SlideShare a Scribd company logo
Network Essentials
FUNDAMENTALS – CHAPTER 2
A network is a collection of systems and devices exchanging data over some form of media.
A host is defined as any device that holds a logical address on your network.
Hosts can be workstations, servers, printers, connection devices, or routers.
Modern networks are charged with delivering our phone calls and, soon, our television and
entertainment options. Data—no matter what its form—is transmitted in the form of bits.
A single bit is a 1 or a 0 (based on the binary number system of two digits versus the typically
used decimal numbering system based on the digits 0–9).
A protocol is simply an agreed upon set of rules for a particular network function.
Bandwidth is generally considered to be the total amount of data (in bits) you can theoretically
transmit within a given time period (typically one second).
Bandwidth is expressed in bits or bytes per second in digital networking.
Network Topologies
The topology can refer to how the network actually looks
Physical Topologies:
The physical topology of the network refers to how the network actually looks from a
bird’s-eye view—the physical cabling layout of the network itself.
A bus topology consists of all devices connecting to a single wire—a coaxial cable.
A physical bus looks like a straight line—a stick—with connections to hosts coming off
in a “T” shape.
In a ring topology, all devices are connected to each other in the shape of a circle—the first
device feeds into the second device, which in turn feeds into the third, and so on and so on until
the loop plugs back into the first device
Star topologies can also include extended star, where the central device extends links to other
hubs and switches.
A token passing, or ring, topology works in a more organized, almost friendly format. In a
token passing logical topology, systems can only transmit information when they hold a special
data packet, known as a token. The token is passed from one device to the next, in a prescribed,
circular path. Each device receives the token and examines it. If it holds a message for the
device, it will open and process it.
Network Categories
Networks are typically of two types: LANs and WANs.
LANs :
A LAN (local area network) can be defined as a network that serves users within a small
geographic footprint.
WANs:
A WAN(wide area network ) is nothing more than the network connecting a collection of LANs
across a wide geographic area—perhaps a state, nation, or even the whole world! Aside from
the distance variable, another defining characteristic of WANs is the concept of a leased line.
The OSI Reference Model 11 CERTIFICATION OBJECTIVE 1.02 The OSI Reference
Model
One word bandied about quite a bit in regards to the OSI model is encapsulation.
Encapsulation is the process of adding a header and a trailer to a piece of data. While each stage
of communication (layer of the model) adds a header to the data, only one layer always adds a
trailer. Some texts define encapsulation as occurring in all layers of the model; however, it
technically only occurs at one—the Data Link layer.
The Layers
The OSI Reference Model splits the communications process into seven distinct modular layers,
with each layer accomplishing a specific function independently of all other layers. The layers do
rely on layers above and below to provide something to work with, but they don’t necessarily
care what they receive to work with.
The OSI REFERENCE MODEL SERIES
LAYER DEVICES FOUND IN THE LAYER PROTOCOLS AND STANDARDS WORKING
Application Firewall,Gateway and IDS SMTP,POP3,DNS,DHCP,FTP,HTTP,TFTP,SNMP
Presentation N/A JPG,JPEG,TIFF,GIF,MIME
Session N/A NFS,ASP,SQL,RPC
Transport Firewall TCP,UDP, SPX
Network Router IP,IPX, Appletalk
Data link layer Bridge and Switch Ethernet,ATM,PPP,Frame Relay
Physical Transceiver,Repeater, and Hub RJ45,ST/SC
The Data Layers (Application,Presentation, and Session)
Seven layers of the OSI model:-
The data layers would be the top three layers of the model.
At the top of the stack, we find layer 7—the Application layer
The Application layer holds the protocols that allow programs to access and make use of a
Network.
For example, Microsoft Outlook—a common e-mail program—can work just fine without a
network. You can open, edit, create, and delete e-mails offline just as well as you can online.
However, if you wish to use the network to send and receive e-mail, you need an Application
layer protocol to do this. In this example, the Application layer protocol would be SMTP.
Continuing the e-mail analogy, imagine you are sending an e-mail from a Microsoft Outlook
