What data unit is associated with the open systems interconnection layer two?

The OSI model, which was first introduced by the International Organization for Standardization (ISO) in 1977, is a reference that specifies the transferring of data from one computer to another computer. The layered stack of the OSI (Open System Interconnection) reference model is made up of seven layers and each has a specific communication purpose to ensure reliable data flow between computers.

The goal of following the approach of the layered stack in the framework is to make network application and hardware development, management, and troubleshooting more specified and straightforward. Each layer is independent and self-contained so that it can carry out its communication tasks. The OSI model’s application layer is at the top, while the physical layer is at the bottom as shown below.

Protocol Data Unit (PDU)

Each layer’s information is referred to as a Protocol Data Unit (PDU). Along with the data, it contains protocol-specific control information. Each layer will add (or delete) its protocol information as a PDU moves down (or up) each layer. The PDU is given a different name at each layer to represent its role. So, in a computer network, it refers to a block of information that is transferred between network end systems. As the name implies, it is used for Open System Interconnection (OSI) model since it varies with layer-specific protocols and conventions. In a protocol stack, different layers have different types of data to be transferred. 

There are seven layers in the OSI Model as shown below and in the whole process of transferring information between these layers, only data goes through changes. Below mentioned are the layers of the OSI Model:

  1. Physical Layer
  2. Data Link Layer
  3. Network Layer
  4. Transport Layer
  5. Session Layer
  6. Presentation Layer
  7. Application Layer

For example, in Layer 4, the PDU of the Transport Layer is referred to as a segment based on TCP (Transmission Control Protocol) and with UDP (User Datagram Protocol) PDU is referred to as a datagram. 

  • Layer 3, the PDU of the Network Layer is referred to as a packet.
  • Layer 2, the PDU of the Data Link Layer is referred to as a frame.
  • Layer 1, the PDU of the Physical Layer is referred to as bit (1s or 0s).

Note: Layer 5 and above, the PDU is referred to as data.

What data unit is associated with the open systems interconnection layer two?

Protocol Data Unit

For Internet Protocol Suite

  • The PDU of the Transport Layer is referred to as a segment based on TCP (Transmission Control Protocol) and with UDP (User Datagram Protocol) PDU is referred to as a datagram. 
  • The PDU of the Internet Layer is referred to as a packet.
  • The PDU of the Link Layer is referred to as a frame.

Encapsulation of Protocol Data Unit (PDU):

When one PDU is wrapped inside another PDU then it is referred to as Encapsulation. It generally occurs when one protocol data unit (PDU) is transported inside the data field of the lower protocol data unit (PDU). In other words, a PDU contains data comprising relevant lower layer header information and is received from an upper network layer. This information has been prepared for transmission to the next lower layer in a row i.e. network layer. As data flows from one layer to the next, the PDU identifies its state. The major difference between Protocol Data Unit (PDU) and Service Data Unit (SDU) lies in the encapsulation as Service Data Units have not been able to encapsulate lower layer data transmission yet. 

The following table illustrates the PDU of each protocol stack layer.

Layer No.Layer NameDescriptionLayer 1Physical LayerIn this layer, PDU is bits (1s or 0s) for the transmission of data on the network.Layer 2Data Link Layer

In this layer, PDU comprises- 

  • Original data with TCP/UDP header
  • Network layer header and 
  • Data Link Layer header contains MAC (Medium Access Control) addresses or physical addresses of sender and receiver. The trailer is also added to this layer.

PDU is called a frame in the Data Link Layer.

Layer 3Network Layer 

In this layer, PDU comprises- 

  • Data with TCP/UDP headers
  • The network layer header contains Logical Addresses or IP Addresses of the sender and receiver.

PDU is called a packet in Network Layer.

Layer 4 Transport Layer

In this layer, PDU comprises- 

  • Data with TCP/UDP headers having sender’s and receiver’s TCP/UDP port numbers.

PDU is called segment or datagram in Transport Layer depending upon the protocol used. For TCP (connection-oriented protocol), it is segmented and for UDP (connectionless protocol) it is a datagram.

Nonetheless, Internet protocols are roughly arranged to follow the OSI model, and regardless, it provides a useful framework for thinking about the different layers of abstraction in Internet protocols. Once the reader has a handle on these abstractions, understanding the trade-offs for network analysis at different network architecture layers is easier.

Figure 11.1 summarizes the seven layers of the OSI model. There are some features of network communications that are not explicitly represented in the model, such as management and security. Conceptually, these can be applied in different ways at each layer. This discussion will leave these aspects aside. Layer 1 deals with the physics of how to transmit information reliably on a medium, such as copper or radio waves. Layer 7 is transitioning data on the host computer to a format for the user or his or her application. The intermediate layers are steps along that process.

What data unit is associated with the open systems interconnection layer two?

Figure 11.1. The seven layers of the OSI model, the term for data units of that layer, and a short summary of the functions of each layer [1].

Each layer has some control information to accomplish its task. For example, layer 3 is responsible for logical addresses of endpoints; IP addresses can be considered the layer 3 header. Layer 2 is responsible for transmitting data between each computer along the way. So to make a layer-2 frame, the machine adds a media access control (MAC) address and some other information to the IP datagram. IP and MAC addresses are not defined in or related to the OSI model, but conceptually this is where they fit.

At each network hop, the router strips off this layer-2 information, reads the layer-3 information, decides where the next destination is to move the data toward the desired endpoint, prepends new layer-2 information, and resends it. This process of adding addressing and other information around the data is called encapsulation. A similar encapsulation process, with different details, happens every time data is passed from one layer to the layer above or below it. Figure 11.2 displays this process.

What data unit is associated with the open systems interconnection layer two?

Figure 11.2. The general idea behind encapsulation. When each header and trailer is added or removed, the layer treats the data in the darkened area as mere data and passes it along, even though it may have header and trailer information for other layers.

