Detailed explanation of the network model splitting in the network. I finally understood it after being troubled for a long time. Take a look at it in one minute

Detailed explanation of the network model splitting in the network. I finally understood it after being troubled for a long time. Take a look at it in one minute

Seven-layer model decomposition

From the application layer to the bottom:

1. Application layer

The Application layer, as the interface between the actual application and the presentation layer, delivers the application's relevant information to the lower layers of the protocol stack in some way. It is just an interface for the application and will only work when remote resources need to be processed. The application layer is also responsible for identifying and establishing the availability of the computer that wants to communicate.

[[283006]]

2. Presentation layer

The presentation layer is named after its purpose. It provides data to the application layer and is responsible for data conversion and code formatting. It mainly provides data compression, encryption and conversion services, such as tiff, jpeg, midi, rtf, etc.

3. Session layer

Responsible for establishing, managing and terminating session connections between presentation layer entities, it coordinates the communication process between systems and provides three different ways to organize the communication between them: full duplex, half duplex, and simplex (full duplex, half duplex simplex) communication. In short, the session layer is basically used to keep the data of different applications isolated from the data of other applications.

Some examples of Session layer protocols and interfaces:

  • Network File System (NFS)
  • Structured Query Language(SQL)
  • Remote Procedure Call (RPC)
  • X Window
  • AppleTalk Session Protocol
  • Digital Network Architecture Session Control Protocol (DNA SCP)

4. Transport layer

Segment and reassemble data into data streams. TCP and UDP both work at the transport layer. When using the TCP/IP protocol, program developers can choose between the two. The transport layer is responsible for implementing multiplexing of upper-layer applications, establishing session connections, and providing mechanisms to disconnect virtual circuits. By providing transparent data transmission, it also hides any network-related details from the upper layer.

(1) Flow control:

Data integrity can be ensured by performing flow control at the transport layer and by allowing users to request reliable data transmission between systems. Flow control prevents the sending host on one side of the connection from overflowing the receiving host's buffer. Buffer overflow will result in incomplete data. If the data sender transmits data too quickly, the receiver temporarily stores the datagrams in the buffer. Reliable data transmission uses connection-oriented

(connection-oriented) communication mode, ensuring:

  • After receiving the transmitted segment, the receiver will send an acknowledgment back to the sender.
  • Any segments that are not acknowledged will be retransmitted.
  • The segments should be in proper order before reaching the recipient.
  • Manageable flow control techniques to avoid congestion, overloading, and data loss

connection-oriented communication:

In reliable transport layer operation, a device that wants to transmit establishes a connection with a remote device by creating a session, commonly known as the 3-way handshake protocol.

(2) Handshake protocol: (three-way handshake);

  • The first "Connection Accepted" segment is used to request synchronization.
  • The second and third segments are used to confirm the request and establish the connection parameters between the hosts. Here, the receiving side's sequencing also requires synchronization in order to establish a two-way connection.
  • The last data segment is also used for confirmation. It notifies the destination host that it has agreed to establish a connection and has actually established a connection.

When the amount of data transmitted is too large, some problems may occur. A machine receives a large number of data packets too quickly, causing the buffer to overflow and eventually having to discard all subsequent data packets. But don't worry, there is a flow control system in the network. In this case, the receiver will send a not ready signal, and after processing, it will send a ready, go on signal to continue transmission. Flow control types: window mechanism, buffering and congestion avoidance.

a. Windowing

The number of data segments that the sender is allowed to send without receiving an acknowledgment is called the window.

The size of the window controls how much information is transmitted from one end to the other. Although some protocols quantify information in terms of the number of packets, TCP/IP quantifies information by counting the number of bytes.

b. Confirmation

In order to ensure that data transmission is not repeated and lost, it can be achieved through "positive confirmation with retransmission". The method is to require the receiver to send a confirmation message to the sender when receiving the data to maintain communication with the sender's machine. When sending a data packet, the sender starts a timer. If no confirmation is received from the other party within the specified time, it will display request time out and resend it.

5. Network layer

Responsible for device addressing, tracking the location of devices in the network, and determining the best path to send data. Routers and layer 3 switches work at this layer.