application to a computer running the Thunderbird e-mail application. You may have bold,
italics, and any number of font settings within your e-mail. Additionally, you may attach a picture
file (jpg) for the recipient to enjoy. Thunderbird might treat bold, italics, and font settings
differently than does Outlook, and SMTP is only capable of sending ASCIIcode (a combination of
bits representing an alphanumeric character, commonly referred to as, simply, text).
Enter layer 6—the Presentation layer. The Presentation layer is responsible for formatting and
code conversion between systems. This layer accepts the data from the Application layer and
ensures it is placed in a format the end station can understand. In this case, the e-mail is in text
mode, and another protocol, like MIME, translates the jpg into ASCII for transit. Once received at
the far end, the recipient’s Presentation layer will perform the reverse, handing the data back to
the Application layer protocol. Encryption is another function of the Presentation layer
Layer 5—the Session layer:—is perhaps the most enigmatic and troublesome of the entire
stack. This layer doesn’t necessarily do anything to the data at all. Instead, its function is to
work in the background, ensuring the communications process between two systems runs
smoothly.
The Delivery Layers:-
Transport layer:
Transport the data from receiver to sender.
The three main functions:
1. Segmentation.
2. The reliable delivery
3. Flow control
Segmentation is simply taking a small piece of the bits making up the data as a whole.
A small header is put in front of these bits. Inside the header is all sorts of information,
including:
The Network layer is responsible for logical addressing and routing.
Receiving a segment from the Transport layer, the Network layer adds a header that includes a
source and destination logical (network) address. This address is read by layer-3 devices
(routers) and best path determinations are made to deliver the segment to its final destination
Network Components
Physical Layer Devices:
Physical layer devices do nothing more than physically connect wiring together to complete a
path, or change the connection from one type to another.
Examples of physical layer devices include transceivers, repeaters, and hubs.
Transceivers connect one media type to another, such as a fiber connection to a copper one.
Repeaters are used to extend the range of a given media—whatever they take in one port,
they regenerate and repeat out the other. Hubs are nothing more than multiport
repeaters. Comparatively, where a repeater takes bits in one port to relay to another,
hubs have several ports they accept and relay bits on.
Data Link Layer Devices
Layer-2 devices include bridges and switches. Switches and bridges split (or
segment) collision domains, decrease network traffic problems, and increase effective
available bandwidth to hosts. However, keep in mind they are incapable of moving
traffic outside your LAN.
Network Layer Devices
Network layer devices play a unique role in your network design. These devices read the
Logical network addresses on your data and make decisions about which route to
send the data. This sounds very much like the switches and bridges discussed earlier,
but keep in mind the layer-3 device not only knows which port to send the data out,
but also the best route through outside networks to its final destination. Continuing
the analogy from earlier, if the street address on your letter is akin to the physical
address of your hosts, the logical address used by layer-3 devices is equivalent to the
ZIP code.
Other Devices
Networks can also include a variety of other devices, such as firewalls, gateways,
and proxies. A firewall is a device that typically works at layers 3 and 4, and is
used to filter network traffic based upon rules the administrator configures on
the device. Generally placed between your network and the Internet, firewalls
work on an implicit deny principle—if you do not explicitly allow the traffic, it is
blocked.
Gateways work at all layers and are generally used to connect networks and applications of
different types together. A proxy is a system that provides a specific service to a host. For
example, a web proxy will make requests to the Internet for web content on behalf of a host.
This increases security and performance since web traffic coming from your network appears
from only one system, and hosts can access cached pages on the proxy instead of going out to
find them. Generally speaking, these devices are usually placed between your network and the
Internet in a special network called a DMZ