Through several layers of encapsulation, decoding, and reencapsulating, data is transmitted across the Internet. Different network devices and network security devices strip off different numbers of layers to do their job. A rough schematic of this process is displayed in Figure 11.3. As a general rule, the more layers a device has to read and process, the more computationally expensive that process is. Switches only understand up to layer 2. Routers only need to understand up to layer 3. Application proxies need to understand all seven layers. This is also true of human analysts. If the analyst is just looking for communication between IP addresses, the task will be simpler, both cognitively for the analyst and computationally for the computer assisting, than piecing back together a whole application from what was seen on the network.

What data unit is associated with the open systems interconnection layer two?

Figure 11.3. Sample transmission of data from one host to its destination across the network, as viewed by what OSI model layers are involved in each step. Note repeated encapsulation and processing of data units as the data traverses different layers.

The next discussion provides starting points for those who might manage analysts. The remainder of the chapter will start the discussion of network analysis with information available at lower layers of the OSI model. This focus is perhaps unorthodox. On smaller networks, analysts can often start analyzing whole packets without too much trouble. However, the discussion will focus on structures that can help defenders find their way through a complex problem, from general (lower layers) to more specific (higher layers). This process of starting in quick broad strokes, characterizing, and drilling down when indications of specific problems are found helps analysts be successful. The appropriate technical and policy frameworks also need to be in place to support this analysis architecture. There is a cost to supporting analysis architecture, and to extract value from this expenditure it is important the rest of the organization understands the analysts’ capabilities.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597499699000110

Internet of Things: from hype to reality

Arun Kumar Singh, ... Prem Chand Vashist, in An Industrial IoT Approach for Pharmaceutical Industry Growth, 2020

7.3.2 The open systems interconnection model

The OSI model is important in IoT model operation. There are seven layers to the OSI model and these are discussed briefly here [18]. It consists of seven layers, namely:

1.

Physical layer

2.

Data link layer

3.

Network layer

4.

Transport layer

5.

Session layer

6.

Presentation layer

7.

Application layer

Each stratum or layer is accountable for providing some kind of distinct and structured services to the associated end-to-end layer either upwards or downwards in the stack. While the division differentiates each layer with its separate function, they create the flow of data without disconnecting from each other by working independently and simultaneously (Fig. 7.5).

What data unit is associated with the open systems interconnection layer two?

Figure 7.5. OSI layers description with data format.

We now discuss each of the layers and their individual capacities:

1.

OSI layer 7: This layer is known as the “application layer,” and starts at the top. It provides abstraction to the user level of the intrinsic details of all the layers below it. It also specifies protocols for sharing and the interface methods in use by the hosts within a network. This is a place where a user interacts with the network utilizing advanced level protocols [19]. The DNS, HTTP, Telnet, SSH, FTP, SMTP, RDP (remote desktop protocol), etc. are used at this layer.

2.

OSI layer 6: This layer is known as the presentation layer, and it lies beneath the application layer. In this layer are OS services like Linux, Unix, Mac, Windows, etc. The presentation layer is committed to delivering and formatting of information in two steps toward the application layer, which may or may not perform additional processing. It takes care of any issues that may arise as a consequence of sending data from one node to another. The presentation layer removes the concern of the application layer in dealing with syntactical differences to represent data residing in end-user systems [20]. Examples include the translation of an EBCDIC (extended binary coded decimal interchange code)-coded file in the form of text to an ASCII (American Standard Code for Information Interchange)-coded file, while also adding some encryption for security, such as secure sockets layer (SSL) protocol.

3.

OSI layer 5: Session layer is beneath the presentation layer in the OSI model. It has the task of dealing with the communications in order to establish a session among the two network nodes [21]. Examples include the establishment of a session between a computer and the server.

4.

OSI layer 4: This layer is the transport layer. It helps to establish an endways communication through the endpoints. This utilizes the notion of windowing, in which one is responsible for the decision of the amount of information flow or the data to be sent at one point in time connecting the two nodes in a network [22].

5.

OSI layer 3: The layer three is the network layer. The routers operate at this level. This layer helps to put the data into packets which we may call IP datagrams. They have IP address information of the source and destination address which is transmitted to the hosts and over the network. They also help in routing of IP datagrams that are marked with IP addresses. There is a specific routing protocol which enables routers to communicate with each other. The transfer of information among two nodes is enabled by this, and the routing algorithms help to specify the routes. Every router contains the prior information of the networks to which they are attached. Then there is a routing protocol, which helps to share the coming information to the immediate neighbors and then to the other ends within the network. The routers learn this way around the existing topology of the network they are working in. Though layers 3 and 4, that is, the network and transport layers, are different, they are closely knit together in practice. The name of the Internet protocol TCP/IP comes from the transport layer protocol (TCP) and network layer protocol (IP) [2–4]. Here the host enables the message transfer in the network by placing over it the data to be sent, marked with a destination address in the hope that it will be sent to the specified location. The packets containing messages could arrive in an altered order, and not as specified during the transfer. The next task of the higher layers that exist at the destination point is to rearrange the order of the packets and then supply them to the applications stratum that features applications functioning.

6.

OSI layer 2: This stratum is known as the data link layer. It helps switches to work on the data link layer. This layer decides when to deal with the delivery of frames amid devices that are placed on the same LAN and uses media access control addresses. The frames are not allowed or they do not have the function to cross the borders of a local network. The internetwork routing is controlled by layer 3. This helps to permit the data link protocols to emphasize their attention on local carriage, giving the address scheme and media intercession. Therefore the data link layer is comparable to a local neighborhood traffic cop, which does the arbitration amid parties struggling for entry through the medium, without the input of the final destination. For instance, the data link protocols include the Ethernet used in multinode form in LAN and the point-to-point protocol [23].

7.

