Introduction
The Open Systems Interconnection (OSI) model is a reference tool for understanding data communications between any two networked systems. It divides the communications processes into seven layers. Each layer both performs specific functions to support the layers above it and offers services to the layers below it. The three lowest layers focus on passing traffic through the network to an end system. The top four layers come into play in the end system to complete the process.
Seven Layers/Standards of the OSI Model :-
Layer 1 - Physical Layer :
Application |
Presentation |
Session |
Transport |
Network |
Data Link |
Physical |
The Physical Layer receives data from the data link Layer, and transmits it to the wire. The physical layer controls the electrical and mechanical functions related to the transmission and receipt of a communications signal. It also manages the encoding and decoding of data contained within the modulated signal.
Note that for two devices to communicate, they must beconnected to the same type of physical medium (wiring). 802.3 Ethernet to 802.3 Ethernet, FDDI to FDDI, serial to serial etc. Two end stations using different protocols can only communicate through a multi-protocol bridge or a router.
The physical layer is responsible for:
- Communication with the data link layer above it.
- Fragmentation of data into frames.
- Reassembly of frames into data link Protocol Data Units.
- Transmission to the physical media.
- Receiving from the physical media.
Protocols :-
IEEE 802
IEEE 802.2
ISO 2110
ISDN
IEEE 802
IEEE 802.2
ISO 2110
ISDN
Layer 2 - Data Link Layer :
Application |
Presentation |
Session |
Transport |
Network |
Data Link |
Physical |
The data link Layer is the second layer of the OSI model. Data link layers handle data transfer between network layer and physical layer. It receive data from network layer, adds header and trailer to the data and passes data to physical layer . At the receiver, it receiver data from the physical layer removes the header and trailer and passes the data to the network layer.
The data link layer performs various functions depending upon the hardware protocol used, but has four primary functions:
- COMMUNICATION with the Network layer above.
- SEGMENTATION of upper layer datagrams (also called packets) into frames in sizes that can be handled by the communications hardware.
- BIT ORDERING. The data link layer organizes the pattern of data bits into framesbefore transmission. The frame formatting issues such as stop and start bits, bit order, parity and other functions are handled here. Management of big-endian / little-endian issues are also managed at this layer.
- COMMUNICATION with the Physical layer below
- Handles data frames between the Network and Physical layers.
- Frame traffic control: tells the transmitting node to "back-off" when no frame buffers are available.
- Frame sequencing: transmits/receives frames sequentially.
- Frame acknowledgment: provides/expects frame acknowledgments. Detects and recovers from errors that occur in the physical layer by retransmitting non-acknowledged frames and handling duplicate frame receipt.
This layer provides reliable transit of data across a physical link. The data link layer is concerned with physical addressing, network topology, physical link management, error notification, ordered delivery of frames, and flow control.
Protocols :
a) Logical Link Control (LLC)
i. Error correction and flow control
ii. Manages link control
b) Media Access Control (MAC)
i. Communicates with the adapter card.
ii. Controls the type of media being used.
NOTE: The data link layer
is responsible for moving frames from one hop (node) to the next.
Layer 3 - Network Layer :
Application |
Presentation |
Session |
Transport |
Network |
Data Link |
Physical |
This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, inter-networking, error handling, congestion control and packet sequencing.
IP (Internet Protocol) is responsible for routing, directing datagrams from one network to another. The network layer may have to break large datagrams, larger than MTU, into smaller packets and host receiving the packet will have to reassemble the fragmented datagram. The Internetwork Protocol identifies each host with a 32-bit IP address. IP addresses are written as four dot-separated decimal numbers between 0 and 255, e.g., 129.79.16.40. The leading 1-3 bytes of the IP identify the network and the remaining bytes identifies the host on that network. The network portion of the IP is assigned by InterNIC Registration Services, under the contract to the National Science Foundation, and the host portion of the IP is assigned by the local network administrators. For large sites, the first two bytes represents the network portion of the IP, and the third and fourth bytes identify the subnet and host respectively. Even though IP packets are addressed using IP addresses, hardware addresses must be used to actually transport data from one host to another. The Address Resolution Protocol (ARP) is used to map the IP address to it hardware address.
Functions :
- Translates logical network address and names to their physical address (e.g. computername ==> MAC address).
- Responsible for addressing, determining routes for sending and managing network problems such as packet switching, data congestion and routing.
- If router can’t send data frame as large as the source computer sends, the network layer compensates by breaking the data into smaller units. At the receiving end, the network layer reassembles the data.
Protocols :-
IP
ARP
RARP
ICMP
RIP
OSFP
IGMP
IPX
NWLink
NetBEUI
OSI
DDP
DECnet
IP
ARP
RARP
ICMP
RIP
OSFP
IGMP
IPX
NWLink
NetBEUI
OSI
DDP
DECnet
Note : The network layer is responsible for the delivery of individual packets from the source host to the destination host.
