Você está na página 1de 4

Networking 1 Lab 3 The OSI Model In this lab you will learn about the OSI model as a method

of understanding modern computer networks.

Background Information
Scientists and engineers often refer to models to explain complex systems, and a computer network is no exception. In forthcoming chapters you will learn about one of the oldest networking models, the TCP/IP model, which has existed both in model and in practice since the 1970s. Today, we focus on the OSI model 1. If we already had the TCP/IP model, why was the more complicated OSI model created? According to a tcpipguide.com website TCP/IP replaced OSI. 2. What does the abbreviation OSI stand for? Who originated it? When? open system interconnection, according to Wikipedia The OSI model was defined in raw form in Washington DC in February 1978 by Hubert Zimmerman of France and the refined standard was published by the ISO in 1984. According to TCIPguide.com In the late 1970s, two projects began independently, with the same goal: to define a unifying standard for the architecture of networking systems. One was administered by the International Organization for Standardization (ISO), while the other was undertaken by the International Telegraph and Telephone Consultative Committee, or CCITT (the abbreviation is from the French version of the name). These two international standards bodies each developed a document that defined similar networking models. In 1983, these two documents were merged together to form a standard called The Basic Reference Model for Open Systems Interconnection

3. A mnemonic is a memory device used to help remember lists. A common mnemonic about the colors of the rainbow is ROY G. BIV. There are several mnemonics in use for the seven layers of the OSI model. Find one you like, or create your own and complete the following OSI model chart. People Do Not Throw Stuff Please Ask Layer # 7 Layer Name Application Mnemonic Data Keywords & Description of Function Network process to application File transfer E-mail

6 5

Presentation Session

Data E-mail FTP HTTP TCP UDP SCTP IP IPX

Data representation and encryption Translates from application to network format Interhost communication Manages connections between applications Flow control Retransmit lost info Records info out of sequence Organizes packets into segments Organizes packets from frames Routing decisions Routers Best effort delivery Ethernet Frame relay SONET allow for interconnecting fiber optics Error control CSMA/CD MAC Switches bridges NICs Multiplex layers Sends bits Cable and connectors Hubs and receptors

Transport

Network

Data link

Frames

Physical

bits

4. Network Devices When considering networking devices, the various devices function at different layers of the OSI model. Most devices operate strictly in layer 1, fewer function in layers 1 & 2, while only the most intelligent devices work in layers 3, 2 & 1. Determine the highest layer of operation for the following network devices: switch, hub, NIC, router, cable media, wireless access point. patch panel, repeater, bridge. 5. Data Link Layer Devices that function at layer 2 work in close conjunction with layer 1 (physical layer) devices. Therefore, layer 2 devices communicate using hardware encoded physical addresses . What is another name for a physical address? How many bits do they require? When two machines attempt to transmit simultaneously on the same media segment, both messages become garbled and unintelligible. What is this condition normally called? Physical address is also known as the MAC address. 4 bytes make up a MAC address. When two machines attempt to transmit at the same time there is a collision.

6. Command prompt. On Windows machines, it looks like the good old DOS prompt, and you use it to execute commands that you type. Click start->run then type cmd and hit enter. (On Mac use Applications -> Utilities -> Terminal) You should see a window with a DOS style screen. Lets find out what your IP address is by typing ipconfig /all (ifconfig on Mac). What is your IP address? What is your MAC address? Physical address 78-ac-c0-4a-3b-b3 IP 2001:9d38:6ab8:14d0:d8c9:baed:ae4 7. ARP ends in a P so what does that often signify? What does ARP stand for & what does it do? At the command prompt type arp d *. This command clears your arp table. Type arp a to verify there are currently no entries in the arp table. Now ping your neighbors computer by typing ping and their IP address. Did you get a reply? If not, be sure the windows firewall is turned off. Why is ping useful? Retype arp a and record any changes. What is your neighbors physical address? Have your neighbor verify their physical address. Is it what is displayed in your arp table? Add two more entries to the arp table by pinging two other machines in the lab. What address is added to the arp table when you ping www.sal.ksu.edu? Why? P stands for protocol. As a whole it stands for Address Resoltion Protocol. 8. If a packet comes in from another network, only a layer 3 (IP) address is known. But direct machine to machine communication only occurs at layer 2. What method is used to translate a known layer 3 address into an unknown layer 2 address? Frames? 9. Network Layer Layer 3 devices allow the interconnectivity of different local area networks through gateways. What are layer 3 gateway devices called? They use logical, or software encoded addresses. Many types of software addresses have been developed and used. What is the de-facto standard for logical addresses used today? How many bits do they require? 10. You can verify connectivity by pinging a device, but you can get more information by running a trace route to the main campus webserver. Type tracert www.ksu.edu in a command prompt (traceroute www.ksu.edu on Mac). What kind of information does tracert provide? Now try typing tracert www.kwu.edu (traceroute www.kwu.edu on Mac). The server at Kansas Wesleyan in Salina is physically much closer than the K-State server in Manhattan, but through the Internet, it is much farther away. Describe the path a ping packet must follow to get from K-State Salina to Kansas Wesleyan. Tip: Install the windows app vr.exe found on KSOL under modules>labs>utilities. This free trial software provides information about host locations. 11. Connect two computers to the labs Cisco Catalyst switch. Connect your PCs serial port to the switches management console port with a blue management cable. Open Accessories>communications>hyperterminal. Create a new connection, give it a name, connect using COM1, set bits per second to 9600 and flow control none, and hit enter. If your console is still blank, hit enter once or twice more to try to establish communication with the switch. You should eventually get to a prompt that looks like: tc171sw>

type show mac-address-table What information is provided in the switch MAC address table? Does the MAC address shown in the table match the MAC address of the computer that is connected?

Você também pode gostar