SlideShare a Scribd company logo
1 of 17
Networking Essentials 
Chapter 2 
Networking Standards and the 
OSI model 
Networking Essentials – Eric Vanderburg © 2005
Standards 
 Specifications on how a product or service should be 
performed, implemented, or constructed. 
 Standards Organizations 
 ANSI (American National Standards Institute) 
 EIA/TIA (Electronic Industries Alliance / 
Telecommunications Industry Alliance) 
 IEEE (Industry of Electrical and Electronics 
Engineers) 
 ISO (International Organization for Standardization) 
 ITU (International Telecommunication Union) 
 ISOC (Internet Society) 
• IAB (Internet Architecture Board) 
• IETF (Internet Engineering Task Force) 
 IANA (Internet Assigned Numbers Authority) 
 ICANN (Internet Corporation for Assigned Names & 
Numbers)
OSI Reference Model 
Application Application 
Presentation Presentation 
Session Session 
Transport Transport 
Network Network 
Datalink Datalink 
Physical Medium Physical
OSI Reference Model 
 How to remember this 
 Please Do Not Throw Sausage Pizza Away 
 Androids Provide Services To Needy Desperate People 
 Think of your own… 
 3 Sections of the Model 
 Application 
• Application Layer (7) 
• Presentation Layer (6) 
• Session Layer (5) 
 Transport 
• Transport Layer (4) 
 Network 
• Network Layer (3) 
• Datalink Layer (2) 
• Physical Layer (1)
Encapsulation 
 Enclosing some data within another thing so 
that the included data is not apparent.
Application – Layer 7 
 Where programs access network 
services 
 FTP (File Transfer Protocol), HTTP 
(HyperText Transfer Protocol), Client 
Software APIs (Application 
Programming Interface) 
 Problems at this layer: 
Misconfigured settings 
Incompatible commands
Presentation – Layer 6 
 Formats data 
 Encryption & Compression 
 Character set 
 ASCII (American National Standard Code for 
Information Interchange) 
 Unicode 
 EBCDIC (Extended Binary Coded Decimal 
Interchange Code) 
 Problems at this layer: 
 Cannot decrypt 
Wrong conversion
Session – Layer 5 
 Session – connection for ongoing data exchange 
 Manages communication 
 Identification / Authorization 
 Window size 
 Keep alive messages 
 ACK (Acknowledgement), NAK (Negative 
Acknowledgement) 
 Name resolution 
 DNS (Domain Naming Service) 
 NetBIOS (Network Basic Input Output System) 
 Problems at this level: 
 Incorrect or no name resolution
Transport – Layer 4 
 Segmenting 
 Reduce size to the MTU (Maximum 
Transmission Unit) 
 Sequencing 
 Integrity checking (Checksum) 
 Flow control – as much data as can handle 
 TCP (Transmission Control Protocol) & SPX 
(Sequenced Packet Exchange) 
 Problems at this layer: 
Overly large segments
Network – Layer 3 
 Logical addressing 
 Routing 
 QOS (Quality of Service) 
 Deals with packets 
 IP (Internet Protocol) & IPX (Internetwork Packet 
Exchange) 
 Problems at this layer: 
 Incorrect routing (bad config) 
 Incorrect routing table 
 Incorrect routing protocol 
 Incorrect IP configuration
Datalink – Layer 2 
 Physical Addressing 
 Deals with frames 
 Discards bad frames 
 Convert to bits 
 Problems at this layer: 
 Collisions 
 Bad frames 
 Faulty NIC 
 Incorrect bridging tables
Datalink Sublayers 
 MAC (Media Access Control) 
Manages multiple NICs 
 Append physical address 
 Creates frame and sends to physical 
 Carrier Sense 
 Pass tokens 
 LLC (Logical Link Control) 
 Error recovery – A 4 byte number is generated 
to check for errors. The number is stored in 
the FCS (Frame Check Sequence) using the 
CRC (Cyclic Redundancy Check) algorithm.
Physical – Layer 1 
 Encoding - Convert bits to signals 
 101001011001 
 Light impulses 
 Electronic signals 
 Radio waves 
 Problems at this level: 
 Interference 
 Noise 
 Cable not connected
OSI & TCP/IP 
OSI Model TCP/IP 
Application Application 
Presentation 
Session Transport 
Transport 
Network Internet 
Datalink Network 
Physical
IEEE Specifications 
 802.3 Ethernet 
 802.5 Token Ring 
 802.11 Wireless
Acronyms 
 ACK, Acknowledgement 
 NAK, Negative Acknowledgement 
 ANSI, American National Standards Institute 
 ASCII, American National Standard Code for 
Information Interchange 
 API, Application Program Interface 
 CRC, Cyclic Redundancy Check 
 EIA, Electronic Industries Alliance 
 EBCDIC, Extended Binary Coded Decimal 
Interchange Code 
 HTTP, HyperText Transfer Protocol 
 FTP, File Transfer Protocol 
 DNS, Domain Naming Service
Acronyms 
 NetBIOS, Network Basic Input Output System 
 IANA, Internet Assigned Numbers Authority 
 ICANN, Internet Corporation for Assigned Names and 
Numbers 
 IEEE, Institute of Electrical and Electronics Engineers 
 IP, Internet Protocol 
 ISO, International Organization for Standardization 
 ITU, International Telecommunication Union 
 LLC, Logical Link Control 
 MAC, Media Access Control 
 MTU, Maximum Transmission Unit 
 OSI, Open Systems Interconnection 
 PDU, Protocol Data Unit 
 RIR, Regional Internet Registry 
 TIA, Telecommunications Industry Association