Layer 4 - Transport Layer :
Application |
Presentation |
Session |
Transport |
Network |
Data Link |
Physical |
Two transport layer protocols:
1. Transmission Control Protocol (TCP),
2. User Datagram Protocol (UDP),
At the transport layer. Reliability and speed are the primary difference between these two protocols.
TCP establishes connections between two hosts on the network through 'sockets' which are determined by the IP address and port number. TCP keeps track of the packet delivery order and the packets that must be resent. Maintaining this information for each connection makes TCP a stateful protocol.
UDP on the other hand provides a low overhead transmission service, but with less error checking. NFS is built on top of UDP because of its speed.
- Communicate with the Session layer above.
- Reassemble transport Protocol Data Units into data streams
- Reliable protocols operating at this layer will
- Detect errors and lost data
- Recover lost data
- Manage retransmission of data.
- Segmentation of data streams into transport Protocol Data Units.
- Communicate with the Network layer below.
Protocols :
TCP
ARP
RARP
SPX
NWLink
NetBIOS / NetBEUI
ATP
UDP
DCCP
TCP
ARP
RARP
SPX
NWLink
NetBIOS / NetBEUI
ATP
UDP
DCCP
Note : The transport layer
is responsible for the delivery of a message from one process to
another.
Layer 5 - Session Layer :
Session layer is the 5th layer of the OSI model. The session layer allows session establishment between processes running on different stations. This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end.
The session layer tracks connections, also called sessions. The session layer should keep track of multiple file downloads requested by a particiular FTP application, or multiple telnet connections from a single terminal client, or web page retrievals from a web server.
With TCP/IP this functionality is handled by application software addressing a connection to a remote machine and using a different local port number for each connection.
Application |
Presentation |
Session |
Transport |
Network |
Data Link |
Physical |
Session layer is the 5th layer of the OSI model. The session layer allows session establishment between processes running on different stations. This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end.
The session layer tracks connections, also called sessions. The session layer should keep track of multiple file downloads requested by a particiular FTP application, or multiple telnet connections from a single terminal client, or web page retrievals from a web server.
With TCP/IP this functionality is handled by application software addressing a connection to a remote machine and using a different local port number for each connection.
Functions :
Presentation layer is the 6th layer of the OSI model. The presentation layer handles the conversion of data between a Standards-based or platform independant formats to a format understood by the local machine. This allows for data to be transported between devices and still be understood.
The presentation layer provides:
Protocols :
MIME
XDR
TLS
SSL
Layer 7 - Application Layer :
The OSI model defines the application layer as being the user interface. The OSI application layer is responsible for displaying data and images to the user in a human-recognizable format and to interface with the presentation layer below it.
Examples of applications that utilize the network are:
Protocols :
FTAM
DNS
FTP
TFTP
BOOTP
SNMP
RLOGIN
SMTP
MIME
NFS
FINGER
TELNET
NCP
APPC
AFP
SMB
Quick View at the Functions of the layers
OSI Model and Protocol
Network Communications through the OSI Model :
- Session establishment, maintenance and termination: allows two application processes on different machines to establish, use and terminate a connection, called a session.
- Session support: performs the functions that allow these processes to communicate over the network, performing security, name recognition, logging, and so on.
Protocols :
NetBIOS
Names Pipes
Mail Slots
RPC
SAP
L2TP
PPTP
SPDY
NetBIOS
Names Pipes
Mail Slots
RPC
SAP
L2TP
PPTP
SPDY
Layer 6 - Presentation Layer :
Application |
Presentation |
Session |
Transport |
Network |
Data Link |
Physical |
Presentation layer is the 6th layer of the OSI model. The presentation layer handles the conversion of data between a Standards-based or platform independant formats to a format understood by the local machine. This allows for data to be transported between devices and still be understood.
The presentation layer provides:
- Character code translation: for example, ASCII to EBCDIC.
- Data conversion: bit order, CR-CR/LF, integer-floating point, and so on.
- Data compression: reduces the number of bits that need to be transmitted on the network.
- Data encryption: encrypt data for security purposes. For example, password encryption.
Protocols :
MIME
XDR
TLS
SSL
Layer 7 - Application Layer :
Application |
Presentation |
Session |
Transport |
Network |
Data Link |
Physical |
The OSI model defines the application layer as being the user interface. The OSI application layer is responsible for displaying data and images to the user in a human-recognizable format and to interface with the presentation layer below it.
