Seminar Report OSI
Seminar Report OSI
A
Seminar Report
Submitted in the partial fulfilment of the requirement for the award
of the degree of
Bachelor of Technology
In
“ELECTRONICS AND COMMUNICATION ENGINEERING”
By
KARTIKEYA SHARMA
(Roll NO. - 2021041143)
Submitted in
DEPARTMENT OF ELECTRONICS AND COMMUNICATION
ENGINEERING
MADAN MOHAN MALAVIYA UNIVERSITY OF TECHNOLOGY
GORAKHPUR(U.P.), INDIA
1
TABLE OF CONTENT
1. INTRODUCTION............................................................................3
2. SEVEN LAYERS OF OSI...............................................................4
2.1 APPLICATION
LAYER………………………………………………...4
2.2 PRESENTATION LAYER……………………………………………...4
2.3 SESSION
LAYER……………………………………………………….5
2.4 TRANSPORT LAYER…………………………………….
………….....6
2.5 NETWORK LAYER…………………………………………………….6
2.6 DATA LINK LAYER……………………………………………………
7
2.7 PHYSICAL
LAYER……………………………………………………..7
3. WORKING.......................................................................................8
4. PRACTICAL APPLICATIONS. ………………………………...10
5. GENERAL ISSUES.......................................................................11
7. REFERENCE.................................................................................13
2
1.INTRODUCTION
The OSI (Open Systems Interconnection) Reference Model serves several key
functions in the field of networking:
Standardization: One of the primary functions of the OSI model is to provide a
standardized framework for understanding and implementing network protocols.
By defining seven distinct layers and specifying the functions and interactions of
each layer, the OSI model enables consistency and interoperability across different
networking technologies and devices.
Layered Architecture: The OSI model organizes network communication into
layers, with each layer responsible for specific functions. This layered architecture
facilitates modular design, development, and troubleshooting of network protocols
and systems. It also allows for easier integration of new technologies and upgrades
without disrupting the entire network.
Abstraction: Another function of the OSI model is to abstract the complexities of
network communication. Each layer operates independently of the others,
providing a clear separation of concerns. This abstraction simplifies the design
process and makes it easier to understand and manage complex networking
systems.
standardized interfaces between adjacent layers. This allows networking equipment
and software from different vendors to work together seamlessly, as long as they
adhere to the same standards and protocols specified by the OSI model.
Troubleshooting and Diagnosis: The layered structure of the OSI model
facilitates troubleshooting and diagnosis of network issues. By isolating problems
to specific layers, network administrators can pinpoint the source of errors more
quickly and efficiently, leading to faster resolution of issues.
As for its invention, the OSI model was developed in the late 1970s by the
International Organization for Standardization (ISO) in response to the growing
need for a standardized approach to networking. It was created to address the
challenges of connecting diverse computer systems and networks, which were
becoming increasingly prevalent at the time. The OSI model was officially
published in 1984 as ISO 7498 and quickly became the de facto standard for
3
networking protocols and systems. While it has been largely superseded by the
TCP/IP model in practice, the OSI model remains an important conceptual
framework for understanding network architecture and protocols.
The OSI reference model divides the problem of moving information between
computers over a network medium into SEVEN smaller and more manageable
problems.
6
The data link layer provides access to the networking media and physical
transmission across the media and this enables the data to locate its intended
destination on a network.
• The data link layer provides reliable transit of data across a physical link by
using the Media Access Control (MAC) addresses.
• The data link layer uses the MAC address to define a hardware or data link
address in order for multiple stations to share the same medium and still
uniquely identify each other.
• Concerned with network topology, network access, error notification,
ordered delivery of frames, and flow control.
Services provided by Data Link Layer:
• Framing (Groups of 0’s and 1’s are known as frames)
• Physical Addressing
• Flow Control
• Error Control (Trailer part)
7
• Physical Topology (Two processes at the same time)
3.WORKING
OSI Reference model working is as follows:
• Data is taken in D7 and H7 header is added by application layer.
• In D6 data is encrypted, translated and then sent to session layer D5 in which
some session layer performances are added and header H5 is added.
• In D4 Transport layer adds Port addresses in the data(H4).
• In D3 Network Layer source/destination IP address are added in the
data(H3).
• In D2 Data Link Layer Source/Destination MAC address are added(H2) and
trailer(T2) which control error.
After this the data is converted to Binary in Physical Layer and sent through
Transmission medium to receiver.
Let's delve into a thorough explanation of step-by-step communication in different
layers of the OSI model using the example of sending an email from one computer
to another:
Application Layer (Layer 7):
The communication process starts at the Application layer. Let's say User Alice
wants to send an email to User Bob using her email client, such as Outlook or
Gmail.
Alice begins by composing an email in her email client. She enters Bob's email
address, subject, and message content. When she clicks "Send," the email client
initiates the sending process.
Presentation Layer (Layer 6):
The Presentation layer is responsible for data translation, encryption, and
compression.
Before the email is transmitted, the Presentation layer in Alice's email client
formats the email message into a standard format that can be understood by
8
different email clients. This may involve converting text, images, and attachments
into a standardized format like MIME (Multipurpose Internet Mail Extensions).
If encryption is enabled, the Presentation layer encrypts the email content to ensure
the confidentiality of the message during transmission.
Session Layer (Layer 5):
The Session layer establishes, manages, and terminates communication sessions
between applications.
Alice's email client establishes a session with her email server. This session
management involves processes like authentication and authorization to ensure that
Alice has permission to send emails from her account.
Once the session is established, the email client proceeds to send the email
message.
Transport Layer (Layer 4):
At the Transport layer, data is segmented into smaller units for transmission and
ensures reliable end-to-end communication.
Alice's email client uses the SMTP (Simple Mail Transfer Protocol) to segment the
email message into smaller packets called segments or datagrams.
It adds necessary information like source and destination port numbers to the
segments for proper routing.
Network Layer (Layer 3):
The Network layer manages the routing of data packets between different
networks.
Alice's email client adds the IP (Internet Protocol) address of Bob's email server as
the destination address to the packets.
It determines the optimal path for the packets to reach Bob's email server based on
routing tables and network topology.
Data Link Layer (Layer 2):
The Data Link layer deals with node-to-node communication and handles error
detection and correction.
9
Alice's computer sends the packets to her local router or switch, which adds MAC
(Media Access Control) addresses to the packets for local network transmission.
The router or switch ensures reliable transmission of packets within the local
network.
Physical Layer (Layer 1):
Finally, the Physical layer deals with the physical transmission of data over the
network medium.
Alice's computer transmits the packets containing the email message through
physical mediums such as Ethernet cables or wireless signals.
The packets travel through various network devices (routers, switches, etc.) until
they reach Bob's email server.
Upon reaching Bob's email server, the process is reversed. Each layer of the OSI
model performs its respective functions to deliver the email message to Bob's
email inbox, ensuring reliable and secure communication between Alice and Bob.
4.PRACTICAL APPLICATIONS
10
4. Security Implementation: Security mechanisms such as firewalls, intrusion
detection systems (IDS), and encryption technologies can be implemented at
various layers of the OSI model to protect networks and data.
5. Training and Education: The OSI model serves as a fundamental concept
in networking education and training programs. It provides a structured
framework for teaching networking principles, protocols, and technologies,
helping students grasp complex networking concepts more effectively.
6.
5.GENERAL ISSUES
11
6.CONCLUSION
12
7.REFERENCE
13