0% found this document useful (0 votes)
34 views8 pages

The OSI Layers

The document provides an overview of the OSI Model, which consists of seven layers that manage data transmission in networking. Each layer serves a specific function, from the Application Layer that supports user applications to the Physical Layer that handles the transmission of raw bits. The document details the responsibilities and protocols associated with each layer, highlighting their roles in ensuring effective communication over networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views8 pages

The OSI Layers

The document provides an overview of the OSI Model, which consists of seven layers that manage data transmission in networking. Each layer serves a specific function, from the Application Layer that supports user applications to the Physical Layer that handles the transmission of raw bits. The document details the responsibilities and protocols associated with each layer, highlighting their roles in ensuring effective communication over networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Lecture 7 Part 2 INFOT 3 -Networking 1

The OSI Model

- or Open System Interconnect is responsible in breaking down the incoming data into seven
manageable layers
- standardized by the IEEE or Institute of Electrical and Electronics Engineers
- the upper layers of the OSI represent software that implements network services like
encryption and network management while the lower layer implements more primitive
hardware-oriental like routing, addressing and flow control.

The Seven Layers of the OSI

1. Application Layer
- This layer supports application or softwares and closest to the end user.
- Communication partners are identified, quality of service is identified, user authentication
and privacy are considered, and any constraints on data syntax are identified.
- This layer provides application services for file transfers, e-mail, and other network
software services.
- Telnet and FTP are applications that exist entirely in the application level.

Other Protocols used:


SNMP – Simple Network Management Protocol
SMTP – Simple Mail Transfer Protocol
FTP – File Transfer Protocol
TELNET – Telephone Network
HTTP – Hyper Text Transfer Protocol

Example of Programs Supported in the Application Layer


- E-mail Programs
- Search Engines
- Newsgroup
- Transaction Services

2. Presentation Layer
- Serve as data translator for the network.
- Responsible for the delivery and formatting information for further processing or
display.
- filter and represents applications, codes, graphics and file formats to a the state that the
end user understand.
- also called as the syntax layer

Performs the following:


1. Character Code Translation: Example from EBCDIC to ASCII
2. Encryption – encrypt data for security and privacy process.
3. Data Conversion – bit order, integer-floating point and so on.
4. Data Compression – reduces the number of bits needed to be transmitted on
the network.

Protocols Used:
EBCDIC – Extended Binary Coded Decimal Interchange Code
ASCII - American Standard Code for Information Interchange
LPP - Lightweight Presentation Protocol
NDR - Network Data Representation

Lecturer: Kenrick Agustin S. Secugal


Lecture 7 Part 2 INFOT 3 -Networking 1

3. The Session Layer


- Establishes, manages, and terminates connections between applications.
- Sets up, coordinates and terminates conversations, exchanges dialogues between the
applications at each end.
- Deals with session and connection coordination.

Performs the following:


1. Authentication – is the act of confirming the truth of an attribute of a datum or
entity. This might involve confirming identity of a person, tracing the origins of an artifact,
ensuring data packaging and labeling claims to be, or assuring that a computer is a trusted
one.
2. Permissions - access rights to specific user and groups of users. These systems
control the ability of the users affected to view or make changes to the contents of the
systems.
3. Session Restoration (Checkpointing and Recovery) – is technique for inserting fault
tolerance into computing systems. It basically consists of storing a snapshot of the current
application state, and later on, use it for restarting the execution in case of failure.
4. Lip Sync - (short for lip synchronization) is a technical for matching lip movements
with sung or spoken vocals. The term can refer to any of a number different techniques and
processes, in the context performances and recordings.
5. Token Management – manages token passing in the network.
Token – is a data message that is passed in a network
Acknowledgement – appears when a token have been received by the receiver
and is known as the reply message.

Example of Programs Supported in the Session Layer


- Web Conferencing
- Video Chatting
- Music and Video Streaming
- Downloading, File Copying/Transferring, etc.

Protocols Used:
- SMPP – Short Message Peer to Peer
- ADSP - AppleTalk Data Stream Protocol
- NetBIOS – Network Basic Input Output System
- ZIP – Zone Information Protocol
- PAP – Password Authentication Protocol
- SCP – Session Control Protocol
- iSNS – Internet Storage Name Service
- PPTP – Point-to-Point Tunneling Protocol

4. The Transport Layer


- This layer provides transfer of data between end systems, or hosts, and is responsible
for end-to-end error recovery and flow control.
- Ensures complete data transfer
- Converts data received from the upper layers into segments and prepares them for
transport.
- Sequences data packets, and request retransmission of missing packets.
- Repackages messages for more efficient transmission over the network.