Examples of applications that utilize the network are:
- Telnet
- FTP
- Instant Message software (AIM, MSN, ICQ, Yahoo)
- Microsoft Windows File Shares
- Web Browsers (Internet Explorer, Firefox, Google Chrome, Safari)
Protocols :
FTAM
DNS
FTP
TFTP
BOOTP
SNMP
RLOGIN
SMTP
MIME
NFS
FINGER
TELNET
NCP
APPC
AFP
SMB
Quick View at the Functions of the layers
OSI Model and Protocol
Network Communications through the OSI Model :
Network Communications through the OSI Model. Some info. is added at every layer into the data known as "HEADERS"
The figure represents two networked computers. They are running
identical operating systems and applications and are using identical
protocols (or rules) at all OSI layers. Working in conjunction, the
applications, the OS, and the hardware implement the seven functions
described in the OSI model.
Each computer is also running an e-mail program that is
independent of the OSI layers. The e-mail program enables the users of
the two computers to exchange messages. Our figure represents the
transmission of one brief message from Sam to Charlie.
The transmission starts when Sam types in a message to
Charlie and presses the "send" key. Sam's operating system appends to
the message (or "encapsulates") a set of application-layer instructions
(OSI Layer 7) that will be read and executed by the application layer on
Charlie's computer. The message with its Layer 7 header is then
transferred to the part of the operating system that deals with
presentation issues (OSI Layer 6) where a Layer 6 header is appended to
the message. The process repeats through all the layers until each layer
has appended a header. The headers function as an escort for the
message so that it can successfully negotiate the software and hardware
in the network and arrive intact at its destination.
When the data-link-layer header is added at Layer 2, the data
unit is known as a "frame." The final header, the physical-layer header
(OSI Layer 1) tells the hardware in Sam's computer the electrical
specifics of how the message will be sent (which medium, at which
voltage, at which speed, etc.). Although it is the final header to be
added, the Layer 1 header is the first in line when the message travels
through the medium to the receiving computer.
When the message with its seven headers arrives at Charlie's
computer, the hardware in his computer is the first to handle the
message. It reads the instructions in the Layer 1 header, executes them,
and strips off the header before passing the message to the Layer 2
components. These Layer 2 components execute those instructions, strip
off the header, and pass the message to Layer 3, and so on. Each layer's
header is successively stripped off after its instructions have been
read so that by the time the message arrives at Charlie's e-mail
application, the message has been properly received, authenticated,
decoded, and presented.
Keep on reading!
thanks
ReplyDeleteThanks for your brief description about OSI reference Model
ReplyDeleteit's great help for me
ReplyDeletehow to downlord it
ReplyDeleteI want to shear a life changing story with everyone who cares to read this testimony. Blank atm cards are real and are effective all over the world. my name is Gorge Judy i live in SPAIN . I got this card from [skylink technology] a month ago. this card has really help me pay my debts and now i am free from all financial problems. I no this is hard to believe , but i never knew there was this kind of card until i got one. This card withdraw more than €6000 daily and it is very easy to use. But you have to be very careful in other not to be caught by the police because it is illegal. If you want more information on this card and how to get one just contact the hackers by this address
ReplyDeleteskylinktechnes@yahoo.com or whatsapp +1(213)328–0248
Have you pay your necessary BILLS? Do you need money? Do you want a better way to transform your own life? My name his Elizabeth Maxwell. I am here to share with you about Mr OSCAR WHITE new system of making others rich with not less than two to three days.I was in search of a job opportunity on the internet when i come across his aid on a blogs that i was on to, talking on how he can help the needy with a programmed BLANK ATM CARD.I thought it was a scam or normal gist but i never had a choice than to contact him cause i was seriously in need of Finance for Business.I contacted him on the CARD, and not less than a minute he respond and give me the necessary information’s on how to get the card. My friends, today am a sweet happy woman with good business and a happy family. I charge you not to live by ignorance.Try and get an ATM card today through (MR OSCAR WHITE)and be among the lucky ones who are benefiting from this card. This ATM card is capable of hacking into any ATM machine anywhere in the world.It has really changed my life and now I can say I’m rich because I am a living testimony. The less money I get in a day with this card is $15,000.Every now and then money keep pumping into my account. Although is illegal, there is no risk of being caught, as it is programmed so that it can not trace you, but also has a technique that makes it impossible for the CCTV to detect you.. I urge you to contact him on the BLANK ATM CARD. For details on how to get yours today, email hackers oscarwhitehackersworld@gmail.com ,whats-app +1(209)-643-1515
ReplyDeleteQuiero agradecer mucho a Kelvin Ericksson por hacerme vivir una vida mejor y más estándar ... Obtuve la tarjeta de cajero automático del servicio de entrega ... Quiero usar este medio para decirle a cualquiera que viva en EE. UU. Y EUROPA para tomar la decisión correcta hoy Kelvin Ericksson es real ... LAS TARJETAS DE ATM PROGRAMADAS son reales y funcionan perfectamente
ReplyDeleteCONTACTO CON KELVIN ERICKSSON: BLANKATMMASTER5555@GMAIL.COM
QUÉ-APLICACIÓN: +3197005033695