More Related Content

PPT
Network Fundamentals – Chapter 2
Sachii Dosti
 
PPT
Addressing the Network – IPv4
Sachii Dosti
 
PPT
Network Fundamentals – Chapter 1
Sachii Dosti
 
PPT
OSI Physical Layer
Sachii Dosti
 
PDF
MyNFChapter5
Araya Florence
 
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 3
Nil Menon
 
PPT
Exploration network chapter5
teknik komputer ui
 
PPT
CCNA Exploration 1 - Chapter 10
Irsandi Hasan
 
Network Fundamentals – Chapter 2
Sachii Dosti
 
Addressing the Network – IPv4
Sachii Dosti
 
Network Fundamentals – Chapter 1
Sachii Dosti
 
OSI Physical Layer
Sachii Dosti
 
MyNFChapter5
Araya Florence
 
CCNA 1 Routing and Switching v5.0 Chapter 3
Nil Menon
 
Exploration network chapter5
teknik komputer ui
 
CCNA Exploration 1 - Chapter 10
Irsandi Hasan
 

What's hot (19)

PPTX
Itn6 instructor materials_chapter3
limenih muluneh
 
PPT
Ex 1 chapter05-network-layer-tony_chen
Đô GiẢn
 
PDF
IEEE 802 Standard for Computer Networks
Pradeep Kumar TS
 
PPT
chapter_1
Vero Deg
 
DOCX
Communication standards ieee 802 3
thanhtrung_ys
 
PPT
Chapter2
siageoksoon
 
PPT
CCNA Introducing Networks
Dsunte Wilson
 
PPTX
Ieee standards
Bisma Sajid
 
PPT
Ccna Presentation
bcdran
 
PPTX
Network layers
GermaineGenove
 
DOC
Ccna complete notes
thetechnicalzone
 
PPT
Cisco network 1 1
jomerson remorosa
 
PPTX
Week 4 introducing network standards
Robert Almazan
 
PDF
Ccna notes
Ramesh Kumar
 
PPT
ETHERNET
AKSHIT KOHLI
 
PPTX
Ccna PPT
AIRTEL
 
PPSX
Ethernet technology
Taif Alawsi
 
PPTX
CCNA Course Training Presentation
Rohit Singh
 
PDF
Ccna (200 125)
shajeeha khalid
 
Itn6 instructor materials_chapter3
limenih muluneh
 
Ex 1 chapter05-network-layer-tony_chen
Đô GiẢn
 
IEEE 802 Standard for Computer Networks
Pradeep Kumar TS
 
chapter_1
Vero Deg
 
Communication standards ieee 802 3
thanhtrung_ys
 
Chapter2
siageoksoon
 
CCNA Introducing Networks
Dsunte Wilson
 
Ieee standards
Bisma Sajid
 
Ccna Presentation
bcdran
 
Network layers
GermaineGenove
 
Ccna complete notes
thetechnicalzone
 
Cisco network 1 1
jomerson remorosa
 
Week 4 introducing network standards
Robert Almazan
 
Ccna notes
Ramesh Kumar
 
ETHERNET
AKSHIT KOHLI
 
Ccna PPT
AIRTEL
 
Ethernet technology
Taif Alawsi
 
CCNA Course Training Presentation
Rohit Singh
 
Ccna (200 125)
shajeeha khalid
 
Ad

Viewers also liked (20)

DOCX
Network technology Paper 2
Sachii Dosti
 
PPT
Net essentials6e ch2
APSU
 
PPT
Net essentials6e ch3
APSU
 
PPT
02 protocols and tcp-ip
myl_1116
 
PPT
Net essentials6e ch4
APSU
 
PPTX
Chapter 6 - Networking
Rosie Jane Enomar
 
PPT
Net essentials6e ch5
APSU
 
PPTX
Deterministic context free grammars &non-deterministic
Leyo Stephen
 
PPT
Networking Essentials Lesson 01 - Eric Vanderburg
Eric Vanderburg
 
PPT
Module 2 patient transfers
APSU
 
PPT
Net essentials6e ch1
APSU
 
PPT
Qa conf 2011_ads
gremars
 
PDF
Context free langauges
sudhir sharma
 
PPT
Context free languages
Jahurul Islam
 
PPTX
Context free grammars
Shiraz316
 
PPT
Context free grammars
Ronak Thakkar
 
PDF
Lecture: Context-Free Grammars
Marina Santini
 
PPTX
Best Practice - Learning CCNA E1 module using Mind Maps
gremars
 
PPT
CCNA Network Devices
Dsunte Wilson
 
PDF
Alphorm.com Formation Cisco ICND2
Alphorm
 
Network technology Paper 2
Sachii Dosti
 
Net essentials6e ch2
APSU
 
Net essentials6e ch3
APSU
 
02 protocols and tcp-ip
myl_1116
 
Net essentials6e ch4
APSU
 
Chapter 6 - Networking
Rosie Jane Enomar
 
Net essentials6e ch5
APSU
 
Deterministic context free grammars &non-deterministic
Leyo Stephen
 
Networking Essentials Lesson 01 - Eric Vanderburg
Eric Vanderburg
 
Module 2 patient transfers
APSU
 
Net essentials6e ch1
APSU
 
Qa conf 2011_ads
gremars
 
Context free langauges
sudhir sharma
 
Context free languages
Jahurul Islam
 
Context free grammars
Shiraz316
 
Context free grammars
Ronak Thakkar
 
Lecture: Context-Free Grammars
Marina Santini
 
Best Practice - Learning CCNA E1 module using Mind Maps
gremars
 
CCNA Network Devices
Dsunte Wilson
 
Alphorm.com Formation Cisco ICND2
Alphorm
 
Ad

Similar to Network essentials chapter 2 (20)

