0% found this document useful (0 votes)
42 views6 pages

Network Standards Edtd

Network standards ensure interoperability among hardware and software from different vendors, defining necessary protocols and formats. They are categorized into Open Standards, which are publicly accessible and promote innovation, and Proprietary Standards, which are controlled by single entities and may limit interoperability. The OSI Reference Model standardizes communication functions into seven layers, facilitating troubleshooting and modular networking design.

Uploaded by

joylineselim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views6 pages

Network Standards Edtd

Network standards ensure interoperability among hardware and software from different vendors, defining necessary protocols and formats. They are categorized into Open Standards, which are publicly accessible and promote innovation, and Proprietary Standards, which are controlled by single entities and may limit interoperability. The OSI Reference Model standardizes communication functions into seven layers, facilitating troubleshooting and modular networking design.

Uploaded by

joylineselim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Network Standards

Ensures that hardware, software, and devices from different vendors can
communicate with each other effectively over networks.
These standards define the protocols, interfaces, and formats necessary for
interoperability and consistency in data communication.

Some of the most important organizations involved in creating these standards


include:
 ISO (International Organization for Standardization): Develops
international standards for a wide variety of industries, including
networking.
 IEEE (Institute of Electrical and Electronics Engineers): Defines many
LAN technologies
 IETF (Internet Engineering Task Force): Develops and promotes
Internet standards, especially related to the Internet Protocol (IP) suite
(TCP/IP).
 ITU-T (International Telecommunication Union - Telecommunication
Standardization Sector): Focuses on international telecommunication
standards.

There are two main types of network standards:


1. Open Standards
2. Proprietary Standards

Open Standards
Open Standards are publicly available and developed through collaborative
processes by international standards organizations. These standards are designed
to be universally accessible, enabling different manufacturers, developers, and
organizations to build compatible systems that can communicate with each
other.
Key Characteristics
 Publicly Accessible
 Vendor-Neutral
 Interoperability
 Innovation-Friendly
Examples of Open Standards in Networking
 Internet Protocol Suite (TCP/IP): TCP/IP is a fundamental open
standard used for internet communication. It is defined by the IETF
(Internet Engineering Task Force), and it ensures that different devices
can communicate across the Internet.
 Ethernet (IEEE 802.3): Ethernet is an open standard for wired LAN
communication, defined by the IEEE (Institute of Electrical and
Electronics Engineers). It ensures compatibility across network devices
like switches, routers, and network interface cards.
 Wi-Fi (IEEE 802.11): Wi-Fi is an open standard for wireless local area
networks (WLAN), also developed by the IEEE. It allows for wireless
communication between devices like smartphones, laptops, and routers.
 HTML (HyperText Markup Language): HTML is an open standard for
web page creation and content structuring, maintained by the W3C
(World Wide Web Consortium).
 DNS (Domain Name System): DNS, defined by the IETF, is an open
standard that translates domain names (e.g., google.com) into IP addresses
that computers use to identify each other on the network.
Benefits of Open Standards
 Interoperability
 Lower Costs
 Wider Adoption
 Flexibility and Innovation
Drawbacks of Open Standards
 Slower Development
 Less Control

Proprietary Standards
Proprietary Standards are developed, owned, and controlled by a single
organization or company. The use of these standards often requires permission
or licensing, and they are designed to work primarily with the company’s own
products and technologies.
Key Characteristics
 Controlled by a Single Entity
 Restricted Access
 Vendor Lock-In
 Closed Ecosystem
Examples of Proprietary Standards in Networking
 Apple’s Lightning Connector
 Microsoft's NTFS (New Technology File System)
 Cisco’s EIGRP (Enhanced Interior Gateway Routing Protocol)
 Oracle’s SPARC Architecture
Benefits of Proprietary Standards
 Optimized Performance
 Innovative Features
 Tight Integration
Drawbacks of Proprietary Standards:
 Vendor Lock-In
 Higher Costs
 Limited Interoperability

The OSI Reference Model (Open Systems Interconnection)


The OSI model is a conceptual framework that standardizes the functions of a
communication system into seven distinct layers. Each layer has specific
responsibilities and communicates with the layers directly above and below it.
This model was developed by ISO to guide product development, enhance
interoperability, and serve as a reference point for networking technologies.

Overview of the OSI Layers


1. Layer 1: Physical Layer
o Function: Defines the physical medium for data transmission,
including hardware such as cables, switches, and network interfaces.
o Key Responsibilities:
 Transmission and reception of raw bitstreams over a physical
medium (e.g., fiber optics, copper wires, radio frequencies).
 Deals with data rates, physical connections, voltage levels, and
signaling.
o Examples:
 Ethernet cables, fiber optics, RS-232, hubs, repeaters.
2. Layer 2: Data Link Layer
o Function: Ensures reliable data transfer between two physically
connected nodes. Handles frame synchronization, error detection,
and control of data flow.
o Key Responsibilities:
 Divides raw bits into frames (data packets with control
information).
 Error detection and correction (e.g., CRC).
 MAC (Media Access Control) addresses: Ensures data is sent
to the correct physical device.
 Flow control and handling of collisions in shared media.
o Examples:
 Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11), MAC addresses,
switches, and bridges.
3. Layer 3: Network Layer
o Function: Manages routing and forwarding of data packets between
devices on different networks.
o Key Responsibilities:
 Logical addressing using IP (Internet Protocol) addresses.
 Determines the best path for data to travel across networks
(routing).
 Fragmentation and reassembly of packets.
o Examples:
 IP (IPv4, IPv6), routers, ICMP (Internet Control Message
Protocol).
4. Layer 4: Transport Layer
o Function: Provides reliable data transfer between host systems.
Ensures data integrity, proper sequencing, and error recovery.
o Key Responsibilities:
 Segmentation of data and reassembly at the destination.
 Flow control (e.g., windowing).
 Error recovery and retransmission of lost data.
 End-to-end communication (connection-oriented or
connectionless).
o Examples:
 TCP (Transmission Control Protocol), UDP (User Datagram
Protocol).
5. Layer 5: Session Layer
o Function: Manages and controls the dialog (session) between two
communicating systems. Keeps track of sessions and ensures that
data exchanges are properly coordinated.
o Key Responsibilities:
 Establishment, management, and termination of sessions.
 Dialog control (e.g., full-duplex or half-duplex
communication).
 Synchronization and checkpointing (helpful in case of
interruptions).
o Examples:
RPC (Remote Procedure Call), NetBIOS, PPTP (Point-to-Point
Tunneling Protocol).
6. Layer 6: Presentation Layer
o Function: Translates data between the application layer and the
network format. Ensures that data is in a usable format.
o Key Responsibilities:
 Data translation, encryption, and compression.
 Data encoding and decoding (e.g., ASCII, EBCDIC, encryption
algorithms).
 Ensures data sent from the application layer of one system is
readable by the application layer of another.
o Examples:
 JPEG, MPEG, SSL/TLS, ASCII, GIF.
7. Layer 7: Application Layer
o Function: The topmost layer that provides network services directly
to end-user applications. It interfaces with software applications to
implement communication components.
o Key Responsibilities:
 Network process-to-application communication.
 Identifies communication partners and resource availability.
 Implements services like file transfers, email, and database
access.
o Examples:
 HTTP (Hypertext Transfer Protocol), FTP (File Transfer
Protocol), SMTP (Simple Mail Transfer Protocol), DNS
(Domain Name System).

OSI Layer Communication


 Each layer in the OSI model communicates directly with its corresponding
layer on another device (called peer-to-peer communication).
 Encapsulation: Data at the higher layers is wrapped with protocol
information from the lower layers.
Key Concepts
1. Encapsulation: Data passes from the top layer (application) to the bottom
(physical). Each layer adds its own header or trailer information as the data
moves downward, which is essential for proper delivery to the recipient.
2. Decapsulation: When data is received, it travels from the physical layer
up to the application layer, with each layer stripping away its respective
header until the original data is revealed.
3. Connection-Oriented vs. Connectionless Communication:
o Connection-Oriented (e.g., TCP): Establishes a connection before
data transfer and guarantees data delivery.
o Connectionless (e.g., UDP): Sends data without setting up a formal
connection and does not guarantee delivery.
4. Routing vs. Switching:
o Routing (Network Layer): Determines the best path for data to
travel between different networks.
o Switching (Data Link Layer): Transfers data within the same
network, focusing on forwarding frames to the correct device.
5. Addressing:
o MAC Address (Layer 2): A physical address used to identify
devices on the same network segment.
o IP Address (Layer 3): A logical address used to identify devices
across different networks.

Comparison to the TCP/IP Model


 The OSI model is primarily theoretical, while the TCP/IP model is
practical and widely implemented in the real world.
 The TCP/IP model has four layers:
1. Application Layer (equivalent to OSI Layers 5-7)
2. Transport Layer (same as OSI Layer 4)
3. Internet Layer (similar to OSI Layer 3)
4. Network Interface Layer (combines OSI Layers 1-2)

Why the OSI Model Matters


 Standardization: The OSI model provides a universal language for
different networking protocols to interact, ensuring interoperability.
 Troubleshooting: Helps network engineers systematically troubleshoot by
identifying the layer where an issue occurs.
 Modular Networking: By dividing tasks into layers, the OSI model
allows for modular design, where each layer can evolve independently of
others.

You might also like