You are on page 1of 5

Internet Architecture & Protocol Farrukh Adeel Malik.

Semester II M.S.c I.T(Morning).


OSI Model. Roll No.52.

What Is OSI Model?


The Open Systems Interconnection model (OSI model) was a product of the Open Systems Interconnection effort
at the International Organization for Standardization. It is a way of sub-dividing a communications system into smaller
parts called layers. Similar communication functions are grouped into logical layers. A layer provides services to its
upper layer while receiving services from the layer below. On each layer, an instance provides service to the instances
at the layer above and requests service from the layer below.

Or We can say,

The OSI, or Open System Interconnection, model defines a networking framework for implementing protocols in
seven layers. Control is passed from one layer to the next, starting at the application layer in one station, proceeding to
the bottom layer, over the channel to the next station and back up the hierarchy.

7 Layers Of OSI Model.

1. Physical (Layer 1) -This layer conveys the bit stream - electrical impulse, light or radio signal -- through the
network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a
carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with
physical layer components

2. Data Link (Layer 2) - At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol
knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer
is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub
layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame
synchronization, flow control and error checking.

Ethernet addresses a host using a unique, 48-bit address called its Ethernet address or Media Access Control (MAC) address.
MAC addresses are usually represented as six colon-separated pairs of hex digits, e.g., 8:0:20:11:ac:85. This number is unique and
is associated with a particular Ethernet device. Hosts with multiple network interfaces should use the same MAC address on each.
The data link layer's protocol-specific header specifies the MAC address of the packet's source and destination. When a packet is
sent to all hosts (broadcast), a special MAC address (ff:ff:ff:ff:ff:ff) is used.

3. Network (Layer 3) - This layer provides switching and routing technologies, creating logical paths, known as
virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as
addressing, internetworking, error handling, congestion control and packet sequencing.

1
Internet Architecture & Protocol Farrukh Adeel Malik.
Semester II M.S.c I.T(Morning).
OSI Model. Roll No.52.

NFS uses Internet work Protocol (IP) as its network layer interface. IP is responsible for routing, directing data grams
from one network to another. The network layer may have to break large data grams, larger than MTU, into smaller
packets and host receiving the packet will have to reassemble the fragmented data gram. The Internet work Protocol
identifies each host with a 32-bit IP address. IP addresses are written as four dot-separated decimal numbers between
0 and 255, e.g., 129.79.16.40. The leading 1-3 bytes of the IP identify the network and the remaining bytes identifies
the host on that network. The network portion of the IP is assigned by InterNIC Registration Services, under the
contract to the National Science Foundation, and the host portion of the IP is assigned by the local network
administrators. For large sites, the first two bytes represents the network portion of the IP, and the third and fourth
bytes identify the subnet and host respectively.Even though IP packets are addressed using IP addresses, hardware
addresses must be used to actually transport data from one host to another. The Address Resolution Protocol (ARP) is
used to map the IP address to it hardware address.
4. Transport (Layer 4) -Transport layer subdivides user-buffer into network-buffer sized data grams and enforces desired
transmission control. Two transport protocols, Transmission Control Protocol (TCP) and User Data gram Protocol (UDP), sits at
the transport layer. Reliability and speed are the primary difference between these two protocols. TCP establishes connections
between two hosts on the network through 'sockets' which are determined by the IP address and port number. TCP keeps track of
the packet delivery order and the packets that must be resent. Maintaining this information for each connection makes TCP a
stateful protocol. UDP on the other hand provides a low overhead transmission service, but with less error checking. NFS is built
on top of UDP because of its speed and statelessness. Statelessness simplifies the crash recovery.
5. Session (Layer 5) - This layer establishes, manages and terminates connections between applications. The
session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications
at each end. It deals with session and connection coordination.
6.Application (Layer 7)- This layer supports application and end-user processes. Communication partners are
identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data
syntax are identified. Everything at this layer is application-specific. This layer provides application services for file
transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the
application level. Tiered application architectures are part of this layer.

7.Presentation (Layer 6) -This layer provides independence from differences in data representation (e.g.,
encryption) by translating from application to network format, and vice versa. The presentation layer works to
transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent
across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.

2
Internet Architecture & Protocol Farrukh Adeel Malik.
Semester II M.S.c I.T(Morning).
OSI Model. Roll No.52.

Attaching & removing Header In OSI Model.