OSI layer 1: This is the basic stratum of the OSI model and is called the physical layer. This physical layer describes the physical world interface with the virtual world using an electrical or mechanical interface for establishing the physical medium. This contains the idea of basic networking hardware transmission technologies. The wiring and cabling are part of this layer. This layer is committed to outlining the patterns of diffusing raw bits over a physical link that binds together network nodes, copper wires, fiberoptic cables, radio links, etc. The physical layer governs stream of bits and their placement from the data link layer on to the pins for a USB printer interface, an optical fiber transmitter, or a radio carrier, etc. [24].

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128213261000073

Standard Interfaces

Marilyn Wolf, in Embedded System Interfacing, 2019

2.1 Introduction

A number of interfacing standards are in daily use. Standards such as I2C or USB have been built into many components and systems. Typically, using them requires no hardware design and limited software design. Understanding how these interfaces work is very useful. Their principles also help us understand the role of interfaces in embedded systems.

The Open Systems Interconnection (OSI) model, shown in Fig. 2.1 is widely used to describe the design of computer networks. The model includes several layers that start at the most basic physical characteristics at layer 1 up to the application in layer 7. This chapter concentrates on the bottom three layers, known as the media layers:

What data unit is associated with the open systems interconnection layer two?

Fig. 2.1. The Open Systems Interconnection (OSI) model.

Layer 1, the physical layer (PHY), includes the physical and electrical characteristics of the connection. Physical characteristics include, for example, the type of connector used. Electrical characteristics describe the signals used for data.

Layer 2, the data link layer, describes the basic transfer of data from one network node to another. The unit of transfer at this level is the frame. This layer is divided into two sublayers. This layer is divided into two sublayers: the media access control (MAC) layer controls how devices can gain access to the communications medium; the logical link control (LLC) layer identifies and encapsulate protocols at the network layer as well as managing error correction and frame synchronization.

Layer 3, the network layer, moves data sequences from one node to another, potentially across several different types of networks.

In this chapter, we will look at six different standard interfaces:

The RS-232 serial interface commonly used on personal computers.

The I2C interface which is used to communicate with devices along a relatively simple bus; we also discuss the I2S bus used for digital audio and the CAN bus used in automotive systems.

The Universal Serial Bus (USB), which has gone through several revisions as a common standard for PC interfacing.

WiFi, a wireless network widely used for PCs and also for IoT systems.

Zigbee, a wireless network designed for embedded systems.

Two wireless interfaces, Bluetooth and Bluetooth Low Energy (BLE). Despite sharing a common root name, these two interfaces vary in some interesting and important ways.

LoRaWAN, a low power wide area network.

In Section 2.9, we will consider Internet connections that rely on communications interfaces.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128174029000029

Computer Networks

Jordanka Ivanova, Michael Jurczyk, in Encyclopedia of Physical Science and Technology (Third Edition), 2003

II.C TCP/IP Reference Model

While the OSI model was carefully designed, standardized, and then implemented, the Transmission Control Protocol (TCP)/Internet Protocol (IP) architecture was implemented first in the early 1980's and modeled afterwards. Well accepted in the university circles first, and later in the industry, TCP/IP, also called the Internet architecture, is nowadays one of the major architectures. However, the TCP/IP reference model is not general and consistent, but rather implementation bound, and it does not have a clear concept of services and protocols. The IP protocol serves as a joining point for many different networks, providing them with a method for communication.

TCP/IP consists of four layers, as shown in Fig. 2, which can be matched to some of the OSI model layers. The host-to-network layer is similar to the physical and data link layers. The internet layer with the IP protocol corresponds to the network layer. The main concept for TCP/IP, implemented on this layer, is a connectionless packet-switched network.

What data unit is associated with the open systems interconnection layer two?

FIGURE 2. Protocols and layers in the TCP/IP model. Applications can either use TCP or UDP, depending on their implementation.

Above the internet layer is the transport layer with two main protocols, TCP and User Datagram Protocol (UDP). TCP is a reliable and connection-oriented, end-to-end protocol. TCP has error detection/correction, data retransmission, and flow control mechanisms and takes care of out-of-order messages. UDP in contrast is an unreliable, connectionless protocol providing support for audio and video applications. The last layer, the application layer, hosts a variety of high-level protocols such as File Transfer Protocol (FTP) or Simple Mail Transfer Protocol (SMTP).

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B0122274105001332

Embedded Computing

Marilyn Wolf, in High-Performance Embedded Computing (Second Edition), 2014

1.2.4 Radio and networking

Combined wireless/network communications

Modern communications systems combine wireless and networking. As illustrated in Figure 1.9, radios carry digital information and are used to connect to networks. Those networks may be specialized, as in traditional cell phones, but increasingly radios are used as the physical layer in Internet protocol systems.

What data unit is associated with the open systems interconnection layer two?

FIGURE 1.9. A radio and network connection.

Networking

The Open Systems Interconnection (OSI) model [Sta97A] of the International Standards Organization (ISO) defines a seven-layer model for network services:

1.

Physical: The electrical and physical connection

2.

Data link: Access and error control across a single link

3.

Network: Basic end-to-end service

4.

Transport: Connection-oriented services

5.

Session: Activity control, such as checkpointing

6.

Presentation: Data exchange formats

7.

Application: The interface between the application and the network

Although it may seem that embedded systems would be too simple to require use of the OSI model, the model is in fact quite useful. Even relatively simple embedded networks provide physical, data link, and network services. An increasing number of embedded systems provide Internet service that requires implementing the full range of functions in the OSI model.

Internetworking standard

The Internet is one example of a network that follows the OSI model. The Internet Protocol (IP) [Los97, Sta97A] is the fundamental protocol on the Internet. IP is used to internetwork between different types of networks. IP sits at the network layer in the OSI model. It does not provide guaranteed end-to-end service. It instead provides best-effort routing of packets. Higher-level protocols must be used to manage the stream of packets between source and destination.

