0% found this document useful (0 votes)
10 views

OSI Reference Model: An Overview

Uploaded by

Mojtaba Mazangi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

OSI Reference Model: An Overview

Uploaded by

Mojtaba Mazangi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

International Journal of Computer Trends and Technology (IJCTT) – volume 7 number 4– Jan 2014

OSI Reference Model: An Overview


Gaurav Bora 1, Saurabh Bora2, Shivendra Singh3, Sheikh Mohamad Arsalan4
(1Department of Electronics, Uttarakhand Technical University, Dehradun, INDIA)
2
( Department Of Computer Science, Uttarakhand Technical University, Dehradun, INDIA)
(3Department Of Computer Science, Uttarakhand Technical University, Dehradun, INDIA)
(4Department Of Computer Science, Uttarakhand Technical University, Dehradun, INDIA)

ABSTRACT:
2. LITERATURE SURVEY:
A reference model is a conceptual blueprint of how
communication should take place. It addresses all the OSI is a standard description or a reference model for
process required for effective communication and divides defining how messages should be transmitted between
these processes into logical grouping called layers. When any two points in a telecommunication network.
a communication system is designed in this manner, it is Kayri et al., [12] proposed that, possible troubles on the
known as layered architecture. The OSI isn’t a physical related layer vary and possible troubles on each layer are
model, though. Rather, it’s a set of guidelines that categorized for functional network administration and
application developers used to create and implement they are standardized in an eligible way.
application that run on a network. It also provides a
framework for creating and implementing networking Zimmermann et al., [16] proposed a model for
standards, devices, and internetworking schemes. This architecture for Opens Systems Interconnection developed
paper explains the OSI Reference Model, which by SC16. In it he gave some indications on initial sets of
comprises of seven different layers. Each layer is having protocols which now have been developed in OSI
its own responsibilities. reference model.
Scheidell et al., [17] proposed a theory which seeks to
help the reader understand how the traditional OSI model
1. INTRODUCTION- applies to security, realize that three additional layers
An Open System Interconnection model commonly exert a powerful influence over security programs and
known as an OSI model ratified in 1984, is like an decisions, and leverage tips for navigating OSI Layers 8,
INTERFACE between two parties i.e., one sender and 9 and 10 to become more effective security professionals.
other receiver. The OSI model was basically developed to Aschenbrenner et al., [18] briefly defined what OS1 is,
simplify network complexity, facilitate network training the interrelationships of the various standards bodies, and
and introduce easy network troubleshooting. The OSI the goals and benefits to users, vendors, country post
model is not real network architecture, because it does not telephone and telegraph bodies, common carriers, and
really specify the services and protocols each layer should governments.
use. It rather describes what the layers must do.

“Short for Open System Interconnection, an ISO standard


for worldwide communications that defines a networking 3. Ever Wondered How a message travels
framework for implementing protocols in seven from a device to another??
layers.”[13] Well, the answer is an OSI model itself. An Open
Systems Interconnection (OSI) reference model is the
“The OSI, or Open System Interconnection, model world’s major used networking architecture model.
defines a networking framework to implement protocols
in seven layers. This article explains the 7 Layers of the “The OSI reference model adopts a layered approach
OSI Model. where a communication subsystem is broken down into
The OSI, or Open System Interconnection, model defines seven layers, each one of which performs a well-defined
a networking framework to implement protocols in seven function.”[3]
layers. Control is passed from one layer to the next,
starting at the application layer in one station, and It serves as a model in which then actual services and
proceeding to the bottom layer, over the channel to the protocol can be drafted. An OSI model is a combination
next station and back up the hierarchy.”[2] of 7 different layers, each having a specific role.

ISSN: 2231-2803 ht t p:/ / w ww .ijctt journal.org Page214


International Journal of Computer Trends and Technology (IJCTT) – volume 7 number 4– Jan 2014

The layers are as followed:


WORKING OF THE 7 LAYERS OF OSI
1. Application layer,
MODEL:
2. Presentation layer,
3. Session layer, OSI divides telecommunication into seven layers. The
4. Transport layer, layers are in two groups. The upper four layers are used
5. Network layer, whenever a message passes from or to a user. The lower
6. Data link layer and, three layers (up to the network layer) are used when any
7. Physical layer. message passes through the host computer. Messages
intended for this computer pass to the upper layers.
Messages destined for some other host are not passed up
to the upper layers but are forwarded to another host.
The upper layers
“Virtually all networks in use today are based in some
fashion on the Open Systems Interconnection (OSI)
Application standard. OSI was developed in 1984 by the International
Organization for Standardization (ISO), a global
federation of national standards organizations
Presentation representing approximately 130 countries.
The core of this standard is the OSI Reference Model, a
set of seven layers that define the different stages that data
Session must go through to travel from one device to another over
a network.” [4]
The Lower layers
“OSI divides telecommunication into seven layers. The
layers are in two groups. The upper four layers are used
Transport whenever a message passes from or to a user. The lower
three layers are used when any message passes through
the host computer. Messages intended for this computer
Netw ork pass to the upper layers. Messages destined for some
other host are not passed up to the upper layers but are
forwarded to another host.” [5]
Data Link