More Related Content

What's hot

Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcp
Agrippa Mungazi
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol Functions
Gayathri Kesavan
 

What's hot (20)

Protocols
ProtocolsProtocols
Protocols
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
Osi model
Osi modelOsi model
Osi model
 
OSI MODEL AND ITS PROTOCOL
OSI MODEL AND ITS PROTOCOLOSI MODEL AND ITS PROTOCOL
OSI MODEL AND ITS PROTOCOL
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcp
 
OSI models
OSI modelsOSI models
OSI models
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
OSI Layering
OSI Layering OSI Layering
OSI Layering
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Osi model
Osi modelOsi model
Osi model
 
Osi model
Osi modelOsi model
Osi model
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
Iso model
Iso modelIso model
Iso model
 
Osi models
Osi modelsOsi models
Osi models
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol Functions
 
Osi model
Osi modelOsi model
Osi model
 
Computer Networks - Layers in OSI Model
Computer Networks - Layers in OSI ModelComputer Networks - Layers in OSI Model
Computer Networks - Layers in OSI Model
 
OSI MODEL - A PROJECT
OSI MODEL - A PROJECTOSI MODEL - A PROJECT
OSI MODEL - A PROJECT
 

Similar to Networking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg

Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
ahmady
 
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptxCCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
BabarYunus1
 
osi-tcp ppt 1.pptx........................
osi-tcp ppt 1.pptx........................osi-tcp ppt 1.pptx........................
osi-tcp ppt 1.pptx........................
swarnimprateek
 
640 802-study-guide-sample
640 802-study-guide-sample640 802-study-guide-sample
640 802-study-guide-sample
rickybcool
 

Similar to Networking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg (20)

Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
 
CCNA
CCNACCNA
CCNA
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
 
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptxCCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
 
Networking Concepts Lesson 05 - OSI - Eric Vanderburg
Networking Concepts Lesson 05 - OSI - Eric VanderburgNetworking Concepts Lesson 05 - OSI - Eric Vanderburg
Networking Concepts Lesson 05 - OSI - Eric Vanderburg
 
Learn basics of ip addressing
Learn basics of  ip addressingLearn basics of  ip addressing
Learn basics of ip addressing
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
 
Osi and tcp ip model
Osi and tcp ip modelOsi and tcp ip model
Osi and tcp ip model
 
osi-tcp.ppt
osi-tcp.pptosi-tcp.ppt
osi-tcp.ppt
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Chapter02 -- networking standards and the osi model
Chapter02  -- networking standards and the osi modelChapter02  -- networking standards and the osi model
Chapter02 -- networking standards and the osi model
 
osi-tcp ppt 1.pptx........................
osi-tcp ppt 1.pptx........................osi-tcp ppt 1.pptx........................
osi-tcp ppt 1.pptx........................
 
640 802-study-guide-sample
640 802-study-guide-sample640 802-study-guide-sample
640 802-study-guide-sample
 
Network management
Network managementNetwork management
Network management
 
ACIT Mumbai - Open Systems Interconnect
ACIT Mumbai - Open Systems InterconnectACIT Mumbai - Open Systems Interconnect
ACIT Mumbai - Open Systems Interconnect
 
ACIT Mumbai - OSI Model
ACIT Mumbai - OSI ModelACIT Mumbai - OSI Model
ACIT Mumbai - OSI Model
 

More from Eric Vanderburg

Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 

More from Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Networking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg

  • 1. Networking Essentials Chapter 2 Networking Standards and the OSI model Networking Essentials – Eric Vanderburg © 2005
  • 2. Standards  Specifications on how a product or service should be performed, implemented, or constructed.  Standards Organizations  ANSI (American National Standards Institute)  EIA/TIA (Electronic Industries Alliance / Telecommunications Industry Alliance)  IEEE (Industry of Electrical and Electronics Engineers)  ISO (International Organization for Standardization)  ITU (International Telecommunication Union)  ISOC (Internet Society) • IAB (Internet Architecture Board) • IETF (Internet Engineering Task Force)  IANA (Internet Assigned Numbers Authority)  ICANN (Internet Corporation for Assigned Names & Numbers)
  • 3. OSI Reference Model Application Application Presentation Presentation Session Session Transport Transport Network Network Datalink Datalink Physical Medium Physical
  • 4. OSI Reference Model  How to remember this  Please Do Not Throw Sausage Pizza Away  Androids Provide Services To Needy Desperate People  Think of your own…  3 Sections of the Model  Application • Application Layer (7) • Presentation Layer (6) • Session Layer (5)  Transport • Transport Layer (4)  Network • Network Layer (3) • Datalink Layer (2) • Physical Layer (1)
  • 5. Encapsulation  Enclosing some data within another thing so that the included data is not apparent.
  • 6. Application – Layer 7  Where programs access network services  FTP (File Transfer Protocol), HTTP (HyperText Transfer Protocol), Client Software APIs (Application Programming Interface)  Problems at this layer: Misconfigured settings Incompatible commands
  • 7. Presentation – Layer 6  Formats data  Encryption & Compression  Character set  ASCII (American National Standard Code for Information Interchange)  Unicode  EBCDIC (Extended Binary Coded Decimal Interchange Code)  Problems at this layer:  Cannot decrypt Wrong conversion
  • 8. Session – Layer 5  Session – connection for ongoing data exchange  Manages communication  Identification / Authorization  Window size  Keep alive messages  ACK (Acknowledgement), NAK (Negative Acknowledgement)  Name resolution  DNS (Domain Naming Service)  NetBIOS (Network Basic Input Output System)  Problems at this level:  Incorrect or no name resolution
  • 9. Transport – Layer 4  Segmenting  Reduce size to the MTU (Maximum Transmission Unit)  Sequencing  Integrity checking (Checksum)  Flow control – as much data as can handle  TCP (Transmission Control Protocol) & SPX (Sequenced Packet Exchange)  Problems at this layer: Overly large segments
  • 10. Network – Layer 3  Logical addressing  Routing  QOS (Quality of Service)  Deals with packets  IP (Internet Protocol) & IPX (Internetwork Packet Exchange)  Problems at this layer:  Incorrect routing (bad config)  Incorrect routing table  Incorrect routing protocol  Incorrect IP configuration
  • 11. Datalink – Layer 2  Physical Addressing  Deals with frames  Discards bad frames  Convert to bits  Problems at this layer:  Collisions  Bad frames  Faulty NIC  Incorrect bridging tables
  • 12. Datalink Sublayers  MAC (Media Access Control) Manages multiple NICs  Append physical address  Creates frame and sends to physical  Carrier Sense  Pass tokens  LLC (Logical Link Control)  Error recovery – A 4 byte number is generated to check for errors. The number is stored in the FCS (Frame Check Sequence) using the CRC (Cyclic Redundancy Check) algorithm.
  • 13. Physical – Layer 1  Encoding - Convert bits to signals  101001011001  Light impulses  Electronic signals  Radio waves  Problems at this level:  Interference  Noise  Cable not connected
  • 14. OSI & TCP/IP OSI Model TCP/IP Application Application Presentation Session Transport Transport Network Internet Datalink Network Physical
  • 15. IEEE Specifications  802.3 Ethernet  802.5 Token Ring  802.11 Wireless
  • 16. Acronyms  ACK, Acknowledgement  NAK, Negative Acknowledgement  ANSI, American National Standards Institute  ASCII, American National Standard Code for Information Interchange  API, Application Program Interface  CRC, Cyclic Redundancy Check  EIA, Electronic Industries Alliance  EBCDIC, Extended Binary Coded Decimal Interchange Code  HTTP, HyperText Transfer Protocol  FTP, File Transfer Protocol  DNS, Domain Naming Service
  • 17. Acronyms  NetBIOS, Network Basic Input Output System  IANA, Internet Assigned Numbers Authority  ICANN, Internet Corporation for Assigned Names and Numbers  IEEE, Institute of Electrical and Electronics Engineers  IP, Internet Protocol  ISO, International Organization for Standardization  ITU, International Telecommunication Union  LLC, Logical Link Control  MAC, Media Access Control  MTU, Maximum Transmission Unit  OSI, Open Systems Interconnection  PDU, Protocol Data Unit  RIR, Regional Internet Registry  TIA, Telecommunications Industry Association