Wireless

Wireless data communication is widely used. A data receiver, for example, must perform several tasks:

They must demodulate the signal down to the baseband.

They must detect the baseband signal to identify bits.

They must correct errors in the raw bit stream.

Software radio

Wireless data radios may be built from combinations of analog, hardwired digital, configurable, and programmable components. A software radio is, broadly speaking, a radio that can be programmed; the term software-defined radio (SDR) is often used to mean either a purely or partly programmable radio. Given the clock rates at which today’s digital processors operate, CPUs are used primarily for baseband operations. Some processors can run fast enough to be used for some of the radio-frequency processing.

Software radio tiers

The SDR Forum, a technical group for software radio, defines five tiers of software-defined radio [SDR05]:

Tier 0: A hardware radio cannot be programmed.

Tier 1: A software-controlled radio has some functions implemented in software but operations like modulation and filtering cannot be altered without changing hardware.

Tier 2: A software-defined radio may use multiple antennas for different bands but the radio can cover a wide range of frequencies and use multiple modulation techniques.

Tier 3: An ideal software-defined radio does not use analog amplification or heterodyne mixing before A/D conversion.

Tier 4: An ultimate software radio is lightweight, consumes very little power, and requires no external antenna.

Digital demodulation

Demodulation requires multiplying the received signal by a signal from an oscillator and filtering the result to select the lower-frequency version of the signal. The bit detection process depends somewhat on the modulation scheme, but digital communication mechanisms often rely on phase. High-data-rate systems often use multiple frequencies arranged in a constellation. The phases of the component frequencies of the signal can be modulated to create different symbols.

Error correction

Traditional error correction codes can be checked using combinational logic. For example, a convolutional coder can be used as an error correction coder. The convolutional coder convolves the input with itself according to a chosen polynomial. Figure 1.10 shows a fragment of a trellis that represents possible states of a decoder; the label on an edge shows the input bit and the produced output bits. Any bits in the transmission may have been corrupted; the decoder must determine the most likely sequence of data bits that could have produced the received sequence.

What data unit is associated with the open systems interconnection layer two?

FIGURE 1.10. A trellis representation for a convolutional code.

Several more powerful codes that require iterative decoding have recently become popular. Turbo codes use multiple encoders. The input data is encoded by two convolutional encoders, each of which uses a different but generally simple code. One of the coders is fed the input data directly. The other coder is fed a permuted version of the input stream. Both coded versions of the data are sent across the channel. The decoder uses two decoding units, one for each code. The two decoders are operated iteratively. At each iteration, the two decoders swap likelihood estimates of the decoded bits; each decoder uses the other’s likelihoods as a priori estimates for its own next iteration.

Low-density parity check (LDPC) codes also require multiple iterations to determine errors and corrections. An LDPC code can be defined using a bipartite graph like that shown in Figure 1.11; the codes are called low-density because their graphs are sparse. The left-hand nodes are called message nodes and the right-hand nodes are check nodes. Each check node defines a sum of message node values. The message nodes define the coordinates for codewords; a legal codeword is a set of message node values that sets all the check nodes to 1. During decoding, an LDPC decoding algorithm passes messages between the message nodes and check nodes. One approach is to pass probabilities for the data bit values as messages. Multiple iterations should cause the algorithm to settle onto a good estimate of the data bit values.

What data unit is associated with the open systems interconnection layer two?

FIGURE 1.11. A bipartite graph that defines an LDPC code.

Radios and protocols

A radio may simply act as the physical layer of a standard network stack, but modern networks and radios are designed to take advantage of the inherent characteristics of wireless networks. For example, traditional wired networks have only a limited number of nodes connected to a link but radios inherently broadcast; broadcast can be used to improve network control, error correction, and security. Wireless networks are generally ad hoc in that the members of the network are not predetermined and nodes may enter or leave during network operation. Ad hoc networks require somewhat different network control than is used in fixed, wired networks.

The next example looks at a cell phone communication standard.

Example 1.1

CDMA2000

CDMA2000 [Van04] is a widely used standard for spread-spectrum-based cellular telephony. It uses direct sequence spread-spectrum transmission, which multiplies the data to be transmitted with a high-frequency, pseudorandom bit sequence. The pseudorandom sequence spreads the data over a broad range of frequencies. The data appears as noise unless the receiver knows the pseudorandom sequence. Several radios can use the same frequency band without interfering because the pseudorandom codes allow their signals to be separated.

A simplified diagram of the system looks like this:

What data unit is associated with the open systems interconnection layer two?

The spreader modulates the data with the pseudorandom code. The interleaver transposes coded data blocks to make the code more resistant to burst errors. The transmitter’s power is controlled so that all signals have the same strength at the receiver.

The physical layer protocol defines a set of channels that can carry data or control. A forward channel goes from a base station to a mobile station, while a reverse channel goes from a mobile station to a base station. Pilot channels are used to acquire the CDMA signal and provide phase information; they also allow the mobile station to estimate the channel’s characteristics. A number of different types of channels are defined for data, control, power control, etc.

The link layer defines medium access control (MAC) and signaling link access control (LAC). The MAC layer multiplexes logical channels onto the physical medium, provides reliable transport of user traffic, and manages quality of service. The LAC layer provides a variety of services: authentication, integrity, segmentation and reassembly, etc.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124105119000010

The OSI Model and Networking Protocols

Naomi J. Alpern, Robert J. Shimonski, in Eleventh Hour Network+, 2010

The OSI Model

The first two layers of the OSI model involve both hardware and software. In the five upper layers (Layers 3 to 7), the OSI model typically is implemented via software only.