Physical

ISSN: 2231-2803 ht t p:/ / w ww .ijctt journal.org Page215


International Journal of Computer Trends and Technology (IJCTT) – volume 7 number 4– Jan 2014

[6]

An OSI reference model

“This layer conveys the bit stream - electrical impulse,


4. DESCRIPTION OF THE SEVEN light or radio signal -- through the network at the
electrical and mechanical level. It provides the hardware
LAYERS: means of sending and receiving data on a carrier,
including defining cables, cards and physical aspects.”[7]

 Physical Layer “The physical layer is responsible for passing bits onto
and receiving them from the connecting medium. This
The functions of physical layer is to convert signals into layer has no understanding of the meaning of the bits, but
bits, that can be used by other layer and adjusting the deals with the electrical and mechanical characteristics of
signal to allow for multiple users to use the same the signals and signalling methods. For example, it
connection. comprises the RTS and CTS signals in an RS-232
environment, as well as TDM and FDM techniques for
Also, it specifies how a device sends and receives multiplexing data on a line. SONET also provides layer 1
information; examples of this include the wires used to capability.”[8]
connect various components of a computer or even the
radio signals used in wireless communication.
 Data Link Layer Ring or FDDI frame in local area networks (LANs).
Frame relay and ATM are also at Layer 2. Layers 1 and 2
The main function of this layer is to provide a method by are required for every type of communications. For more
which information from the network is broken down into on this layer, see data link protocol.”[8]
frames and transmitted over the physical layer. This layer
is also responsible for some Error detection and  Network Layer
correction.
While the data link layer deals with the method in which
“The data link is responsible for node to node validity and the physical layer is used to transfer data, the network
integrity of the transmission. The transmitted bits are layer deals with organizing that data for transfer and
divided into frames; for example, an Ethernet, Token reassembly.

ISSN: 2231-2803 ht t p:/ / w ww .ijctt journal.org Page216


International Journal of Computer Trends and Technology (IJCTT) – volume 7 number 4– Jan 2014

In short, the main function of this layer is Path  Transport Layer


determination and logical Addressing. This layer provides
logical addresses to the packets received which in turn This layer is mainly concerned with Reliability (security
helps them to find their path. like encryption/decryption, firewall etc.), maintenance of
flow of packets by reducing CONGESTION* and
“The network layer provides the functional and performs error checking ensuring quality of service by
procedural means of transferring variable resending data when data has been corrupted.
length data sequences (called datagrams) from one node
*Congestion-When a Network receives more packets
to another connected to the same network. A network is a
than its capacity (Traffic in excess of network capacity).
medium to which many nodes can be connected, on which
every node has an address and which permits nodes “This layer provides transparent transfer of data between
connected to it to transfer messages to other nodes end systems, or hosts, and is responsible for end-to-end
connected to it by merely providing the content of a error recovery and flow control. It ensures complete data
message and the address of the destination node and transfer.”[7]
letting the network find the way to deliver ("route") the
message to the destination node. In addition to  Session Layer
message routing, the network may (or may not)
implement message delivery by splitting the message into This layer creates a session like environment between the
several fragments, delivering each fragment by a separate two parties (sender/receiver) and programs to create and
route and reassembling the fragments, report delivery control conversation.
errors, etc.”[9]
A conversation consists of many REQUEST/RESPONSE.