PPTX
Network essentials chapter 3
Raghu nath
 
PPTX
Network essentials chapter 4
Raghu nath
 
PPT
006 Osi Model
BELKA08
 
PDF
Network internet
Kumar
 
PDF
Networks internet
Kumar
 
PPT
Ccna exploration network fundamentals
IT Tech
 
PPT
Concept of networking
sumit dimri
 
PPT
Network fundamental
sravya reddy
 
PPT
Osi reference model
Sagar Gor
 
PPT
IMD 251 - Networking
isma ishak
 
PPT
Open Systems Interconnection (OSI) modelModel.ppt
InnocentMbele2
 
PPT
06 - OSI Model.ppt
ssuserf7cd2b
 
PPT
06 - OSI Model.ppt
ssuserf7cd2b
 
PPTX
Unit 1 network models & typical examples(part a)
Vishal kakade
 
PDF
osireferencemodel-170703104058 (1).pdf
Fira253524
 
PPT
Dc2 t1
Nachiket Rajput
 
PPT
Basics of networking and routing
Perfect Training Center
 
PPT
1 osi model
SpacSec
 
PPTX
Network essentials - chapter 1
Raghu nath
 
PDF
Network security at_osi_layers
Federal Urdu University
 
Network essentials chapter 3
Raghu nath
 
Network essentials chapter 4
Raghu nath
 
006 Osi Model
BELKA08
 
Network internet
Kumar
 
Networks internet
Kumar
 
Ccna exploration network fundamentals
IT Tech
 
Concept of networking
sumit dimri
 
Network fundamental
sravya reddy
 
Osi reference model
Sagar Gor
 
IMD 251 - Networking
isma ishak
 
Open Systems Interconnection (OSI) modelModel.ppt
InnocentMbele2
 
06 - OSI Model.ppt
ssuserf7cd2b
 
06 - OSI Model.ppt
ssuserf7cd2b
 
Unit 1 network models & typical examples(part a)
Vishal kakade
 
osireferencemodel-170703104058 (1).pdf
Fira253524
 
Basics of networking and routing
Perfect Training Center
 
1 osi model
SpacSec
 
Network essentials - chapter 1
Raghu nath
 
Network security at_osi_layers
Federal Urdu University
 

More from Raghu nath (20)

PPTX
Mongo db
Raghu nath
 
PDF
Ftp (file transfer protocol)
Raghu nath
 
PDF
MS WORD 2013
Raghu nath
 
PDF
Msword
Raghu nath
 
PDF
Ms word
Raghu nath
 
PDF
Javascript part1
Raghu nath
 
PDF
Regular expressions
Raghu nath
 
PDF
Selection sort
Raghu nath
 
PPTX
Binary search
Raghu nath
 
PPTX
JSON(JavaScript Object Notation)
Raghu nath
 
PDF
Stemming algorithms
Raghu nath
 
PPTX
Step by step guide to install dhcp role
Raghu nath
 
PPTX
Python chapter 2
Raghu nath
 
PPTX
python chapter 1
Raghu nath
 
PPTX
Linux Shell Scripting
Raghu nath
 
PPTX
Perl
Raghu nath
 
PPTX
Adv excel® 2013
Raghu nath
 
PPTX
Excel® 2013
Raghu nath
 
PPTX
Excel 2013
Raghu nath
 
PPTX
Basic xml syntax
Raghu nath
 
Mongo db
Raghu nath
 
Ftp (file transfer protocol)
Raghu nath
 
MS WORD 2013
Raghu nath
 
Msword
Raghu nath
 
Ms word
Raghu nath
 
Javascript part1
Raghu nath
 
Regular expressions
Raghu nath
 
Selection sort
Raghu nath
 
Binary search
Raghu nath
 
JSON(JavaScript Object Notation)
Raghu nath
 
Stemming algorithms
Raghu nath
 
Step by step guide to install dhcp role
Raghu nath
 
Python chapter 2
Raghu nath
 
python chapter 1
Raghu nath
 
Linux Shell Scripting
Raghu nath
 
Adv excel® 2013
Raghu nath
 
Excel® 2013
Raghu nath
 
Excel 2013
Raghu nath
 
Basic xml syntax
Raghu nath
 

Recently uploaded (20)

PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
PPTX
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
PPTX
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PPTX
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
PPTX
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
PPTX
How to Apply for a Job From Odoo 18 Website
Celine George
 
PPTX
CDH. pptx
AneetaSharma15
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
PDF
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
How to Apply for a Job From Odoo 18 Website
Celine George
 
CDH. pptx
AneetaSharma15
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
Basics and rules of probability with real-life uses
ravatkaran694
 

Network essentials chapter 2

  • 2. A network is a collection of systems and devices exchanging data over some form of media. A host is defined as any device that holds a logical address on your network. Hosts can be workstations, servers, printers, connection devices, or routers.
  • 3. Modern networks are charged with delivering our phone calls and, soon, our television and entertainment options. Data—no matter what its form—is transmitted in the form of bits. A single bit is a 1 or a 0 (based on the binary number system of two digits versus the typically used decimal numbering system based on the digits 0–9).
  • 4. A protocol is simply an agreed upon set of rules for a particular network function. Bandwidth is generally considered to be the total amount of data (in bits) you can theoretically transmit within a given time period (typically one second). Bandwidth is expressed in bits or bytes per second in digital networking.
  • 5. Network Topologies The topology can refer to how the network actually looks Physical Topologies: The physical topology of the network refers to how the network actually looks from a bird’s-eye view—the physical cabling layout of the network itself.
  • 6. A bus topology consists of all devices connecting to a single wire—a coaxial cable. A physical bus looks like a straight line—a stick—with connections to hosts coming off in a “T” shape. In a ring topology, all devices are connected to each other in the shape of a circle—the first device feeds into the second device, which in turn feeds into the third, and so on and so on until the loop plugs back into the first device
  • 7. Star topologies can also include extended star, where the central device extends links to other hubs and switches. A token passing, or ring, topology works in a more organized, almost friendly format. In a token passing logical topology, systems can only transmit information when they hold a special data packet, known as a token. The token is passed from one device to the next, in a prescribed, circular path. Each device receives the token and examines it. If it holds a message for the device, it will open and process it.
  • 8. Network Categories Networks are typically of two types: LANs and WANs. LANs : A LAN (local area network) can be defined as a network that serves users within a small geographic footprint. WANs: A WAN(wide area network ) is nothing more than the network connecting a collection of LANs across a wide geographic area—perhaps a state, nation, or even the whole world! Aside from the distance variable, another defining characteristic of WANs is the concept of a leased line.
  • 9. The OSI Reference Model 11 CERTIFICATION OBJECTIVE 1.02 The OSI Reference Model One word bandied about quite a bit in regards to the OSI model is encapsulation. Encapsulation is the process of adding a header and a trailer to a piece of data. While each stage of communication (layer of the model) adds a header to the data, only one layer always adds a trailer. Some texts define encapsulation as occurring in all layers of the model; however, it technically only occurs at one—the Data Link layer.
  • 10. The Layers The OSI Reference Model splits the communications process into seven distinct modular layers, with each layer accomplishing a specific function independently of all other layers. The layers do rely on layers above and below to provide something to work with, but they don’t necessarily care what they receive to work with.
  • 11. The OSI REFERENCE MODEL SERIES
  • 12. LAYER DEVICES FOUND IN THE LAYER PROTOCOLS AND STANDARDS WORKING Application Firewall,Gateway and IDS SMTP,POP3,DNS,DHCP,FTP,HTTP,TFTP,SNMP Presentation N/A JPG,JPEG,TIFF,GIF,MIME Session N/A NFS,ASP,SQL,RPC Transport Firewall TCP,UDP, SPX Network Router IP,IPX, Appletalk Data link layer Bridge and Switch Ethernet,ATM,PPP,Frame Relay Physical Transceiver,Repeater, and Hub RJ45,ST/SC
  • 13. The Data Layers (Application,Presentation, and Session) Seven layers of the OSI model:- The data layers would be the top three layers of the model. At the top of the stack, we find layer 7—the Application layer The Application layer holds the protocols that allow programs to access and make use of a Network.