Crunch Time

The OSI model is represented as a stack because data that is sent across the network has to move through each layer at both the sending and receiving ends. The sending computer generally initiates the process at the application layer and the data is sent down the stack to the physical layer and across the network to the receiving computer. On the receiving end, the data is received at the physical layer and the data packet is sent up the stack to the application layer.

The application layer starts the process. Small pieces of information relative to the transmission of information are added to the data at each layer; this is called encapsulation. The process is then reversed on the receiving side to get back to just the data.

Layer 1: Physical

The first layer of the OSI model is the physical layer. This layer specifies the electrical and mechanical requirements for transmitting data bits across the transmission medium. It involves sending and receiving the data stream on the carrier – whether that carrier uses electrical (cable), light (fiber optic) or radio, infrared or laser (wireless) signals. The physical layer specifications include thefollowing:

Voltage changes

Timing of voltage changes

Data rates

Maximum transmission distances

Physical connectors to the transmission medium

Physical topology or layout of the network

The physical layer addresses digital versus analog signaling, baseband versus broadband signaling, synchronously or asynchronously transmissions, and how signals are divided into channels (multiplexing).

EXAM WARNING

Modems translate analog to digital signals and back again. PCs are using digital technology to communicate, but the phone lines are using analog signaling. Therefore, the signal must be changed from one signaling method to the other as needed, such as when you want to connect your PC up to your Internet service provider (ISP) and surf the Internet.

Layer 2: Data Link

The data link layer is responsible for maintaining the data link between two hosts or nodes. Its characteristics and functions are as follows:

Defines and manages the ordering of bits to and from data segments called packets

Management of frames, which contains data arranged in an organized manner, which provides for an orderly and consistent method of sending data bits across the medium

Responsible for flow control, which is the process of managing the timing of sending and receiving data so that it doesn't exceed the capacity of the physical connection

Responsible for error notification, including receiving and managing error messaging related to physical delivery of packets

Network devices that operate at this layer include Layer 2 switches (switching hubs) and bridges.

The data link layer is divided into two sublayers:

Logical Link Control (LLC) sublayer provides the logic for the data link. Thus, it controls the synchronization, flow control, and error checking functions of the data link layer.

Media Access Control (MAC) sublayer provides control for accessing the transmission medium. It is responsible for moving data packets from one network interface card (NIC) to another, across a shared transmission medium. Physical addressing is handled at the MAC sublayer. MAC is also handled at this layer. This refers to the method used to allocate network access to computers and prevent them from transmitting at the same time, causing data collisions. Common MAC methods include Carrier Sense Multiple Access/Collision Detection (CSMA/CD), used by Ethernet networks, Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA), used by AppleTalk networks, and token passing, used by Token Ring and Fiber Distributed Data Interface (FDDI) networks.

EXAM WARNING

A MAC address consists of six hexadecimal numbers. The highest possible hexadecimal number is FF:FF:FF:FF:FF:FF, which is a broadcast address. The first three bytes contain a manufacturer code and the last three bytes contain a unique station ID. You can view the MAC address on most systems with the following commands.

Windows ME, 9x: winipcfg (navigate the graphical user interface (GUI) to find the MAC address)

Windows NT, XP, Vista, 2000, 2003, 2008: ipconfig/all

Linux: ifconfig -a

Layer 3: Network

At the network layer, packets are sequenced and logical addressing is handled. Logical addresses are nonpermanent, software-assigned addresses that can be changed by administrators. The IP addresses used by the Transmission Control Protocol/Internet Protocol (TCP/IP) on the Internet and the Internetwork Packet Exchange (IPX) addresses used by the IPX/Sequenced Packet Exchange (SPX) protocols on NetWare networks are examples of logical addresses. These protocol stacks are referred to as routable because they include addressing schemes that identify both the network or subnet and the particular client on that network or subnet. Each subnet must be unique, and each local area network (LAN) will need to know how to get to the other LANs. Routing refers to forwarding packets from one network or subnet to another. Logical addressing is important since it defines how and where the packets are sent. Its characteristics and functions are asfollows:

A TCP/IP called Address Resolution Protocol (ARP) helps map an IP address to a physical machine address.

This is the first layer responsible entirely for the logical connection between two hosts, not the physical one.

It defines the mechanisms used to route packets between networks. Without these Layer 3 functions, only local communications would be able to take place.

It provides additional levels of flow control and error control.

The devices that operate at this layer include, most prominently, routers and Layer 3 switches.

Layer 4: Transport

The transport layer is responsible for transporting the data from one node to another, and it provides transparent data transfer between nodes and manages the end-to-end flow control, error detection, and error recovery.

The transport layer protocols initiate contact between host computers and set up a virtual circuit. The transport protocols on each host computer verify that the application sending the data is authorized to access the network and that both ends are ready to initiate the data transfer. When this synchronization is complete, the data can be sent. As the data is being transmitted, the transport protocol on each host monitors the data flow and watches for transport errors. If transport errors are detected, the transport protocol can provide errorrecovery.

Its characteristics and functions are as follows:

It is responsible for providing reliability and connection-oriented or connectionless communications.

The two protocols most commonly associated with the transport layer are the TCP, which is connection-oriented, and the User Datagram Protocol (UDP), which is connectionless.

It handles ports, which are another aspect of logical addressing. Ports are used to determine which incoming data belongs to each application running on a particular host.

It is responsible for name resolution.

Layer 5: Session

The session layer is responsible for establishing, monitoring, and terminating sessions, using the virtual circuits established by the transport layer. Its characteristics and functions are as follows:

It is responsible for putting header information into data packets to indicate where the message begins and ends.

It performs synchronization between the sender's session layer and the receiver's session layer. The use of acknowledgement messages (ACKs) helps coordinate transfer of data at the session layer.

It controls whether the communications within a session are sent as full duplex or half duplex messages.

It establishes a connection between two processes. A process is a defined task related to an application.

The session layer is responsible for setting up the connection between an application process on one computer and an application process on another computer, after the transport layer has established the connection between the two machines.

