Mule. Installing and Managing Network Protocols
Mule. Installing and Managing Network Protocols
We would like to thank First of all God for giving me strength and health to start and finishing
TTLM. And next we thanks Ministry of Labor and Skills that MoLS gives available environment
like dormitory, hotel, water, coffee ceremony and other facilities for the all TVE trainers to work
this Teaching, Training and Learning Materials (TTLM).
Acronym
List of abbreviation
This module covers the performance outcomes, skills and knowledge required to install and manage
network protocols in a networking environment
Network layers
Module Instruction
For effective use this modules trainees are expected to follow the following module instruction:
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
o Overview of network protocols services
o Selecting, testing and validating appropriate network protocol services
o Designing a network addressing system, with subnet and host IDs
IP class address classes
IP address Sub netting
o Configuring and testing IP address
This unit will also support you to accomplish the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
We hire subject matter experts to write our learning guides to ensure they are industry
and workplace relevant and current.
Before we commence writing our learner guides we identify the requirements of the
training package/accredited course and collect feedback from industry.
We design and develop our resources in consultation with VET experts, trainers and
assessors and industry experts. This is to ensure each component of the learning
resources demonstrate relevance and currency in the industry and meet training package
and regulatory compliance requirements.
All resources go through a compliance and quality check with highly experienced
professionals who have worked in the VET sector, with ASQA and other regulators.
RTOs purchase a license for their RTO only and are not permitted to share the documents
with any other entity. Purchasers are asked to agree to a license agreement to this effect
prior to purchase.
1. INTRODUCTION TO NETWORK PROTOCOL
A network protocol is an established set of rules that determine how data is transmitted
between different devices in the same network.
Essentially, it allows connected devices to communicate with each other, regardless of
any differences in their internal processes, structure or design.
a protocol is a standardized set of rules for formatting and processing data. Protocols
enable computers to communicate with one another.
Network protocols are a set of rules, conventions, and data structures that dictate how
devices exchange data across networks.
Network Protocols are a set of rules governing exchange of information in an easy,
reliable and secure way.
In order for two computers to talk to each other, they must be speaking the same
language.
There are thousands of different network protocols, but they all perform one of three primary
actions:
o Communication
o Network Management
o Security
1.3. Communication
• Communication protocols allow different network devices to communicate with each other.
They are used in both analog and digital communications and can be used for important
processes, ranging from transferring files between devices to accessing the internet.
• Automation: These protocols are used to automate different processes in both commercial and
personal settings, such as in smart buildings, cloud technology or self-driving vehicles.
• File transfer: If you have ever moved files from one device to another, either via a physical or
digital medium, you’ve used file transfer protocols (FTP).
• Internet Protocol: Internet Protocol (IP) allows data to be sent between devices via the internet.
The internet could not operate as it currently does without IP.
I. INTRODUCTION
Testing is a crucial activity in the
evaluation process of
a system or an implementation under
test (IUT). Among the
commonly applied approaches, the
passive testing techniques
(also called monitoring) are today
gaining efficiency and reli-
ability [9]. These techniques are
divided in two main groups:
online and offline testing approaches.
Offline testing computes
test scenarios before their execution
on the IUT and gives
verdicts afterwards, while online
testing provides continuously
testing during the operation phase of
the IUT.
With online testing approaches, the
collection of traces is
avoided and the traces are eventually
not finite. Indeed, testing
a protocol at runtime may be
performed during a normal use
of the system without disturbing the
process. Several online
testing techniques have been studied
by the community in
order to test systems or protocol
implementations [14], [10],
[2]. These methods provide interesting
studies and have their
own advantages, but they also have
several drawbacks such as
the presence of false negatives, space
and time consumption,
often related to a needed complete
formal model, etc. Although
they bring solutions, new results and
perspectives to the
protocol and system testers, they also
raise new challenges
and issues. The main ones are the non-
collection of traces
and their on-the-fly analysis. The
traces are observed (through
an interface and an eventual sniffer)
and analyzed on-the-fly
to provide test verdicts and no trace
sets should be studied
a posteriori to the testing process. In
our work, we present a
novel formal online passive testing
approach applied at runtime
to test the conformance and
performance of the IUT.
