0% found this document useful (0 votes)
16 views12 pages

OSIModel

The document provides an overview of the seven layers of the OSI model, describing the functions of each layer. It explains that the OSI model divides network communication processes into seven abstract layers and that each layer relies on the layers below it while providing services to the layers above it.

Uploaded by

kallarkahar47
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views12 pages

OSIModel

The document provides an overview of the seven layers of the OSI model, describing the functions of each layer. It explains that the OSI model divides network communication processes into seven abstract layers and that each layer relies on the layers below it while providing services to the layers above it.

Uploaded by

kallarkahar47
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

The OSI Model:

Understanding the
Seven Layers of
Computer Networks
The OSI Model:
Introduction
The Open Systems Interconnection (OSI) model is a reference tool for understanding data communications
between any two networked systems. It divides the communications processes into seven layers. Each layer both
performs specific functions to support the layers above it and offers services to the layers below it. The three lowest
layers focus on passing traffic through the network to an end system. The top four layers come into play in the end
system to complete the process.

This white paper will provide you with an understanding of each of the seven layers, including their functions and
their relationships to each other. This will provide you with an overview of the network process, which can then
act as a framework for understanding the details of computer networking.

Since the discussion of networking often includes talk of “extra layers”, this paper will address these unofficial
layers as well.

Finally, this paper will draw comparisons between the theoretical OSI model and the functional TCP/IP model.
Although TCP/IP has been used for network communications before the adoption of the OSI model, it supports the
same functions and features in a differently layered arrangement.

An Overview of the OSI Model

2
A networking model offers a generic means to separate computer networking functions into multiple layers. Each
of these layers relies on the layers below it to provide supporting capabilities and performs support to the layers
above it. Such a model of layered functionality is also called a “protocol stack” or “protocol suite”.

Protocols, or rules, can do their work in either hardware or software or, as with most protocol stacks, in a com-
bination of the two. The nature of these stacks is that the lower layers do their work in hardware or firmware
(software that runs on specific hardware chips) while the higher layers work in software.

The Open System Interconnection model is a seven-layer structure that specifies the requirements for commu-
nications between two computers. The ISO (International Organization for Standardization) standard 7498-1
defined this model. This model allows all network elements to operate together, no matter who created the protocols
and what computer vendor supports them.

The main benefits of the OSI model include the following:


• Helps users understand the big picture of networking
• Helps users understand how hardware and software elements function together
• Makes troubleshooting easier by separating networks into manageable pieces
• Defines terms that networking professionals can use to compare basic functional relationships on differ-
ent networks
• Helps users understand new technologies as they are developed
• Aids in interpreting vendor explanations of product functionality

Layer 1 – The Physical Layer

The physical layer of the OSI model defines connector and interface specifications, as well as the medium
(cable) requirements. Electrical, mechanical, functional, and procedural specifications are provided for sending a
bit stream on a computer network.

3
Components of the physical layer include:
• Cabling system components
• Adapters that connect media to physical interfaces
• Connector design and pin assignments
• Hub, repeater, and patch panel specifications
• Wireless system components
• Parallel SCSI (Small Computer System Interface)
• Network Interface Card (NIC)

In a LAN environment, Category 5e UTP (Unshielded Twisted Pair) cable is generally used for the physical layer
for individual device connections. Fiber optic cabling is often used for the physical layer in a vertical or riser
backbone link. The IEEE, EIA/TIA, ANSI, and other similar standards bodies developed standards for this layer.

Note: The Physical Layer of the OSI model is only part of a LAN (Local Area Network).

Layer 2 – The Data Link Layer

Layer 2 of the OSI model provides the following functions:


• Allows a device to access the network to send and receive messages
• Offers a physical address so a device’s data can be sent on the network
• Works with a device’s networking software when sending and receiving messages
• Provides error-detection capability

Common networking components that function at layer 2 include:


• Network interface cards
• Ethernet and Token Ring switches
• Bridges

NICs have a layer 2 or MAC address. A switch uses this address to filter and forward traffic, helping relieve
congestion and collisions on a network segment.

4
Bridges and switches function in a similar fashion; however, bridging is normally a software program on a CPU,
while switches use Application-Specific Integrated Circuits (ASICs) to perform the task in dedicated hardware,
which is much faster.

Layer 3 – The Network Layer

Layer 3, the network layer of the OSI model, provides an end-to-end logical addressing system so that a packet of
data can be routed across several layer 2 networks (Ethernet, Token Ring, Frame Relay, etc.). Note that net- work
layer addresses can also be referred to as logical addresses.

Initially, software manufacturers, such as Novell, developed proprietary layer 3 addressing. However, the net-
working industry has evolved to the point that it requires a common layer 3 addressing system. The Internet
Protocol (IP) addresses make networks easier to both set up and connect with one another. The Internet uses IP
addressing to provide connectivity to millions of networks around the world.

To make it easier to manage the network and control the flow of packets, many organizations separate their
network layer addressing into smaller parts known as subnets. Routers use the network or subnet portion of the
IP addressing to route traffic between different networks. Each router must be configured specifically for the
networks or subnets that will be connected to its interfaces.

