building a network with the osi model
TRANSCRIPT
![Page 1: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/1.jpg)
Building a Network with the Building a Network with the OSI ModelOSI Model
Chapter 2Chapter 2
![Page 2: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/2.jpg)
ObjectivesObjectivesObjectivesObjectives• Describe models such as the OSI seven-layerDescribe models such as the OSI seven layer
model• Explain the major functions of networkExplain the major functions of network
hardware with OSI Layers 1-2• Describe the functions of network software
with OSI Layers 3-7
![Page 3: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/3.jpg)
OverviewOverview
![Page 4: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/4.jpg)
The CompTIA Network+ ChallengeThe CompTIA Network+ ChallengeThe CompTIA Network+ ChallengeThe CompTIA Network+ Challenge
• Understand every aspect of networking• Understand every aspect of networking– Use the Open Systems Interconnect (OSI)
modelmodel– Conceptualize the parts of a network
![Page 5: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/5.jpg)
• The OSI Seven-Layer Model providesThe OSI Seven-Layer Model provides– A powerful tool for diagnosing
problemsproblems– A common language to describe
networksnetworks
![Page 6: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/6.jpg)
Figure 2.1 Using the OSI terminology – Layer 3 –in a typical setup screen
![Page 7: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/7.jpg)
Working with ModelsWorking with Models
![Page 8: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/8.jpg)
Biography of a Model• What does “model” mean to you?
– Computer models that predict weatherPlastic model airplane– Plastic model airplane
– Fashion model
Figure 2.2 Types of Models
![Page 9: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/9.jpg)
A model has all the major f ti f th l itfunctions of the real item
Figure 2.3 Simple model airplane
![Page 10: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/10.jpg)
The OSI sevenThe OSI seven--layer modellayer model• What functions define all networks?
The OSI sevenThe OSI seven--layer modellayer model
• What details can be omitted?• ISO (International Organization for• ISO (International Organization for Standardization) proposed the OSI seven‐layer modelseven layer model
![Page 11: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/11.jpg)
Layer 7 - Application
Layer 6 - Presentation
S
The Seven The Seven Layers in ActionLayers in Action Layer 5 - Session
Layer 4 - Transport
Layers in ActionLayers in Action
The OSI Model Layer 3 - Network
Layer 2 - Data Link
Layer 1 - PhysicalLayer 1 - Physical
![Page 12: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/12.jpg)
Welcome to Welcome to MHTechEdMHTechEd!!A conceptual viewpoint of networkingof networking
– One of the workers has just completed a newjust completed a new employee handbook
– She needs to transfer the Word document to the other worker for
Figure 2.4 Janelle and Tiffany, hard at work
review
![Page 13: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/13.jpg)
She could…• Copy the file to a flash drive and walk it• Copy the file to a flash drive and walk it over to the other person (sneakernet)T f h fil i h k• Transfer the file using the network
![Page 14: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/14.jpg)
Let’s Get Physical…Let’s Get Physical…d i h k h dd i h k h dand examine the network hardware and examine the network hardware
components required for this transfercomponents required for this transfer
![Page 15: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/15.jpg)
CablingCablingCablingCabling• Most networks use a cable• Most networks use a cable,
like this one, as a physical channel to move the bits of data
Unshielded Twisted PairUnshielded Twisted Pair (UTP) cable
Figure 2.5 UTP cabling
![Page 16: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/16.jpg)
HubsHubsHubsHubs• Each computer system has
a cable leading to a device gcalled a hub– Usually located in a closet
• The hub sends the data received from one system to all the other systemsto all the other systems attached to it
Figure 2.6 Typical hub
![Page 17: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/17.jpg)
Figure 2.7 The network so far, with the Physical layerhardware
![Page 18: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/18.jpg)
Network Interface CardsNetwork Interface Cards• Network Interface Cards (NICs) are installed in PCs
• Network cables attach to the NICs
Figure 2.8 Typical NIC
![Page 19: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/19.jpg)
NIC to Hub ConnectionsNIC to Hub Connections• Cables run from the NIC in the PC to a jackNIC in the PC to a jack on the wall
• Cables run through the gwalls to the closet where they connect to a hub
Fig re 2 9 NIC ith cable connectFigure 2.9 NIC with cable connect-ing the PC to the wall jack
![Page 20: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/20.jpg)
Network Cabling SystemNetwork Cabling System
Figure 2.10 The MHTechEd network
![Page 21: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/21.jpg)
The NIC MAC address printed on surface of chip – and burned
• Each system must have a unique identifier
pinside the chip.