How routing works:

First, a packet is received, then its destination IP is checked, the routing table is queried, the best path is selected, an interface is selected, and the packet is sent to that port, encapsulated into a frame, and sent out of the local network. If the corresponding destination network entry is not found in the routing table, the packet is automatically discarded. The network layer has two types of packets: data packets and router update packets. The former, obviously, is used to transmit user data. The latter is used to notify adjacent routers of update information of all routers connected to the network. This protocol is an active routing protocol, such as RIP EiGRPOSPF.

Routing table:

  1. CCIE Routing and Switching note by Ka\(^oo^)/Ka  
  2. Part 1. - 4 -

Contains the following information:

  • Network Address: They are network addresses associated with a specific protocol.
  • Interface: When a packet is sent to a specific network, the packet will select an outgoing interface
  • Metric: Refers to the distance to the remote network. Different protocols use different metrics.

Router features:

  • Shield broadcast and multicast packets (multicast)
  • Use the logic address, which exists in the header of the network layer and is used to determine the routing address of the next hop
  • Manageable, create access lists
  • It provides Layer 2 bridging functionality and delivers it over the same interface.
  • Can provide connections between VLANs
  • Provide quality of service (QoS)

6. Data link layer

The Data Link layer is responsible for the physical transmission of data, error detection, network topology and flow control. This means that on the data LAN, delivery will be made based on the hardware address, and the Network layer packets will be translated into bits for transmission on the Physical layer.

The Data Link layer of IEEE Ethernet has 2 sublayers:

  • Media Access Control (MAC) 802.3: This layer defines physical addresses and topology, error detection, flow control, etc. Shared bandwidth, first come/first served principle (first come/first served)
  • Logical Link Control (LLC) 802.2: Responsible for identifying the Network layer protocol and then encapsulating the data. The LLC header information tells the Data Link layer how to handle the received frame. LLC also provides flow control and control bit numbering.
    1. Switches and Bridges at the Data Link Layer

The second layer of devices, switches, are considered hardware-based bridges because they use a special type of hardware called an application-specific integrated circuit (ASIC). ASICs can reach gigabit speeds with very low latency; bridges are software-based.

Delay: The time it takes for a frame to reach the outgoing port from the incoming port.

Transparent bridging: If the target device and the frame are in the same network segment, the layer 2 device will block the port to prevent the frame from being transmitted to other network segments; if the target device is in a different network segment, the frame will only be transmitted to the network segment where the target device is located. Each network segment connected to switches must have the same type of devices. For example, you cannot mix hosts on Token Ring and hosts on Ethernet with switches. This method is called media translation, but you can use routers to connect different types of networks. The advantages of using switches over hubs in a LAN are:

  • Devices plugged into switches can transmit data simultaneously, but hubs cannot.
  • In switches, each port is in a separate collision domain, while all ports of hubs are in a large collision domain. As you can imagine, the former can effectively increase bandwidth in the LAN. However, all ports of these two devices are still in a large broadcast domain.

7. Physical layer

The Physical layer is responsible for sending and receiving bits, which are composed of 1 or 0. This layer is also used to identify the interface between data terminal equipment (DTE) and data communication equipment (DCE). DCE is usually located in the service provider and DTE is usually an auxiliary device. The available DTE services are usually accessed through a modem or channel service unit/data service unit (CSU/DSU) to hubs: they are actually multi-port repeaters that re-amplify the signal to solve problems such as long lines and signal attenuation.

1 Physical star topology, actually a logical bus topology:

<<:  12 Questions about Routing! Do you know all of them?

>>:  The TRUST principle for 6G network performance experience

Recommend

Quickly understand the characteristics and differences of HTTP1.0 1.1 2.0 3.0

HTTP1.0 HTTP version 1.0 is a stateless, connecti...

OpLink: $3.50/month-AMD Ryzen/512MB/20GB NVMe/10Gbps ports

OpLink is a foreign hosting company founded in 19...

Manufacturers begin to correct mistakes, is 5G adjusting its direction?

It has been more than two years since the country...

How to connect a switch Switch usage tutorial

In the era of popular Internet, many families hav...

Nokia deploys 5G SA private network for crane manufacturer Konecranes

Nokia has announced a partnership with EDZCOM, a ...

Can PVC pipes be used for weak current wiring in home decoration?

The standards currently implemented for PVC threa...