We herein extend our previous
proposed methodology [3],
[4] that presented a passive testing
approach for checking the
requirements of communicating
protocols. In [3] and [4], a for-
malism was applied to test in an
offline way the conformance
and performance of an IUT. In this
new paper, we develop
our approach to test these two aspects
in an online way in
considering the above mentioned
inherent constraints and chal-
lenges. Furthermore, our framework is
designed to test them
at runtime, with new required verdicts
definitions of ‘Time-
Fail’, ‘Data-Inc’ and ‘Inconclusive’
representing unobserved
I. INTRODUCTION
Testing is a crucial activity in the
evaluation process of
a system or an implementation under
test (IUT). Among the
commonly applied approaches, the
passive testing techniques
(also called monitoring) are today
gaining efficiency and reli-
ability [9]. These techniques are
divided in two main groups:
online and offline testing approaches.
Offline testing computes
test scenarios before their execution
on the IUT and gives
verdicts afterwards, while online
testing provides continuously
testing during the operation phase of
the IUT.
With online testing approaches, the
collection of traces is
avoided and the traces are eventually
not finite. Indeed, testing
a protocol at runtime may be
performed during a normal use
of the system without disturbing the
process. Several online
testing techniques have been studied
by the community in
order to test systems or protocol
implementations [14], [10],
[2]. These methods provide interesting
studies and have their
own advantages, but they also have
several drawbacks such as
the presence of false negatives, space
and time consumption,
often related to a needed complete
formal model, etc. Although
they bring solutions, new results and
perspectives to the
protocol and system testers, they also
raise new challenges
and issues. The main ones are the non-
collection of traces
and their on-the-fly analysis. The
traces are observed (through
an interface and an eventual sniffer)
and analyzed on-the-fly
to provide test verdicts and no trace
sets should be studied
a posteriori to the testing process. In
our work, we present a
novel formal online passive testing
approach applied at runtime
to test the conformance and
performance of the IUT.
We herein extend our previous
proposed methodology [3],
[4] that presented a passive testing
approach for checking the
requirements of communicating
protocols. In [3] and [4], a for-
malism was applied to test in an
offline way the conformance
and performance of an IUT. In this
new paper, we develop
our approach to test these two aspects
in an online way in
considering the above mentioned
inherent constraints and chal-
lenges. Furthermore, our framework is
designed to test them
at runtime, with new required verdicts
definitions of ‘Time-
Fail’, ‘Data-Inc’ and ‘Inconclusive’
representing unobserved
Design a network addressing system, with subnet and host IDs including appropriate devices
Network protocols are the rules that define the standards for communication between network
hosts
Examples of protocols used in computer networking include:
1. Transmission Control Protocol/Internet Protocol (TCP/IP)
2. Network Basic Input Output System (NetBIOS)
3. NetBIOS Enhanced User Interface (NetBEUI).
TCP/IP is a suite of protocols including Internet Protocol (IP) which provides network
addressing.
Each computer, network printer or other network host on your organization network will
need a unique IP address just the same as a letter that is mailed to you through Australia Post
needs a unique address to be delivered to you. These IP addresses can be either configured
manually at each device or assigned automatically by the network operating system. In this
we will look at the format of IP addresses, and how networks are segregated from each other
by using subnet masks. To fully understand how IP addressing works, firstly you need to be
able to translate binary numbers such as 10001000 to decimal numbers (10001000 =136).
An IP address is 32 bits long and made up of two components, a network portion and a host
portion. The network address is used to identify the network and is common to all the devices
attached to the network. The host (or node) address is used to identify a particular device
attached to the network. The IP address is generally represented using the dotted decimal
notation, where 32 bits are divided into four octets. Each of the octets can be represented in a
decimal format, separated by decimal points.