Protocols that operate at the session layer include Windows Sockets (the Winsock interface) and the Network Basic Input/Output interface (NetBIOS).

Layer 6: Presentation

In the presentation layer, data translation is the primary activity performed. The sender's application passes data down to the presentation layer, where it is put into a common format. When the data is received on the other end, the presentation layer changes the data from the common format back into a format that is useable by the application. Protocol translation, the conversion of data from one protocol to another so that it can be exchanged between computers that use different platforms or operating systems, takes place here. Its characteristics and functions are as follows:

Gateway services operate at this layer. Gateways are connection points between networks that use different platforms or applications.

It is responsible for data compression, which is used to minimize the actual number of bits that must be transmitted on the network media to the receiver.

It is responsible for data encryption and decryption.

Layer 7: Application

The application layer is the point at which the user application program interacts with the network. This layer of the OSI model should not be confused with the application itself. Application processes are initiated within a user application and then the data created by that process are handed to the application layer of the networking software. Everything that occurs at this level is application-specific. File sharing, remote printer access, network monitoring and management, Remote Procedure Calls (RPCs), and all forms of electronic messaging occur at this level.

Samples of application layer protocols are File Transfer Protocol (FTP), Telnet, Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), Internet Message Access Protocol 4 (IMAP4), Hypertext Transfer Protocol (HTTP), Network News Transfer Protocol (NNTP), and Simple Network Management Protocol (SNMP). Be sure to distinguish between the protocols mentioned and applications that may bear the same names. For instance, there are many different FTP programs made by different software vendors, but all of them use the FTP protocol to transfer files.

EXAM WARNING

Knowing the OSI model is imperative. You will need to know which devices and protocols function at each layer, so you need to know the layers to start with. Continue to draw the model shown in Figure 5.1 so that when you get to the exam, you can write it on scrap paper to help you with the exam.

The Microsoft Model

With the release of  Windows NT 3.1, TCP/IP was built into the operating system, providing a seamless integration of networking functionality in the OS. Since that time, it has become standard to provide TCP/IP with the operating system since so many computers today connect to a network in one form or another.

DID YOU KNOW?

The Microsoft model provides a standard platform for application developers. This modular design enables the developer to rely upon the underlying services of the OS through the use of standard interfaces. These interfaces provide specific functionality developers that can be used as building blocks to develop an application. This makes development time shorter and provides common interfaces for users, making learning and using new applications easier.

Understanding the Function of Boundary Layers

The Microsoft model describes software and hardware components and the connections between them that facilitate computer networking. This modular approach both allows and encourages hardware and software vendors to develop products that work together through the Microsoft operating system. Boundary layers are interfaces that reside at the boundaries of functionality. They interact with the layer below and the layer above, providing an interface from one layer to the next.

The interfaces defined by Microsoft are as follows:

Network Device Interface Specification (NDIS) This layer maps to the data link layer of the OSI model and the network interface layer of the Defense Advanced Research Projects Agency (DARPA) model, which we will cover next. The NDIS layer is the boundary between the physical network and the higher level transport protocols. This layer provides the standardized functions that allow various transport protocols to use any network device driver that is compatible with the specifications of this layer, providing both flexibility and reliability to developers.

Transport Driver Interface (TDI) This layer provides a portal into the transport protocols for kernel mode components such as servers and redirectors. It acts as the gateway between the transport layer and the session layer in the OSI model, providing a common interface, which developers can use to access both transport and session layer functionalities.

Application Program Interface (API) This layer is the interface through which developers can access network infrastructure services such as various application layer protocols.

The Windows OS is divided into three primary areas: the User, the Executive, and the Kernel. The Kernel is the core of the Microsoft operating system architecture, and it manages the most basic operations, including interacting with the hardware abstraction layer that interacts with the hardware (CPU, memory, and so forth). The Kernel also synchronizes activities with the Executive level, which includes the Input/Output (I/O) Manager and the Process Manager. The User level interacts with the Executive level; this is the level at which most applications and user interfaces reside.

Figure 5.2 shows the relationship of these boundary layers to both the OSI model and to the Microsoft architecture.

What data unit is associated with the open systems interconnection layer two?

FIGURE 5.2. The Microsoft model

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597494281000060

About Wireshark

Robert Shimonski, in The Wireshark Field Guide, 2013

1.7 The OSI Model

The open systems interconnection (OSI) model is used to provide a methodical way to approach how data traverses networks, systems, and operates with application used on those computers and networks. It is a helpful tool that seems to be timeless as it is continuously referenced and used today since its inception many years ago. Founded from the Department of Defense (DoD) four-layer model back when the Internet (ARPAnet) was first conceived, it serves as a way to help not only describe how data traverses systems and networks but also an outstanding tool that can be used to help troubleshoot problems.

When the data arrives at its destination, the receiving station’s physical layer picks it up and performs the reverse process (also known as decapsulation). The physical layer converts the bits back into frames to pass on to the data link layer. The data link layer removes its header and trailer and passes the data on to the network layer. Once again, this process repeats itself until the data reaches all the way to the application layer. In Figure 1.7, we see the layers of the OSI model.

What data unit is associated with the open systems interconnection layer two?

Figure 1.7. The OSI model.

The layers of the OSI model are described as follows:

Application layer: This topmost layer of the OSI model is responsible for managing communications between network applications. This layer is not the application itself, although some applications may perform application layer functions. Examples of application layer protocols include file transfer protocol (FTP), hypertext transfer protocol (HTTP), simple mail transfer protocol (SMTP), and Telnet.

Presentation layer: This layer is responsible for data presentation, encryption, and compression.

Session layer: The session layer is responsible for creating and managing sessions between end systems. The session layer protocol is often unused in many protocols. Examples of protocols at the session layer include NetBIOS and remote procedure call (RPC).