  • 14. For example, Microsoft Outlook—a common e-mail program—can work just fine without a network. You can open, edit, create, and delete e-mails offline just as well as you can online. However, if you wish to use the network to send and receive e-mail, you need an Application layer protocol to do this. In this example, the Application layer protocol would be SMTP.
  • 15. Continuing the e-mail analogy, imagine you are sending an e-mail from a Microsoft Outlook application to a computer running the Thunderbird e-mail application. You may have bold, italics, and any number of font settings within your e-mail. Additionally, you may attach a picture file (jpg) for the recipient to enjoy. Thunderbird might treat bold, italics, and font settings differently than does Outlook, and SMTP is only capable of sending ASCIIcode (a combination of bits representing an alphanumeric character, commonly referred to as, simply, text).
  • 16. Enter layer 6—the Presentation layer. The Presentation layer is responsible for formatting and code conversion between systems. This layer accepts the data from the Application layer and ensures it is placed in a format the end station can understand. In this case, the e-mail is in text mode, and another protocol, like MIME, translates the jpg into ASCII for transit. Once received at the far end, the recipient’s Presentation layer will perform the reverse, handing the data back to the Application layer protocol. Encryption is another function of the Presentation layer
  • 17. Layer 5—the Session layer:—is perhaps the most enigmatic and troublesome of the entire stack. This layer doesn’t necessarily do anything to the data at all. Instead, its function is to work in the background, ensuring the communications process between two systems runs smoothly. The Delivery Layers:-
  • 18. Transport layer: Transport the data from receiver to sender. The three main functions: 1. Segmentation. 2. The reliable delivery 3. Flow control
  • 19. Segmentation is simply taking a small piece of the bits making up the data as a whole. A small header is put in front of these bits. Inside the header is all sorts of information, including: The Network layer is responsible for logical addressing and routing.
  • 20. Receiving a segment from the Transport layer, the Network layer adds a header that includes a source and destination logical (network) address. This address is read by layer-3 devices (routers) and best path determinations are made to deliver the segment to its final destination
  • 21. Network Components Physical Layer Devices: Physical layer devices do nothing more than physically connect wiring together to complete a path, or change the connection from one type to another. Examples of physical layer devices include transceivers, repeaters, and hubs. Transceivers connect one media type to another, such as a fiber connection to a copper one. Repeaters are used to extend the range of a given media—whatever they take in one port, they regenerate and repeat out the other. Hubs are nothing more than multiport repeaters. Comparatively, where a repeater takes bits in one port to relay to another, hubs have several ports they accept and relay bits on.
  • 22. Data Link Layer Devices Layer-2 devices include bridges and switches. Switches and bridges split (or segment) collision domains, decrease network traffic problems, and increase effective available bandwidth to hosts. However, keep in mind they are incapable of moving traffic outside your LAN.
  • 23. Network Layer Devices Network layer devices play a unique role in your network design. These devices read the Logical network addresses on your data and make decisions about which route to send the data. This sounds very much like the switches and bridges discussed earlier, but keep in mind the layer-3 device not only knows which port to send the data out, but also the best route through outside networks to its final destination. Continuing the analogy from earlier, if the street address on your letter is akin to the physical address of your hosts, the logical address used by layer-3 devices is equivalent to the ZIP code.
  • 24. Other Devices Networks can also include a variety of other devices, such as firewalls, gateways, and proxies. A firewall is a device that typically works at layers 3 and 4, and is used to filter network traffic based upon rules the administrator configures on the device. Generally placed between your network and the Internet, firewalls work on an implicit deny principle—if you do not explicitly allow the traffic, it is blocked.
  • 25. Gateways work at all layers and are generally used to connect networks and applications of different types together. A proxy is a system that provides a specific service to a host. For example, a web proxy will make requests to the Internet for web content on behalf of a host. This increases security and performance since web traffic coming from your network appears from only one system, and hosts can access cached pages on the proxy instead of going out to find them. Generally speaking, these devices are usually placed between your network and the Internet in a special network called a DMZ