When a computer is configured to use the same IP address each time it powers up, this is
known as a Static IP address
In contrast, in situations when the computer's IP address is assigned automatically, it is known as
a Dynamic IP address, the current version of the IP protocol is IP version 4 (IPv4) & IP version 6
(IPv6).
Example of Ipv4
An Ipv4 address (dotted decimal notation)
10101100
00010000
11111110
00000001
172 16 254 1
One byte = 8 Bits
So, four byte = 8*4=32
Subnet allows network administrators to subdivide a single class of network addresses
into multiple, smaller networks, allowing the more efficient use of IP addresses. The
basic idea of subnet ting is to divide the standard class full host number field into two
parts the subnet ID and the host ID on that subnet.
.
1.6. Configuring and testing IP address
You must configure all physical interfaces of a multpathing group with a test address.
You need test addresses to detect failures and repairs. If a test address is not configured, it
is not chosen for failover. Only in. mpathd uses test addresses. Normal applications
should not use this address. This address will not failover when the interface fails. In
IPv4, you should configure the test address in such a way that normal applications do not
use the test address (See How to Configure a Multipathing Interface Group with Two
Interfaces).
This section describes test address configuration concepts for the following Internet protocols:
IPv4
IPv6
For <other-parameters>, use the parameters required by your configuration. See the ipconfig
(1M) man page for descriptions. How to Configure a Multipathing Interface Group with Two
Interfaces shows the steps you perform for an IPv4 test address.
For example, to add a new logical interface with an address of 19.16.85.21, the netmask and broadcast
address set to the default value, and also configure the interface with a test address, type the following:
Use failover without the dash to turn on the failover attribute of the address.
Note – All test IP addresses in a multipathing group must use the same network prefix. That is,
the test IP addresses must belong to a single IP subnet.
How to Configure a Multipathing Interface Group with Two Interfaces shows the steps you
perform for an IPv6 test address.
When a multipathing group has both IPv4 and IPv6 plumbed on all the group's interfaces, you
might not need a separate IPv4 test address. The in.mpathd daemon can probe the interfaces
using an IPv6 link-local address. IPv6 link-local addresses are created when IPv6 is plumbed.
Use failover without the dash to turn on the failover attribute of the address.
Note –The only valid IPv6 test address is the link-local address.
After you mark the address as deprecated, IP does not pick this address as a source address for
any communication, unless the applications explicitly bind to the address.
Only in.mpathd explicitly binds to such an address (see How to Configure a Multipathing
Interface Group with Two Interfaces).
Because link-local addresses are not present in the name service (DNS, NIS, and NIS+),
applications do not use link-local addresses for communication. Consequently, you do not need
to mark IPv6 test addresses as deprecated.
Note –IPv4 test addresses should not be placed in the name service tables (DNS/NIS/NIS+). In
IPv6, link-local addresses are used as test addresses and are not normally placed in the name
service tables.
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
Network layers
This unit will also support you to accomplish the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
We hire subject matter experts to write our learning guides to ensure they are industry
and workplace relevant and current.
Before we commence writing our learner guides we identify the requirements of the
training package/accredited course and collect feedback from industry.
We design and develop our resources in consultation with VET experts, trainers and
assessors and industry experts. This is to ensure each component of the learning
resources demonstrate relevance and currency in the industry and meet training package
and regulatory compliance requirements.
All resources go through a compliance and quality check with highly experienced
professionals who have worked in the VET sector, with ASQA and other regulators.
RTOs purchase a license for their RTO only and are not permitted to share the documents
with any other entity. Purchasers are asked to agree to a license agreement to this effect
prior to purchase.
2. Identify network Protocol application
Network protocols enable the exchange of information across the internet and work behind
the scenes so effectively that many users don't think twice about them or how the internet
works. But it's critical for networking professionals to know and understand protocols as
the foundation of networking.
ARP translates IP addresses to MAC addresses and vice versa so LAN endpoints can
communicate with one another. ARP is necessary because IP and MAC addresses are
different lengths. Below is a breakdown of the various address lengths:
MAC addresses -- a device's physical hardware number -- are 12 hexadecimal digits split
into six pairs.