Transport layer: This layer is responsible for communication between programs or processes. Port or socket numbers are used to identify these unique processes. Examples of transport layer protocols include TCP, user datagram protocol (UDP), and SPX.

Network layer: This layer is responsible for addressing and delivering packets from the source node to the destination node. The network layer takes data from the transport layer and wraps it inside a packet or datagram. Logical network addresses are generally assigned to nodes at this layer. Examples of network layer protocols include IP and IPX.

Data link layer: This layer is responsible for delivering frames between NICs on the same physical segment. It is subdivided into the media access control (MAC) layer and the logical link control (LLC) layer. Communication at the data link layer is generally based on hardware addresses. The data link layer wraps data from the network layer inside a frame. Examples of data link layer protocols include Ethernet, the now almost defunct token ring, and point-to-point protocol (PPP). Devices that operate at this layer include bridges and switches.

Physical layer: This layer defines connectors, wiring, and the specifications on how voltage and bits pass over the wired (or wireless) media. Devices at this layer include repeaters, concentrators, and hubs. Devices that operate at the physical layer do not have an understanding of paths.

When using Wireshark, you must consider the methodologies used to troubleshoot with as well as how the data works on networks and systems. Knowing how to launch and run the tool is not enough! You need to specifically know where to place it, when to run it, and what it is you will capture. You will then need to analyze which tests your knowledge of networks, computers, applications, and systems.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124104136000012

Basics of communications

Husheng Li, in Communications for Control in Cyber Physical Systems, 2016

2.6.2 Layered Structure

To facilitate the design of communication networks, the functionalities of networks can be organized into a stack of layers. Each layer takes charge of different tasks and communicates with adjacent layers. Certain protocols are also designed for the interfaces between two adjacent layers. The most popular definition of network layers is the Open Systems Interconnection (OSI) reference model developed by the International Standards Organization (ISO). Another typical model is the TCP/IP reference model. Both are illustrated in Fig. 2.8. The details of the models are explained as follows.

What data unit is associated with the open systems interconnection layer two?

Fig. 2.8. Illustration of layers in OSI and TCP/IP.

We first introduce the OSI model, in which the network is divided into seven layers. Since the layers for session and presentation are not used in most network designs, we focus on the remaining five layers, which have been widely used in the design and analysis of communication networks.

Physical layer: The physical layer is concerned with how to transmit information bits from a transmitter to a receiver. It mainly involves the modulation/demodulation, coding/decoding,1 and signal processing for transmission and reception. Most of our previous discussions relate to the physical layer.

Data link layer: This layer takes charge of tasks such as frame acknowledgment (ACK), flow regulation, and channel sharing. The latter, called medium access control (MAC), is the most important for wireless networks due to the broadcast nature of wireless transmissions, and is therefore usually considered as an independent layer. Essentially, the MAC layer addresses resource allocation, e.g., how to allocate different communication channels to different users, and scheduling, e.g., when there is competition among users, which user should obtain the priority to transmit.

Network layer: This layer determines how to find a route in the network from the source to the destination. For example, we need to design an addressing mechanism for routing. Moreover, when the addresses of the source and destination are known, we need to design algorithms for the network to find a path with the minimum cost (e.g., the number of hops) to the destination. When a path is broken by an emergency, the network layer needs to find a new path for the data flow.

Transport layer: This layer receives data from the application layer, splits it into smaller units if needed, and then passes it to the network layer. The main task of the transport layer is congestion control, i.e., how to control the source rate according to the congestion situation in the network.

Application layer: This provides various protocols for different applications. For example, the HyperText Transfer Protocol (HTTP) is used for websites.

Note that the physical, data link, and network layers are concerned with the intermediate nodes in the network, while the transport and application layers involve only the two ends of data flow, namely the source and destination.

In the TCP/IP reference model, the physical and data link layers are not well specified. They are considered as the host-to-network layer. The Internet and TCP layers in the TCP/IP reference model roughly correspond to the network and transport layers in the OSI model. More details can be found in Ref. [36].

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128019504000020

Introducing Network Analysis

In Ethereal Packet Sniffing, 2004

Understanding the OSI model

The International Standards Organization (ISO) developed the Open Systems Interconnection (OSI) model in the early 1980's to describe how network protocols and components work together. It divides network functions into seven layers, and each layer represents a group of related specifications, functions, and activities.

The layers of the OSI model are:

Application layer This topmost layer of the OSI model is responsible for managing communications between network applications. This layer is not the application program itself, although some applications may have the ability and the underlying protocols to perform application layer functions. For example, a Web browser is an application, but it is the underlying Hypertext Transfer Protocol (HTTP) protocol that provides the application layer functionality. Examples of application layer protocols include File Transfer Protocol (FTP), Simple Network Management Protocol (SNMP), Simple Mail Transfer Protocol (SMTP), and Telnet.

Presentation layer This layer is responsible for data presentation, encryption, and compression.

Session layer The session layer is responsible for creating and managing sessions between end systems. The session layer protocol is often unused in many protocols. Examples of protocols at the session layer include NetBIOS and Remote Procedure Call (RPC).

Transport layer This layer is responsible for communication between programs or processes. Port or socket numbers are used to identify these unique processes. Examples of transport layer protocols include: TCP, UDP, and Sequenced Packet Exchange (SPX).

Network layer This layer is responsible for addressing and delivering packets from the source computer to the destination computer. The network layer takes data from the transport layer and wraps it inside a packet or datagram. Logical network addresses are generally assigned to computers at this layer. Examples of network layer protocols include IP and Internetwork Packet Exchange (IPX). Devices that work at this layer are routers and Layer 3 switches.

Data link layer This layer is responsible for delivering frames between NICs on the same physical segment. Communication at the data link layer is generally based on MAC addresses. The data link layer wraps data from the network layer inside a frame. Examples of data link layer protocols include Ethernet, Token Ring, and Point-to-Point Protocol (PPP). Devices that operate at this layer include bridges and switches.