The session layer is responsible for establishing, If we say about the disadvantages in an OSI model so we
managing, and terminating connections between can say that there are no real disadvantages to the OSI
applications at each end of the communication.”[10] model, since it is a reference model to how data is
represented. It has many advantages, such as helping to
 Presentation Layer determine networking issues. Perhaps the only drawback
would be that it does not reference any type of
This layer works by taking care of the directions given by implementation, such as the TCP/IP model.
the user at the application layer. It is where the human
readable programming languages are translated into Benefits of the OSI Model:
machine code instructions used by the lower layers.
“By separating the network communications into logical
In general the main work of Presentation is Data smaller pieces, the OSI model simplifies how network
representation, security encryption, and converts protocols are designed. The OSI model was designed to
computer code to network formatted code. ensure different types of equipment (such as network
adapters, hubs, and routers) would all be compatible even
“This layer (i.e. presentation layer) provides if built by different manufacturers.”[11]
independence from data representation (e.g., encryption)
by translating between application and network formats. The OSI model has many benefits which include:
The presentation layer transforms data into the form that
the application accepts. This layer formats and encrypts a. Compatibility: The OSI model can fit to any
data to be sent across a network. It is sometimes called the compatible software/hardware from different
syntax layer.”[9] users in other parts of the world. As
software/hardware differs among various users
 Application Layer so OSI is a model that is compatible to all.

This is the level that the user often interacts with. This is b. Easy Troubleshooting: Since each layer in an
where data turns into websites, chat programs and so on. OSI is independent of each other so it makes it
Many protocols run at this layer, such as DNS, FTP, easier to detect and solve all errors prevailing in
HTTP, HTTPS, NFS, POP3, SMTP, and SSH. it.

“This layer supports application and end-user processes. c. Easy Understanding Nature: OSI model is very
Communication partners are identified, quality of service interactive and even guides us to know what a
is identified, user authentication and privacy are model is, how it operates, and common
considered, and any constraints on data syntax are methodologies, how new technologies are
identified. Everything at this layer is application-specific. developed in existing networks.
This layer provides application services for file transfers,
e-mail, and other network software services.”[7] d. Security: OSI model have functionality for
Encryption and Decryption which has a major

ISSN: 2231-2803 ht t p:/ / w ww .ijctt journal.org Page217


International Journal of Computer Trends and Technology (IJCTT) – volume 7 number 4– Jan 2014

contribution for security purpose. This makes it new protocols within the process. This implies that
Reliable. we can even use other different architecture in it
other than the existing one.
e. Add multiple network models: The OSI model is
designed in such a way that user can further extend

5. CONCLUSION:
In this paper we have tried to explain what exactly an
OSI reference model is, why it is used and contribution
of various researchers in this reference. OSI is basically
an architecture which only gives us an idea how packets
transfer over the network during any communication.
OSI enhancements are done time to time for developing
new technologies. Scheidell et al., [17] proposed three
different layers in his paper for improvising security in
any network. Future implementation in OSI will lead to
enhancement in security and many other fields.

REFRENCES-
1- Margaret Rouse, “OSI (Open Systems Interconnection)”,
in http://searchnetworking.techtarget.com/definition/OSI.
2- Webopedia
(http://www.webopedia.com/quick_ref/OSI_Layers.asp )
3- Regan (http://www.antiessays.com/free-
essays/96912.html) in 2004.
4- http://computer.howstuffworks.com/osi.htm
5- http://whatis.techtarget.com/reference/OSI-Reference-
Model-illustrated
6- http://media.techtarget.com/digitalguide/images/Misc/osi.g
if
7- http://www.escotal.com/osilayer.html
8- http://encyclopedia2.thefreedictionary.com/Seven-
layer+OSI+model
9- Wikipedia(http://en.wikipedia.org/wiki/OSI_model )
10- http://www.omnisecu.com/tcpip/osi-model.php
11- Bradley
Michell(http://compnetworking.about.com/cs/designosimo
del/a/osimodel.htm)
12- Murat Kayri1 and Ismail Kayri, “International Journal of
Next-Generation Networks (IJNGN) Vol.2, No.3,
September 2010”.
13- “OSI” http://www.webopedia.com/TERM/O/OSI.html (15
Mar. 2002).
14- Hubert Zimmermann, “OSI Reference Model- The ISO
Model of Architecture for Open System Interconnection”
IEEE transaction on communications, vol.28, issue 4,
April 1980.
15- Mizanian, K, Vasef, M. and Analoui, M. (2010)
“Bandwidth modeling and estimation in peer to peer
networks”, International Journal of Computer Networks &
Communications (IJCNC), Vol. 2, No. 3, pp. 65-83.
16- Hubert Zimmermann, “OSI Reference model-An ISO
model Architecture for OSI”, in IEEE transaction on
Communications, Vol. Com-28, No.4, April 1980.
17- Michael Scheidell, “Three Undocumented Layers of the
OSI Model and Their Impact on Security”, SECNAP
Network Security Corporation.
18- J.R. Aschenbrenner. “Open Systems Interconnections”,
IBM SYSTEMS KIURNAL, VOL 25. NOS 3/4, 1986.

ISSN: 2231-2803 ht t p:/ / w ww .ijctt journal.org Page218

You might also like