Translations between these addresses must occur for proper device communication. ARP
isn't required every time devices attempt to communicate because the LAN's host stores
the translated addresses in its ARP cache. As a result, the ARP translation process is
mainly used when new devices join the network.
ARP
translates MAC and IP addresses between endpoints.
External BGP directs network traffic from various ASes to the internet and vice versa. Internal
BGP directs network traffic between endpoints within a single AS.
BGP is often used for internet redundancy, WAN and IaaS connectivity.
DNS translates the domain name into IP addresses, and these translations are included
within the DNS. Servers can cache DNS data, which is required to access the websites.
DNS also includes the DNS protocol, which is within the IP suite and details the
specifications DNS uses to translate and communicate.
DNS is important because it can provide users with information quickly and enable
access to remote hosts and resources across the internet.
DHCP assigns IP addresses to network endpoints so they can communicate with other
network endpoints over IP. Whenever a device joins a network with a DHCP server for
the first time, DHCP automatically assigns it a new IP address and continues to do so
each time a device moves locations on the network.
When a device connects to a network, a DHCP handshake takes place. In this handshake process,
the device and DHCP server communicate using the following steps:
FTP has grown less popular as most systems began to use HTTP for file sharing.
However, FTP is a common network protocol for more private file sharing, such as in
banking.
Another form of HTTP is HTTPS, which stands for HTTP over Secure Sockets Layer or
HTTP Secure. HTTPS can encrypt a user's HTTP requests and webpages. This provides
more security to users and can prevent common cybersecurity threats, such as man-in-
the-middle attacks.
HTTP
provides users with access to the various components of a website's domain.
After the packet leaves the sender, it goes to a gateway, like a post office, that directs it in
the proper direction. Packets continue to travel through gateways until they reach their
destinations.
IP is commonly paired with TCP to form TCP/IP, the overall internet protocol suite.
Together, IP sends packets to their destinations, and TCP arranges the packets in the
correct order, as IP sometimes sends packets out of order to ensure the packets travel the
fastest ways.
OSPF is similar to and supports Routing Information Protocol, which directs traffic based
on the number of hops it must take along a route, and it has also replaced RIP in many
networks. OSPF was developed as a more streamlined and scalable alternative to RIP.
For example, RIP sends updated routing tables out every 30 seconds, while OSPF sends
updates only when necessary and makes updates to the particular part of the table where
the change occurred.
RIP helps
determine that the path via Router C results in fewer hops to the traffic's destination.
That said, SMTP requires other protocols to ensure email messages are sent and received
properly. SMTP can work with Post Office Protocol 3 or Internet Message Access
Protocol, which control how an email server receives email messages.
10. Telnet
Telnet is designed for remote connectivity, and it establishes connections between a
remote endpoint and a host machine to enable a remote session. Telnet prompts the user
at the remote endpoint to log on. Once the user is authenticated, Telnet gives the endpoint
access to network resources and data at the host computer.
Telnet has existed since the 1960s and was arguably the first draft of the modern internet.
However, Telnet lacks sophisticated security protections required for modern
communications and technology, so it isn't commonly used anymore.
TCP also detects errors in the sending process -- including if any packets are missing
based on TCP's numbered system -- and requires IP to retransmit those packets before IP
delivers the data to its destination. Through this process, the TCP/IP suite controls
communication across the internet.
Key
differences between TCP and UDP include packet order and use cases.
Unlike TCP, UDP doesn't wait for all packets to arrive or organize the packets. Instead,
UDP transmits all packets even if some haven't arrived.
Important part of the design of distributed systems and why protocol evaluation?
What is a protocol?
Low-level abstraction: A state machine
The protocol state defines which actions are performed and how to respond to events
A communicating state machine consists of
o set of states
o state transitions
o message queues
Conclusion
The number of machines you expect to support will affect several decisions you will need to
make at this stage of setting up a network for your site. Your organization may require a small
network of several dozen standalone machines located on one floor of a single building.
