The OSI Model is an internationally standardized network architecture consisting of seven layers that facilitate communication between open systems. Each layer provides services to the layer above and consumes services from the layer below, with specific functions such as data transmission, error handling, and session management. The model distinguishes between user application layers and communication technology layers, and outlines the roles of routers and the concept of reliability in network services.
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
9 views
OSI Layers
The OSI Model is an internationally standardized network architecture consisting of seven layers that facilitate communication between open systems. Each layer provides services to the layer above and consumes services from the layer below, with specific functions such as data transmission, error handling, and session management. The model distinguishes between user application layers and communication technology layers, and outlines the roles of routers and the concept of reliability in network services.
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16
OSI Model
Networking and Computer Security
Topics • The OSI reference model • Services in the OSI model OSI Reference Model • OSI Reference Model - internationally standardised network architecture. • OSI = Open Systems Interconnection: deals with open systems, i.e. systems open for communications with other systems. • Model has 7 layers. 7-Layer OSI Model Layer 7 Application Layer • Layers 1-4 relate to Layer 6 Presentation Layer communications technology. • Layers 5-7 relate to user Layer 5 Session Layer applications. Layer 4 Transport Layer
Layer 3 Network Layer
Layer 2 Data Link Layer
Layer 1 Physical Layer
Communications subnet boundary
Layer 7: Application Layer • Level at which applications access network services. – Represents services that directly support software applications for file transfers, web services database access, and electronic mail etc. Layer 6: Presentation Layer • Related to representation of transmitted data – Translates different data representations from the Application layer into uniform standard format • Providing services for secure efficient data transmission – e.g. data encryption, and data compression. Layer 5: Session Layer • Allows two applications on different computers to establish, use, and end a session. – e.g. file transfer, remote login • Establishes dialog control – Regulates which side transmits, plus when and how long it transmits. • Performs token management and synchronization. Layer 4: Transport Layer • Manages transmission packets – Repackages long messages when necessary into small packets for transmission – Reassembles packets in correct order to get the original message. • Handles error recognition and recovery. – Transport layer at receiving acknowledges packet delivery. – Resends missing packets Layer 3: Network Layer • Manages addressing/routing of data within the subnet – Addresses messages and translates logical addresses and names into physical addresses. – Determines the route from the source to the destination computer – Manages traffic problems, such as switching, routing, and controlling the congestion of data packets. • Routing can be: – Based on static tables – determined at start of each session – Individually determined for each packet, reflecting the Layer 2: Data Link Layer · Packages raw bits from the Physical layer into frames (logical, structured packets for data). · Provides reliable transmission of frames · It waits for an acknowledgment from the receiving computer. · Retransmits frames for which acknowledgement not received Layer 1: Physical Layer • Transmits bits from one computer to another • Regulates the transmission of a stream of bits over a physical medium. • Defines how the cable is attached to the network adapter and what transmission technique is used to send data over the cable. Deals with issues like – The definition of 0 and 1, e.g. how many volts represents a 1, and how long a bit lasts? – Whether the channel is simplex or duplex? – How many pins a connector has, and what the function of each pin is? Internet Protocols vs OSI with PDU PDU Application
Presentation Data Application
Session
Transport segment TCP
Network Network IP
Data Link Frame Network Interface
Physical Bits Hardware
• Explicit Presentation and session layers missing in Internet Protocols • Data Link and Network Layers redesigned Services in the OSI Model • In OSI model, each layer provide services to layer above, and ‘consumes’ services provided by layer below. • Active elements in a layer called entities. • Entities in same layer in different machines called peer entities. Router as a Computer ► Routers Operate at Layers 1, 2 & 3 – Router receives a stream of encoded bits – Bits are decoded and passed to layer 2 – Router de-encapsulates the frame – Remaining packet passed up to layer 3 -Routing decision made at this layer by examining destination IP address – Packet is then re-encapsulated & sent out outbound interface Connections • Layers can offer connection-oriented or connectionless services. • Connection-oriented like telephone system. • Connectionless like postal system. • Each service has an associated Quality-of- service (e.g. reliable or unreliable). Reliability • Reliable services never lose/corrupt data. • Reliable service costs more. • Typical application for reliable service is file transfer. • Typical application not needing reliable service is voice traffic. • Not all applications need connections.
CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition (Exam N10-007) Mike Meyers [Meyers - Read the ebook online or download it for a complete experience