identifier• Media Access Control (MAC) address– A unique address burned
into a ROM chip on the network card
– Each MAC address is 12Each MAC address is 12 hex characters or 48 bits in length
Figure 2.11 MAC address
![Page 22: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/22.jpg)
MAC AddressesMAC Addresses• MAC addresses are 48‐bits long• Usually represented using hexadecimal characters• Usually represented using hexadecimal characters (12 hex digits = 48 bits)– A typical MAC address:
004005‐607D49
Organizationally unique identifier (OUI)
Device ID
No two MAC addresses are ever the same!
![Page 23: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/23.jpg)
ipconfig /all
MAC address
Figure 2.12 Output from IPCONFIG/ALL
![Page 24: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/24.jpg)
Moving DataMoving DataMoving DataMoving Data
Figure 2.13 Data moving along a wireg g g
![Page 25: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/25.jpg)
Moving DataMoving Datagg
Figure 2-14: Oscilloscope of data
![Page 26: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/26.jpg)
Moving DataMoving Datagg
Figure 2.15 Data as ones and zeroes
![Page 27: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/27.jpg)
Frames
Figure 2-16 Inside the NIC
![Page 28: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/28.jpg)
Inside a frameInside a frame• Frames are made up of fields that contain informationinformation
• Frames contain the recipient’s MAC address, the sender’s MAC address, the data itself, and a cyclic , , yredundancy check (CRC) for error checking
Figure 2.17 Generic frame
![Page 29: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/29.jpg)
Frame as a canisterFrame as a canister
Fig re 2 18 Frame as a canisterFigure 2.18 Frame as a canister
![Page 30: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/30.jpg)
Frame SizeFrame SizeFrame SizeFrame Size• Different networks use different sizes of framesframes
• Many frames hold about 1500 bytes of data• The sending software breaks up large amounts of data into smaller chunks
• The receiving station must then put the chunks back together in the proper orderg p p
![Page 31: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/31.jpg)
Processing FramesProcessing FramesProcessing FramesProcessing Frames• All devices on the network see the frame, b t l th d i th t it i dd d tbut only the device that it is addressed to will process it– Every frame is received by every NICEvery frame is received by every NIC– The MAC address is used to decide if the frame belongs to a given device
![Page 32: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/32.jpg)
Getting Data on the LineGetting Data on the Linegg• Since the cable is shared, only one system may speak at a time
• Processes are used to keep two NICsProcesses are used to keep two NICs from talking at the same time
![Page 33: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/33.jpg)
Incoming Frame!Incoming Frame!
Figure 2.19 Incoming frame!
![Page 34: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/34.jpg)
Getting To Know YouGetting To Know You• Usually two devices have talked before, so the destination MAC address is alreadythe destination MAC address is already known
• If the MAC address is not known, a broadcastIf the MAC address is not known, a broadcast message is sent over the network– The destination device will respond by sending its MAC address
– A MAC broadcast address is FF‐FF‐FF‐FF‐FF‐FF
![Page 35: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/35.jpg)
Figure 2.20 Building the frame
![Page 36: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/36.jpg)
Figure 2.21 Adding the data and CRC to the frame
![Page 37: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/37.jpg)
Figure 2.22 Sending the frame
![Page 38: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/38.jpg)
Figure 2.23 Reading an incoming frame
![Page 39: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/39.jpg)
After the frame is receivedAfter the frame is receivedAfter the frame is receivedAfter the frame is received• The receiving station checks the CRC value in
the frame– If the value matches what it should, then the NIC
sends the data portion to the network operatingsends the data portion to the network operating system for processing
– If the value does not match, the frame has errors and must be resentmust be resent
![Page 40: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/40.jpg)
The TwoThe TwoThe Two The Two Aspects of NICsAspects of NICsAspects of NICsAspects of NICs
Figure 2.24 Layer 1 and Layer 2 are now properly applied to the network
![Page 41: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/41.jpg)
Figure 2.25 LLC and MAC, the two parts of the Data Link Layer
![Page 42: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/42.jpg)
Beyond the Single Wire Beyond the Single Wire ––y gy gNetwork SoftwareNetwork Softwareand Layers 3 and Layers 3 –– 77
![Page 43: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/43.jpg)
SubnetsSubnets
Figure 2 26 Large LAN complete (left)Figure 2.26 Large LAN complete (left), and broken into two subnets (right)
![Page 44: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/44.jpg)
Network ProtocolsNetwork Protocols• Network protocols define rules for how systems
dd d h t h d t i t h kare addressed, how to chop data up into chunks, how to deal with routers, and so on
• As a network grows a more universal address-• As a network grows, a more universal address-ing method than MAC addresses is needed
• TCP/IP: – Transmission Control Protocol (TCP)– Internet Protocol (IP)
![Page 45: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/45.jpg)
IP IP –– Playing on Layer 3, the Playing on Layer 3, the Network LayerNetwork Layer• IP address: a unique numeric identifier• An IP address is a logical address while a g
MAC address is a physical address• IP uses a dotted-decimal notation• Each 8-bit number ranges from 0 to 255
– Example: 192.168.4.232N t t th t k h• No two systems on the same network share the same IP address
![Page 46: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/46.jpg)
• Routers are used to• Routers are used to chop large networks up into smaller ones
• Routers forward• Routers forward packets by logical address
• An IP router (most• An IP router (most common) forwards IP packets
• Works at Layer 3 the• Works at Layer 3, the Network layer
Fig re 2 27 T pical small ro terFigure 2.27 Typical small router
![Page 47: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/47.jpg)
Figure 2.28 MHTechEd addressing
![Page 48: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/48.jpg)
Figure 2.29 Router added to the OSI model for the network
![Page 49: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/49.jpg)
Frames (packets) within FramesFrames (packets) within FramesFrames (packets) within FramesFrames (packets) within Frames• Network software creates a packet thatNetwork software creates a packet that
contains the sending and receiving IP addresses along with the data
Fig re 2 30 IP packetFigure 2.30 IP packet
![Page 50: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/50.jpg)
Figure 2.31 IP packet in a frame (as a canister)
![Page 51: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/51.jpg)
• The packet is enclosed within a frame that contains the sending and receiving MACcontains the sending and receiving MAC addresses
IP packet in a frame
Figure 2.32 IP packet in a frame
![Page 52: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/52.jpg)
Connecting to the Internet Connecting to the Internet gg• A router connects a local network to the Internet• The local hub is connected to the router• The router is connected to the Internet through a
cable or phone linecable or phone line• The cable or phone line uses a different kind of
frame so the router strips the frame and createsframe, so the router strips the frame and creates a new one
![Page 53: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/53.jpg)
Figure 2.33 Adding a router to the network
![Page 54: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/54.jpg)
C tiC tiConnecting Connecting to the Internetto the Internet
Figure 2.34 Router removing network frame and adding one for the cable line
![Page 55: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/55.jpg)
Figure 2.35 Router in action (notice addresses)
![Page 56: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/56.jpg)
• The router replaces the MAC address with the typeThe router replaces the MAC address with the type of address used by the cable or phone company
• The frame uses the IP address to guide it to the receiving system
• The receiving router strips off the cable or phone f d dd th MAC dd f thcompany frame and adds the MAC address for the
receiving system• The NIC strips off the MAC header and hands the• The NIC strips off the MAC header and hands the
frame off to the NOS
![Page 57: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/57.jpg)
Assembly and Disassembly Assembly and Disassembly –– Layer 4, Layer 4, y yy y yythe the Transport LayerTransport Layer
• Most data is much larger than a single frame• Most data is much larger than a single frame• Network protocols chop up the data into smaller
packets, and give each one a sequence numberp , g q• The sequence numbers are used by the receiving system
to put the packets back in order, and to assemble them• This compares to the numbering of boxes by UPS
![Page 58: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/58.jpg)
Figure 2.36 Labeling the boxes
![Page 59: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/59.jpg)
• Transport layer is the assembler/disassembler• Transport layer is the assembler/disassembler• Transport layer also initializes requests for packets
that weren’t received in good orderg
![Page 60: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/60.jpg)
Figure 2.37 OSI updated
![Page 61: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/61.jpg)
Talking on a NetworkTalking on a Network –– Layer 5Layer 5Talking on a Network Talking on a Network Layer 5,Layer 5,the the Session LayerSession Layer
• One system may be talking to many other systems simultaneously
• The software that handles these processes is called session software, working at Layer 5
![Page 62: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/62.jpg)
Figure 2.38 Handling multiple inputs
![Page 63: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/63.jpg)
Figure 2.39 Each request becomes a session
![Page 64: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/64.jpg)
Figure 2.40 OSI updated
![Page 65: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/65.jpg)
Standardized Formats Standardized Formats –– or Why Layer 6, or Why Layer 6, Presentation, Has No FriendsPresentation, Has No Friends
• Presentation layer tasks solved an old problem• Macintoshes and PCs use very different formats
St d di d f t h b t d th t• Standardized formats have been created that allow very different operating systems to exchange dataexchange data
![Page 66: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/66.jpg)
Figure 2.41 Different data formats were goften unreadable between systems
![Page 67: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/67.jpg)
Figure 2 42 Everyone recognized PDF files!Figure 2.42 Everyone recognized PDF files!
![Page 68: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/68.jpg)
Figure 2.43 OSI updated
![Page 69: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/69.jpg)
Network Applications Network Applications –– Layer 7, Layer 7, pppp y ,y ,the the Application LayerApplication Layer
• Users use Application layer network applications pp y ppto exchange data on a network– Network in Windows Vista (My Network Places in
earlier Windows)earlier Windows)– Web browser like Internet Explorer or Netscape
Navigator– Outlook Express for e-mail– Outlook Express for e-mail
• All operating systems have APIs at the Application layer for network-aware applications
![Page 70: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/70.jpg)
Figure 2.44 Network applications at work
![Page 71: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/71.jpg)
Figure 2.45 OSI updated
![Page 72: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/72.jpg)
How Tiffany Gets Her DocumentHow Tiffany Gets Her DocumentHow Tiffany Gets Her DocumentHow Tiffany Gets Her Document
• The next few slides illustrate a typical process• The next few slides illustrate a typical process that takes place to copy a file from one machine to another over a network
![Page 73: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/73.jpg)
Figure 2.46 Network application showing computers on the MHTechEd network
![Page 74: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/74.jpg)
Figure 2.47 Copying the Word document
![Page 75: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/75.jpg)
Figure 2.48 Chopping the Word document
![Page 76: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/76.jpg)
Figure 2.49 Creating and addressing packets
![Page 77: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/77.jpg)
Figure 2.50 Creating frames
![Page 78: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/78.jpg)
Figure 2.51 Tiffany’s system grabbing a frame
![Page 79: Building a Network with the OSI Model](https://reader036.vdocument.in/reader036/viewer/2022081622/613d1a17736caf36b759555f/html5/thumbnails/79.jpg)
• The OSI seven-layer model is a troubleshootingThe OSI seven layer model is a troubleshooting tool
• Example: Jane can’t print to the networked printer– Layer 1 and 2: NIC shows activity?
L 3 D t h IP– Layer 3: Does computer have a proper IP address?
– Move up through the layers to discover problemMove up through the layers to discover problem area