Alternatively, you may need to set up a network with more than 1000 hosts in several buildings.
This arrangement may require you to further divide your network into subdivisions called
subnets. The size of your prospective network will affect the
Network class you apply for
Network number you receive
IP addressing scheme you use for your network
Obtaining a network number and then establishing an IP addressing scheme is one of the most
important tasks of the planning phase of network administration.
Each network running TCP/IP must have a unique network number, and every machine on it
must have a unique IP address. It is important to understand how IP addresses are constructed
before you register your network and obtain its network number.
The IP address is a 32-bit number that uniquely identifies a network interface on a machine. An
IP address is typically written in decimal digits, formatted as four 8-bit fields separated by
periods. Each 8-bit field represents a byte of the IP address. This form of representing the bytes
of an IP address is often referred to as the dotted-decimal format.
The bytes of the IP address are further classified into two parts: the network part and the host
part. Figure 3-1 shows the component parts of a typical IP address, 129.144.50.56.
This part specifies the unique number assigned to your network. It also identifies the class of
network assigned. In Figure 3-1, the network part takes up two bytes of the IP address.
Host Part
This is the part of the IP address that you assign to each host. It uniquely identifies this machine
on your network. Note that for each host on your network, the network part of the address will be
the same, but the host part must be different.
Local networks with large numbers of hosts are sometimes divided into subnets. If you choose to
divide your network into subnets, you need to assign a subnet number for the subnet. You can
maximize the efficiency of the IP address space by using some of the bits from the host number
part of the IP address as a network identifier. When used as a network identifier, the specified
part of the address becomes the subnet number. You create a subnet number by using a netmask,
which is a bit mask that selects the network and subnet parts of an IP address. (Refer to "Creating
the Network Mask" for full details.)
Network Classes
The first step in planning for IP addressing on your network is to determine which network class
is appropriate for your network. After you have done this, you can take the crucial second step:
obtain the network number from the InterNIC addressing authority.
Currently there are three classes of TCP/IP networks. Each class uses the 32-bit IP address space
differently, providing more or fewer bits for the network part of the address. These classes are
class A, class B, and class C.
A class A network number uses the first eight bits of the IP address as its "network part." The
remaining 24 bits comprise the host part of the IP address, as illustrated in Figure 3-2 below.
A class B network number uses 16 bits for the network number and 16 bits for host numbers.
The first byte of a class B network number is in the range 128-191. In the number 129.144.50.56,
the first two bytes, 129.144, are assigned by the InterNIC, and comprise the network address.
The last two bytes, 50.56, make up the host address, and are assigned at the discretion of the
owner of the network number. Figure 3-3 graphically illustrates a class B address.
Class C network numbers use 24 bits for the network number and 8 bits for host numbers. Class
C network numbers are appropriate for networks with few hosts--the maximum being 254. A
class C network number occupies the first three bytes of an IP address. Only the fourth byte is
assigned at the discretion of the network owners. Figure 3-4 graphically represents the bytes in a
class C address.
The first byte of a class C network number covers the range 192-223. The
second and third each cover the range 1- 255. A typical class C address might
be 192.5.2.5. The first three bytes, 192.5.2, form the network number. The
final byte in this example, 5, is the host number.
Administering Network Numbers
If your organization has been assigned more than one network number, or
uses subnets, appoint a centralized authority within your organization to
assign network numbers. That authority should maintain control of a pool of
assigned network numbers, assigning network, subnet, and host numbers as
required. To prevent problems, make sure that duplicate or random network
numbers do not exist in your organization.
Designing Your IP Addressing Scheme
After you have received your network number, you can then plan how you
will assign the host parts of the IP address.
Table 3-1 shows the division of the IP address space into network and host
address spaces. For each class, "range" specifies the range of decimal values
for the first byte of the network number. "Network address" indicates the
number of bytes of the IP address that are dedicated to the network part of the
address, with each byte represented by xxx. "Host address" indicates the
number of bytes dedicated to the host part of the address. For example, in a
class A network address, the first byte is dedicated to the network, and the last
three are dedicated to the host. The opposite is true for a class C network.