Routers communicate with one another using routing protocols, such as Routing Information Protocol (RIP) and
Open version of Shortest Path First (OSPF), to learn of other networks that are present and to calculate the best
way to reach each network based on a variety of criteria (such as the path with the fewest routers).
Routers and other networked systems make these routing decisions at the network layer.

When passing packets between different networks, it may become necessary to adjust their outbound size to one
that is compatible with the layer 2 protocol that is being used. The network layer accomplishes this via a process
known as fragmentation. A router’s network layer is usually responsible for doing the fragmentation. All
reassembly of fragmented packets happens at the network layer of the final destination system.

5
Two of the additional functions of the network layer are diagnostics and the reporting of logical variations in
normal network operation. While the network layer diagnostics may be initiated by any networked system, the
system discovering the variation reports it to the original sender of the packet that is found to be outside nor- mal
network operation.

The variation reporting exception is content validation calculations. If the calculation done by the receiving sys- tem
does not match the value sent by the originating system, the receiver discards the related packet with no report to
the sender. Retransmission is left to a higher layer’s protocol.

Some basic security functionality can also be set up by filtering traffic using layer 3 addressing on routers or other
similar devices.

Layer 4 – The Transport Layer

Layer 4, the transport layer of the OSI model, offers end-to-end communication between end devices through a
network. Depending on the application, the transport layer either offers reliable, connection-oriented or con-
nectionless, best-effort communications.

Some of the functions offered by the transport layer include:


• Application identification
• Client-side entity identification
• Confirmation that the entire message arrived intact
• Segmentation of data for network transport
• Control of data flow to prevent memory overruns
• Establishment and maintenance of both ends of virtual circuits
• Transmission-error detection
• Realignment of segmented data in the correct order on the receiving side
• Multiplexing or sharing of multiple sessions over a single physical link

The most common transport layer protocols are the connection-oriented TCP Transmission Control Protocol
(TCP) and the connectionless UDP User Datagram Protocol (UDP).

6
Layer 5 – The Session Layer

Layer 5, the session layer, provides various services, including tracking the number of bytes that each end of the
session has acknowledged receiving from the other end of the session. This session layer allows applica- tions
functioning on devices to establish, manage, and terminate a dialog through a network. Session layer
functionality includes:
• Virtual connection between application entities
• Synchronization of data flow
• Creation of dialog units
• Connection parameter negotiations
• Partitioning of services into functional groups
• Acknowledgements of data received during a session
• Retransmission of data if it is not received by a device

Layer 6 – The Presentation Layer

7
Layer 6, the presentation layer, is responsible for how an application formats the data to be sent out onto the network.
The presentation layer basically allows an application to read (or understand) the message.
Examples of presentation layer functionality include:
• Encryption and decryption of a message for security
• Compression and expansion of a message so that it travels efficiently
• Graphics formatting
• Content translation
• System-specific translation

Layer 7 – The Application Layer

Layer 7, the application layer, provides an interface for the end user operating a device connected to a net- work.
This layer is what the user sees, in terms of loading an application (such as Web browser or e-mail); that is, this
application layer is the data the user views while using these applications.
Examples of application layer functionality include:
• Support for file transfers
• Ability to print on a network
• Electronic mail
• Electronic messaging
• Browsing the World Wide Web

8
USES OF TCP/IP:
TCP/IP, short for Transmission Control Protocol/Internet Protocol, is the suite of communication
protocols that form the backbone of the internet. It's not a single protocol, but rather a layered
system that defines how data is formatted, addressed, transmitted, routed, and received between
devices on a network.

Here's a breakdown of the key uses of TCP/IP:

1. Internet Communication:

 Web browsing: When you access a website, TCP/IP handles the communication between your
device and the web server. It breaks down web pages into packets, sends them across the

network, and reassembles them at your device for display


TCP/IP web browsing

 Email: Sending and receiving emails relies on TCP/IP to ensure reliable delivery of messages and
attachments.

TCP/IP email

 File transfer: Sharing files over the internet, whether using FTP or cloud storage
services, utilizes TCP/IP for efficient data transfer.

9
TCP/IP file transfer

 Streaming: Whether you're watching a video on YouTube or listening to music on


Spotify, TCP/IP ensures smooth streaming of multimedia content.

TCP/IP streaming

2. Network Services:

 Remote access: TCP/IP enables remote desktop applications and virtual private networks (VPNs)
that allow you to access a computer system from another location.

TCP/IP remote access

10
 Network printing: Sharing printers across a network relies on TCP/IP for communication
between devices and the printer.

TCP/IP network printing

 Network storage: Accessing and storing files on shared network drives utilizes TCP/IP for data
transfer and management.

TCP/IP network storage

3. Application Support:

 Most internet applications: From online games and social media platforms to e-commerce and
banking services, virtually all internet applications rely on TCP/IP for communication and data
exchange.

4. Underlying Infrastructure:

 Routing & Addressing: TCP/IP protocols like IP and ICMP play a crucial role in routing data
packets across the vast network infrastructure of the internet, ensuring they reach the correct
destination.

11
TCP/IP routing and addressing

 Network Management: TCP/IP provides tools and protocols for network administrators to
monitor, manage, and troubleshoot network performance and security.

12

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy