OSI Reference Model: An Overview
OSI Reference Model: An Overview
ABSTRACT:
2. LITERATURE SURVEY:
A reference model is a conceptual blueprint of how
communication should take place. It addresses all the OSI is a standard description or a reference model for
process required for effective communication and divides defining how messages should be transmitted between
these processes into logical grouping called layers. When any two points in a telecommunication network.
a communication system is designed in this manner, it is Kayri et al., [12] proposed that, possible troubles on the
known as layered architecture. The OSI isn’t a physical related layer vary and possible troubles on each layer are
model, though. Rather, it’s a set of guidelines that categorized for functional network administration and
application developers used to create and implement they are standardized in an eligible way.
application that run on a network. It also provides a
framework for creating and implementing networking Zimmermann et al., [16] proposed a model for
standards, devices, and internetworking schemes. This architecture for Opens Systems Interconnection developed
paper explains the OSI Reference Model, which by SC16. In it he gave some indications on initial sets of
comprises of seven different layers. Each layer is having protocols which now have been developed in OSI
its own responsibilities. reference model.
Scheidell et al., [17] proposed a theory which seeks to
help the reader understand how the traditional OSI model
1. INTRODUCTION- applies to security, realize that three additional layers
An Open System Interconnection model commonly exert a powerful influence over security programs and
known as an OSI model ratified in 1984, is like an decisions, and leverage tips for navigating OSI Layers 8,
INTERFACE between two parties i.e., one sender and 9 and 10 to become more effective security professionals.
other receiver. The OSI model was basically developed to Aschenbrenner et al., [18] briefly defined what OS1 is,
simplify network complexity, facilitate network training the interrelationships of the various standards bodies, and
and introduce easy network troubleshooting. The OSI the goals and benefits to users, vendors, country post
model is not real network architecture, because it does not telephone and telegraph bodies, common carriers, and
really specify the services and protocols each layer should governments.
use. It rather describes what the layers must do.
Physical
[6]
Physical Layer “The physical layer is responsible for passing bits onto
and receiving them from the connecting medium. This
The functions of physical layer is to convert signals into layer has no understanding of the meaning of the bits, but
bits, that can be used by other layer and adjusting the deals with the electrical and mechanical characteristics of
signal to allow for multiple users to use the same the signals and signalling methods. For example, it
connection. comprises the RTS and CTS signals in an RS-232
environment, as well as TDM and FDM techniques for
Also, it specifies how a device sends and receives multiplexing data on a line. SONET also provides layer 1
information; examples of this include the wires used to capability.”[8]
connect various components of a computer or even the
radio signals used in wireless communication.
Data Link Layer Ring or FDDI frame in local area networks (LANs).
Frame relay and ATM are also at Layer 2. Layers 1 and 2
The main function of this layer is to provide a method by are required for every type of communications. For more
which information from the network is broken down into on this layer, see data link protocol.”[8]
frames and transmitted over the physical layer. This layer
is also responsible for some Error detection and Network Layer
correction.
While the data link layer deals with the method in which
“The data link is responsible for node to node validity and the physical layer is used to transfer data, the network
integrity of the transmission. The transmitted bits are layer deals with organizing that data for transfer and
divided into frames; for example, an Ethernet, Token reassembly.
This is the level that the user often interacts with. This is b. Easy Troubleshooting: Since each layer in an
where data turns into websites, chat programs and so on. OSI is independent of each other so it makes it
Many protocols run at this layer, such as DNS, FTP, easier to detect and solve all errors prevailing in
HTTP, HTTPS, NFS, POP3, SMTP, and SSH. it.
“This layer supports application and end-user processes. c. Easy Understanding Nature: OSI model is very
Communication partners are identified, quality of service interactive and even guides us to know what a
is identified, user authentication and privacy are model is, how it operates, and common
considered, and any constraints on data syntax are methodologies, how new technologies are
identified. Everything at this layer is application-specific. developed in existing networks.
This layer provides application services for file transfers,
e-mail, and other network software services.”[7] d. Security: OSI model have functionality for
Encryption and Decryption which has a major
contribution for security purpose. This makes it new protocols within the process. This implies that
Reliable. we can even use other different architecture in it
other than the existing one.
e. Add multiple network models: The OSI model is
designed in such a way that user can further extend
5. CONCLUSION:
In this paper we have tried to explain what exactly an
OSI reference model is, why it is used and contribution
of various researchers in this reference. OSI is basically
an architecture which only gives us an idea how packets
transfer over the network during any communication.
OSI enhancements are done time to time for developing
new technologies. Scheidell et al., [17] proposed three
different layers in his paper for improvising security in
any network. Future implementation in OSI will lead to
enhancement in security and many other fields.
REFRENCES-
1- Margaret Rouse, “OSI (Open Systems Interconnection)”,
in http://searchnetworking.techtarget.com/definition/OSI.
2- Webopedia
(http://www.webopedia.com/quick_ref/OSI_Layers.asp )
3- Regan (http://www.antiessays.com/free-
essays/96912.html) in 2004.
4- http://computer.howstuffworks.com/osi.htm
5- http://whatis.techtarget.com/reference/OSI-Reference-
Model-illustrated
6- http://media.techtarget.com/digitalguide/images/Misc/osi.g
if
7- http://www.escotal.com/osilayer.html
8- http://encyclopedia2.thefreedictionary.com/Seven-
layer+OSI+model
9- Wikipedia(http://en.wikipedia.org/wiki/OSI_model )
10- http://www.omnisecu.com/tcpip/osi-model.php
11- Bradley
Michell(http://compnetworking.about.com/cs/designosimo
del/a/osimodel.htm)
12- Murat Kayri1 and Ismail Kayri, “International Journal of
Next-Generation Networks (IJNGN) Vol.2, No.3,
September 2010”.
13- “OSI” http://www.webopedia.com/TERM/O/OSI.html (15
Mar. 2002).
14- Hubert Zimmermann, “OSI Reference Model- The ISO
Model of Architecture for Open System Interconnection”
IEEE transaction on communications, vol.28, issue 4,
April 1980.
15- Mizanian, K, Vasef, M. and Analoui, M. (2010)
“Bandwidth modeling and estimation in peer to peer
networks”, International Journal of Computer Networks &
Communications (IJCNC), Vol. 2, No. 3, pp. 65-83.
16- Hubert Zimmermann, “OSI Reference model-An ISO
model Architecture for OSI”, in IEEE transaction on
Communications, Vol. Com-28, No.4, April 1980.
17- Michael Scheidell, “Three Undocumented Layers of the
OSI Model and Their Impact on Security”, SECNAP
Network Security Corporation.
18- J.R. Aschenbrenner. “Open Systems Interconnections”,
IBM SYSTEMS KIURNAL, VOL 25. NOS 3/4, 1986.