Table 3-1 Division of IP Address Space
The numbers in the first byte of the IP address define whether the network is class A, B, or C and
are always assigned by the Inter NIC. The remaining three bytes have a range from 0-255. The
numbers 0 and 255 are reserved; you can assign the numbers 1-254 to each byte depending on
the network number assigned to you.
Table 3-2 shows which bytes of the IP address are assigned to you and the range of numbers
within each byte that are available for you to assign to your hosts.
In order to connect to the network, a computer must have at least one network interface, as
explained in "Network Interfaces". Each network interface must have its own unique IP address.
The IP address that you give to a host is assigned to its network interface, sometimes referred to
as the primary network interface. If you add a second network interface to a machine, it must
have its own unique IP number.
Each network interface has a device name, device driver, and associated device file in the
/devices directory. The network interface might have a device name such as le0 or smc0, device
names for two commonly used Ethernet interfaces.
Note -
This book assumes that your machines have Ethernet network interfaces. If you plan to use
different network media, refer to the manuals that came with the network interface for
configuration information.
The "network layer" is the part of the Internet communications process where these
connections occur, by sending packets of data back and forth between different networks.
The network layer has two main functions. One is breaking up segments into network
packets, and reassembling the packets on the receiving end. The other is routing packets
by discovering the best path across a physical network.
Since the discussion of networking often includes talk of “extra layers”, this paper will
address these unofficial layers as well.
Finally, this paper will draw comparisons between the theoretical OSI model and the
functional TCP/IP model. Although TCP/IP has been used for network communications before
the adoption of the OSI model, it supports the same functions and features in a differently
layered arrangement.
o Helps users understand how hardware and software elements function together
o Defines terms that networking professionals can use to compare basic functional
The physical layer of the OSI model defines connector and interface specifications, as
well as the medium (cable) requirements. Electrical, mechanical, functional, and procedural
specifications are provided for sending a bit stream on a computer network.
Note: The Physical Layer of the OSI model is only part of a LAN (Local Area Network).
Works with a device’s networking software when sending and receiving messages
A switch uses this address to filter and forward traffic, helping relieve congestion and
collisions on a network segment. All rights reserved. Page 4 Bridges and switches function in a
similar fashion; however, bridging is normally a software program on a CPU, while switches use
Application-Specific Integrated Circuits (ASICs) to perform the task in dedicated hardware,
which is much faster.
To make it easier to manage the network and control the flow of packets, many
organizations separate their network layer addressing into smaller parts known as subnets.
Routers use the network or subnet portion of the IP addressing to route traffic between different
networks. Each router must be configured specifically for the networks or subnets that will be
connected to its interfaces.
Routers communicate with one another using routing protocols, such as Routing
Information Protocol (RIP) and Open version of Shortest Path First (OSPF), to learn of other
networks that are present and to calculate the best way to reach each network based on a variety
of criteria (such as the path with the fewest routers). Routers and other networked systems make
these routing decisions at the network layer.
When passing packets between different networks, it may become necessary to adjust
their outbound size to one that is compatible with the layer 2 protocol that is being used. The
network layer accomplishes this via a process known as fragmentation. A router’s network layer
is usually responsible for doing the fragmentation. All reassembly of fragmented packets
happens at the network layer of the final destination system. Copyright ©2006 Global
Knowledge Training LLC. All rights reserved.
Two of the additional functions of the network layer are diagnostics and the reporting of
logical variations in normal network operation. While the network layer diagnostics may be
initiated by any networked system, the system discovering the variation reports it to the original
sender of the packet that is found to be outside normal network operation.
