 802.5 signifies a Token-Ring LAN, and 802.2 specifies Logical
Link Control.



Both the ISO and IEEE projects were developed simultaneously, and both sets of
committees exchanged information. The IEEE 802 specifications focused on the two
lowest levels of the OSI Reference Model, the Physical and Data Link Layers, and
have become the primary standards for those levels.


The IEEE made one major enhancement to the OSI model. The engineers felt that
the Data Link Layer needed further clarification and divided the layer into two sublayers
(see Figure 3.5):


  • Logical Link Control (LLC)





  • Media Access Control (MAC)

FIG. 3.5 The IEEE Project 802 divided the OSI Data Link Layer into two
sublayers.

Logical Link Control Sublayer


The Logical Link Control sublayer is responsible for maintaining the link between
two computers when they are sending data across the physical network connection.
It does this by establishing a series of interface points, known as Service Access
Points (SAPs), that other computers can use to communicate with the upper levels
of the network protocol stack. The primary specification for this sublayer is 802.2.

Media Access Control Sublayer


Basically, the MAC sublayer allows the computers on a network to take turns sending
data on the physical network medium. This sublayer specifies the method whereby a
computer determines if it can send a packet out onto the network. It is also responsible
for ensuring that the data reaches the other computer without any errors.


The major IEEE 802 specifications for this sublayer include those listed in Table
3.2.

Table 3.2  Media Access Control 802 Categories
























Number Category
802.3 Carrier-Sense Multiple Access with Collision Detection LAN (CSMA/CD or Ethernet)
802.4 Token-Bus LAN
802.5 Token-Ring LAN
802.12 Demand Priority




These categories will be discussed in further detail in Chapter 7, "Data
Transmission."





These specifications for the MAC sublayer also define the network medium used in
the Physical Layer.



Real-World Application of the OSI Reference Model


While the OSI Reference Model provides a theoretical framework for discussion
of computer networks, in reality most protocol stacks do not fit into seven neat,
orderly layers. The layered concept is still present, but the lines dividing the
layers may be in different locations. Some protocol stacks may take the functions
of a single OSI layer and divide them between multiple protocols. There are also
protocols that might provide the functions of a single OSI layer, while other protocols
might provide the functions of multiple OSI layers.


For instance, in the Novell NetWare protocol suite, the NetWare Core Protocol
(NCP) operates at the OSI Application, Presentation, and Session Layers. In the TCP/IP
protocol suite, the Transmission Control Protocol (TCP) provides the services of
the OSI Session Layer and some of the services of the Transport Layer, while the
Internet Protocol (IP) provides the remainder of the Transport Layer services and
most of the Network Layer services.


In truth, no one model can be applied to all computer networks. The OSI Reference
Model is useful in that it defines all the functions that should occur within a network
protocol stack. In general, however, most network protocol stacks do fit into a four-layer
model, as shown in Figure 3.6.



FIG. 3.6 Real-world protocols may provide the functions of several layers
of the OSI model.




Within the four-layer model, application protocols are concerned with the user interaction
and data interchange. Transport protocols establish sessions between computers and
provide for the exchange of error-free and properly sequenced data. Network protocols
deal with routing and addressing issues. Finally, the Physical Layer, as in the OSI
model, defines the physical connection and transmission of bits between computers.


Network protocols will be discussed in detail in Chapter 9, "Network Protocols,"
but if you have some previous experience with network protocols, Table 3.3 may help
you understand how various networks fit broadly into the OSI model. (The Physical
Layer does not appear in the table because it is essentially the same in all networks.)

Table 3.3  Comparison of Network Protocols and the

OSI Model
































Layer NetWare TCP/IP Protocol Networks

Novell
Microsoft

Apple Suite
Application Telnet, FTP, SMTP NCP SMB, Redirectors Apple Share, AFP
Transport TCP SPX NetBEUI, NWLink ATP
Network IP IPX NetBEUI, NWLink DDP




The question you may be asking now is--if network protocols generally fit into
four layers, why does the OSI Reference Model have to have seven layers?


To answer this, look back at the model for a computer that was outlined in the
section "The Need for a Conceptual Framework" at the beginning of the chapter.
It lists 11 items that could define a computer. But do all computers have all 11
items? Does every computer have a sound card or CD-ROM? In reality, you could collapse
that model to six categories:


  • Processor





  • Memory





  • Storage Devices (hard-disk drive, diskette drive, CD-ROM)





  • Input Devices (keyboard, mouse)





  • Monitor





  • Peripherals (printer, modem, sound card)

Now this model will work for almost every computer. With the exception of some
servers and diskless workstations, you should be able to say that every computer
you know of has at least the first five categories and possibly the sixth. But if
you said to someone, "Yes, my computer has a processor, memory, storage devices,
input devices, a monitor, and some peripherals," what would their next question
be? Probably "What type of storage devices?" This reduced model simply
doesn't provide enough descriptive detail.


Likewise, while most network protocol stacks can fit into the four-layer reduced
model, those four layers alone really don't fully describe what is involved with
network communication. The larger OSI Reference Model (with the IEEE 802 enhancements)
provides this higher level of descriptive detail.

Summary


The OSI Reference Model provides a framework in which to describe computer networks
and compare the functions of different protocol stacks used in networking. The OSI
model divides network communication into seven layers:


  • Application. Provides connections to network for user applications.





  • Presentation. Prepares data for network transmission.





  • Session. Establishes a session between two computers.





  • Transport. Ensures error-free and properly sequenced transportation of data.





  • Network. Addresses packets and determines best route to destination.





  • Data Link. Packages data into frames and establishes an error-free link between
    two computers.





  • Physical. Defines the actual physical connection method between computers.

The IEEE 802 project further breaks down the OSI Data Link Layer into two sublayers:


  • Logical Link Control. Maintains the link between two computers.





  • Media Access Control. Controls which computer on a network can be transmitting
    data at any given time.





Tip It goes without saying that for the exam you should know and understand
the layers of the OSI Reference Model and IEEE 802 enhancements. You may find it
helpful to come up with a phrase that includes all the letters of the OSI model.
For instance: All Pilots Seek To Not Destroy Planes, Angry Patrons Seek To Not Deliver
Payments, All People Should Try New Data Processors.



The IEEE 802 project also defines a number of categories that relate both to the
Media Access Control sublayer as well as to the Physical Layer. The most important
categories to remember are:


  • 802.3  Carrier-Sense Multiple Access with Collision Detection (Ethernet)





  • 802.4  Token-Bus LAN





  • 802.5  Token-Ring LAN

Taking the Disc Test


If you have read and understood the material in this chapter, you are ready to
test your knowledge. Insert the CD-ROM that comes with this book and run the self-test
software as described in Appendix H, "Using the CD-ROM."

From Here...


If you understand the OSI Reference Model and would like to begin exploring how
networks are actually put together, proceed to Chapter 5, "The Physical Connection."


If you would like to skip ahead to learn more about network protocols, explore
Chapter 9, "Network Protocols."



Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)