OSI Model Reference Table


Layer Function Protocols Network
Components
Application • Used for applications DNS; FTP; TFTP; Gateway
User Interface specifically written to run over BOOTP;
the network SNMP;RLOGIN; SMTP;
• Allows access to network MIME; NFS; FINGER;
services that support TELNET; NCP; APPC;
applications; AFP; SMB
• Directly represents the services
that directly support user
applications
• Handles network access, flow
control and error recovery
• Example apps are file transfer,
e-mail, NetBIOS-based
applications
Presentation • Translates from application to Gateway
Translation network format and vice-versa Redirector
• All different formats from all
sources are made into a common
uniform format that the rest of
the OSI model can understand
• Responsible for protocol
conversion, character
conversion, data encryption /
decryption, expanding graphics

3
Internet Architecture & Protocol Farrukh Adeel Malik.
Semester II M.S.c I.T(Morning).
OSI Model. Roll No.52.

commands, data compression


• Sets standards for different
systems to provide seamless
communication from multiple
protocol stacks
• Not always implemented in a
network protocol
Session • Establishes, maintains and ends Net BIOS Gateway
Syncs and sessions across the network Names Pipes
Sessions • Responsible for name Mail Slots
recognition (identification) so RPC
only the designated parties can
participate in the session
• Provides synchronization
services by planning check
points in the data stream => if
session fails, only data after the
most recent checkpoint need be
transmitted
• Manages who can transmit data
at a certain time and for how
long
• Examples are interactive login
and file transfer connections, the
session would connect and re-
connect if there was an
interruption; recognize names in
sessions and register names in
history
Transport • Additional connection below the TCP, ARP, RARP; Gateway
Packets; Flow session layer SPX Advanced Cable
control & • Manages the flow control of NWLink Tester
Error- data between parties across the Net BIOS / NetBEUI Router
handling network ATP
• Divides streams of data into
chunks or packets; the transport
layer of the receiving computer
reassembles the message from
packets
• A train is a good analogy => the
data is divided into identical
units
• Provides error-checking to
guarantee error-free data
delivery, with on losses or
duplications
• Provides acknowledgment of
successful transmissions;
requests retransmission if some
packets don’t arrive error-free
• Provides flow control and error-
handling
Network • Translates logical network IP; ARP; RARP, ICMP; Router
Addressing; address and names to their RIP; OSFP; Router

4
Internet Architecture & Protocol Farrukh Adeel Malik.
Semester II M.S.c I.T(Morning).
OSI Model. Roll No.52.

Routing physical address (e.g. computer IGMP; Frame Relay


name ==> MAC address) IPX Device
• Responsible for NWLink ATM Switch
 addressing NetBEUI Advanced Cable
 determining routes for OSI Tester
sending DDP
 managing network DECnet
problems such as
packet switching, data
congestion and routing
• If router can’t send data frame as
large as the source computer
sends, the network layer
compensates by breaking the
data into smaller units. At the
receiving end, the network layer
reassembles the data
• Think of this layer stamping the
addresses on each train car
Data Link • Turns packets into raw bits Logical Link Control Bridge
Data frames to 100101 and at the receiving end • error correction Switch
bits turns bits into packets. and flow control ISDN Router
• Handles data frames between the • manages link Intelligent Hub
Network and Physical layers control and NIC
• The receiving end packages raw defines SAPs Advanced Cable
data from the Physical layer into 802.1 OSI Model Tester
data frames for delivery to the 802.2 Logical Link
Network layer Control
• Responsible for error-free Media Access Control
transfer of frames to other • communicates
computer via the Physical Layer with the adapter
• This layer defines the methods card
used to transmit and receive data • controls the type
on the network. It consists of the of media being
wiring, the devices use to used:
connect the NIC to the wiring, 802.3 CSMA/CD
the signaling involved to (Ethernet)
transmit / receive data and the 802.4 Token Bus
ability to detect signaling errors (ARCnet)
on the network media 802.5 Token Ring
802.12 Demand Priority
Physical • Transmits raw bit stream over IEEE 802 Repeater
Hardware; physical cable IEEE 802.2 Multiplier
Raw bit • Defines cables, cards, and ISO 2110 Hubs
stream physical aspects ISDN • Passive
• Defines NIC attachments to • Active
hardware, how cable is attached TDR
to NIC Oscilloscope
• Defines techniques to transfer Amplifier
bit stream to cable

You might also like