Physical layer This layer defines connectors, wiring, and the specifications on how voltage and bits pass over the cabled or wireless media. Devices at this layer include repeaters, concentrators, hubs, and cable taps. Devices that operate at the physical layer do not have an understanding of network paths.

What data unit is associated with the open systems interconnection layer two?
NOTE

The terms frame and packet tend to be used interchangeably when talking about network traffic. However, the difference lies in the various layers of the OSI model. A frame is a unit of transmission at the data link layer. A packet is a unit of transmission at the network layer, however many people use the term packet to refer to data at any layer.

The OSI model is very generic and can be used to explain virtually any network protocol. Various protocol suites are often mapped against the OSI model for this purpose. A solid understanding of the OSI model aids tremendously in network analysis, comparison, and troubleshooting. However, it is also important to remember that not all protocols map nicely to the OSI model. For example, TCP/IP was designed to map to the U.S. Department of Defense (DoD) model. In the 1970s, the DoD developed its four-layer model. The core Internet protocols adhere to this model.

The DoD model is merely a condensed version of the OSI model. Its four layers are:

Process layer This layer defines protocols that implement user-level applications such as mail delivery, remote login, and file transfer.

Host-to-host layer This layer handles the connection, data flow management, and retransmission of lost data.

Internet layer This layer is responsible for delivering data from source host to destination host across a set of different physical networks that connect the two machines.

Network access layer This layer handles the delivery of data over a particular hardware media.

What data unit is associated with the open systems interconnection layer two?
Notes from the Underground …

The TCP/IP Protocols

You will be seeing a lot of references in this book to TCP/IP and its associated protocols, specifically IP, TCP, and UDP. TCP/IP, developed by the Defense Advanced Research Projects Agency (DARPA), is the most widely used routed protocol today. IP is a Layer 3 protocol that contains addressing and control information that allows packets to be routed. IP is a connectionless protocol; therefore, it provides unreliable best-effort packet delivery service. Since IP only provides best-effort delivery, a packet may be discarded during transmission. All IP packets consist of a header and a payload (data from upper layers).

At the transport layer of the TCP/IP stack, the two commonly used protocols are TCP and UDP. The headers for both of these protocols include a source and destination port number, which are used to determine the application or process that the TCP segment or UDP datagram originate from and destined to. TCP is a connection-oriented protocol, and UDP is a connectionless protocol. The TCP header includes sequence and acknowledgment numbers for reliable delivery. When IP needs reliable, guaranteed transfers it depends on TCP to provide this functionality.

Since TCP is a connection-oriented protocol it creates a dialog between the two communicating hosts to establish a connection. This is known as the three-way handshake. It starts by Host A sending a SYN packet to Host B letting it know that it wants to talk. Host B then responds with a SYN/ACK, saying that it is available to talk. Host A then finalizes the connection with an ACK.

TCP can also use the sliding window principle. The sliding window algorithm allows a buffer to be placed between the application program and the network data flow. Data received from the network is placed into this buffer until the application is ready to read it. The window is the amount of data that can be fetched into the buffer before an acknowledgment must be sent. Examples of applications that use TCP include FTP, Telnet, Network File System (NFS), SMTP, HTTP, Domain Name System (DNS), and Network News Transfer Protocol (NNTP). Examples of applications that use UDP include DNS, Routing Information Protocol (RIP), NFS, SNMP, and Dynamic Host Configuration Protocol/Boot Protocol (DHCP/BOOTP). As you can see, some applications (such as DNS and NFS) can use both protocols.

What data unit is associated with the open systems interconnection layer two?
Notes from the Underground.

Writing Your Own Sniffer

There is an excellent paper titled “Basic Packet-Sniffer Construction from the Ground Up” by Chad Renfro located at www.unixgeeks.org/security/newbie/security/sniffer/sniffer_construction.txt. In this paper he presented a very basic 28-line packet sniffer written in C, called sniff.c. Even if you aren't a programmer, Chad explains the program line by line in an easy to understand manner. The program demonstrates the use of the RAW_SOCKET device to read TCP packets from the network and print basic header information to std_out. For simplicity, the program operates in non-promiscuous mode, so you would first need to put your interface in promiscuous mode by using the ifconfig eth0 promisc command.

There is also a header file that has to be copied into the same directory as sniff.c. It provides standard structures to access the IP and TCP fields. The structures identify each field in the IP and TCP header. It contains more information than what the sniff.c actually uses, but it least it is there to build upon.

To run the program, copy the sniff.c and headers.h into the same directory, and enter the command gcc -o sniff sniff.c. This will compile the program and create and executable file called sniff, which can be run by typing ./sniff. The following text shows the output of the sniff program when I attempted a TELNET and FTP connection:

What data unit is associated with the open systems interconnection layer two?

Once you are done capturing data, you can end the program by typing CTRL-C. You may also want to remove your interface from promiscuous mode by typing the command ifconfig eth0 -promisc.

What data unit is associated with open systems interconnection layer four?

Techopedia Explains Protocol Data Unit (PDU) PDU is a significant term related to the initial four layers of the OSI model. In Layer 1, PDU is a bit, in Layer 2 it is a frame, in Layer 3 it is a packet and in Layer 4 it is a segment. In Layer 5 and above, PDU is referred to as data.

Which of the following network connectivity devices operates at Layer 2 of the OSI model?

Switch: A network switch is a multiport network bridge that uses MAC addresses to forward data at the data link layer (layer 2) of the OSI model.
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between nodes on a network segment across the physical layer.

What is the purpose of the layer 2 LLC sublayer?

What is the purpose of the Layer 2 LLC sublayer? It is used to handle multiplexing, flow and error control, and reliability.