The variation reporting exception is content validation calculations. If the calculation
done by the receiving system does not match the value sent by the originating system, the
receiver discards the related packet with no report to the sender. Retransmission is left to a
higher layer’s protocol. Some basic security functionality can also be set up by filtering traffic
using layer 3 addressing on routers or other similar devices
Layer 4, the transport layer of the OSI model, offers end-to-end communication between
end devices through a network. Depending on the application, the transport layer either offers
reliable, connection-oriented or connectionless, best-effort communications.
• Application identification
• Transmission-error detection
The most common transport layer protocols are the connection-oriented TCP
Transmission Control Protocol (TCP) and the connectionless UDP User Datagram Protocol
(UDP).
• Graphics formatting
• Content translation
• System-specific translation
Layer 7, the application layer, provides an interface for the end user operating a device
connected to a network. This layer is what the user sees, in terms of loading an application (such
as Web browser or e-mail); that is, this application layer is the data the user views while using
these applications.
• Electronic mail
• Electronic messaging
Layers 8, 9, and 10
“I read in an airline magazine that this was the best way to do it so that is what we will
do.”
What these managers seem to forget is that they are paying a highly qualified staff to provide
them with useful information. These managers bypass planning in order to make a quick
decision.
Layer 10, the “user” layer, is in every organization. But users are much more than a layer.
While they are one of the reasons the network exists, users can also be a big part of the need for
troubleshooting. This is especially true when the users have computers at home and have decided
to “help” the network administrator or manager by making changes to the network without
consulting the network staff. Equally challenging is the user who “didn’t do anything” when the
network segment in his/her immediate vicinity suddenly stopped working. In these cases, the
layer 10 identification coincides with layer 10 troubles (and the “ID10T” label some technicians
have used).
The TCP/IP model uses four layers to perform the functions of the seven-layer OSI
model.
The network access layer is functionally equal to a combination of OSI physical and data
link layers (1 and 2). The Internet layer performs the same functions as the OSI network layer
(3).
Things get a bit more complicated at the host-to-host layer of the TCP/IP model. If the
host-to-host protocol is TCP, the matching functionality is found in the OSI transport and session
layers (4 and 5). Using UDP equates to the functions of only the transport layer of the OSI
model.
The TCP/IP process layer, when used with TCP, provides the functions of the OSI
model’s presentation and application layers (6 and 7). When the TCP/IP transport layer protocol
is UDP, the process layer’s functions are equivalent to OSI session, presentation, and application
layers (5, 6, and 7).
Some of the layers use equipment to support the identified functions. Hub related activity
is “Layer One”. The naming of some devices designates the functional layer such as “Layer Two
Switch” or “Layer Three Switch”. Router functions focus on “Layer Three”. User workstations
and servers are often identified with “Layer Seven”.
Summary
The most identified benefit of the OSI model is that it organizes thinking about networks
and give novices, journeymen, and masters a common, computer networking language. Human
communication, discussions, and collaboration can use this language to remove ambiguity and
clarify intent.
Learn More
Learn more about how you can improve productivity, enhance efficiency, and sharpen your
competitive edge. Check out the following Global Knowledge courses:
TCP/IP Networking
Our courses and enhanced, hands-on labs offer practical skills and tips that you can immediately
put to use. Our expert instructors draw upon their experiences to help you understand key
concepts and how to apply them to your specific work situation. Choose from our more than 700
courses, delivered through Classrooms, e-Learning, and On-site sessions, to meet your IT and
management training needs.
He is also a senior instructor and course director with Global Knowledge, the blended solutions
training company. In that role, he has authored and managed two highly successful courses—
Hands-on Internetworking with TCP/IP and Network Management Essentials. Both courses are
offered world-wide in Classroom, Virtual Classroom, and Self-directed formats. In support of
these and other courses, he actively participates in Global Knowledge’s e-mentoring programs.
His is author of the books Hands-On TCP/IP and SNMP Network Management.
Name: _____________________________ IDNo_________ Date: ___________________
Instruction:-Read all questions which given below and you to answer the correct one.(2 points
each)
Column A Column B
Step 1:- Connect the power cables on the system unit and monitor.
Step 2:-Connect hardware peripherals to the computer on the back side front side.