Transport Layer as:


Connection-oriented – Means that a connection (virtual link) must be established
before any actual data can be exchanged. This guarantees that data will arrive, and in the same
time order as it was sent. It guarantees delivery by sending acknowledgements back to the
source when messages are received. TCP is an example.

Lecturer: Kenrick Agustin S. Secugal


Lecture 7 Part 2 INFOT 3 -Networking 1

A common example is a telephone call. You call, the ‘destination’ picks up the phone
and acknowledges, and you start talking (sending data). When a message or piece of it doesn’t
arrive, you say: ‘What!?’ and the sender will repeat what he said (retransmit data).
Connectionless – Is the opposite of the connection-oriented; the sender does not
establish a connection before it sends data, it just sends it without guaranteeing delivery. UDP is
an example.

Transport layer provides functions for:


- Message Segmentation – accepts message from the (session) layer above it, splits the
message into smaller units (if not already small enough), and passes smaller units down
to the network layer.
- Message Acknowledgement – provides reliable end-to-end message delivery with
acknowledgement.
- Message Traffic Control – tells transmitting to “back-off” when no message buffers are
available.
- Session Multiplexing – multiplexes several message streams, or sessions onto one
logical link and keeps track of which messages belongs to which session.
- Fault Detection and Error Recovery – displays error and maintain connection between
different networks. Prevents data lost and establishes error free data transportation.

Example of Transport Layer Usage:


Web Browsing
Web Surfing
Internet Researching

Protocols Used:
TCP – Transmission Control Protocol
UDP – User Datagram Protocol
NetBEUI – Network BIOS Extended User Interface
NWLink – Network Wireless Link

5. The Network Layer


- Provides switching and routing technologies, creating logical paths known as
virtual circuits for transmitting data from node to node.
- Routing and forwarding are functions of this layer, as well as addressing,
internetworking, error handling, congestion control and packet sequencing.
- Establishes, maintains and terminates network connections.
- Translates logical addresses and names into physical address.

Network Layer Performs the following:


- Logical Addressing: Every device that communicates over a network has associated with
a logical address, sometimes called a layer three address.
- Routing: Moving data across a series of interconnected networks is probably the
defining function of the network layer.
- Datagram Encapsulation: The network layer normally encapsulates messages received
from higher layers by placing them into datagrams (also called packets) with a network
layer header.
- Fragmentation and Reassembly: The network layer must send messages down to the
data link layer for transmission. Fragments data into series of bits and sequentially
arrange them.
- Error Handling and Diagnostics: Special protocols are used at the network layer to allow
devices that are logically connected, or that are trying to route traffic, to exchange
information about the status of hosts on the network or the devices themselves.
- Connection Model: Example, IP is connectionless, in that a frame can travel (packets)
from a sender to a recipient without the recipient having a to send a acknowledgement.

Lecturer: Kenrick Agustin S. Secugal


Lecture 7 Part 2 INFOT 3 -Networking 1

- Host Addressing: Every host in the network need to have a unique address which
determines where it is. On the internet, addresses are known as Internet Protocol (IP)
addresses.
- Message Forwarding: Since many networks are partitioned into sub networks, and
connected to other networks for wide-area communications, networks use specialized
hosts, called gateways or routers to forward packets between networks. This is also
more alike with mobile applications, where a user may move from one location to
another, and it must be arranged that his messages follows him.

Applications of Network layer:


- Path Finder (keeps track hops)
- Port Opener (Opens Shortest Path)
- Addressing (Example: Go to IP “192.168.30.40”)

Devices:
- Routers
- Layer 3 (or IP switches)

Protocols Used:
- IP – Internet Protocol
- IPX - Internetwork Packet Exchange
- RIP - Routing Information Protocol
- DDP - Datagram Delivery Protocol
- ICMP - Internet Control Message Protocol

6. The Data Link Layer


- At this layer, the data packets are encoded and decoded into bits.
- Furnishes transmission protocol knowledge and management and handles
errors in the Physical Layer. Flow control and frame synchronization are also its function.

2 Sub-layers:
- MAC (Media Access Control) – controls how a computer on the network gains access to
the data and permission to transmit it.
- LLC (Logical Link Control) – controls frame synchronization, flow control and error
checking.

Sub Function of the Data Link Layer:


- Segmentation – packets are framed in sizes that can be handle by the communication
hardware
- Bit Ordering - The data link layer organizes the pattern of data bits into frames before
transmission. The frame formatting issues such as stop and start bits, bit order, parity
and other functions are handled here.
- Error detection - Determines whether a frame has been delivered accurately. A
checksum is calculated on a frame by the sender, and the receiver must perform the
same calculation and come up with the same checksum. If not, the frame is considered
corrupted. If reliable services are being used, the frame is retransmitted. For nonreliable
services, the frame is dropped and upper-layer protocols are relied on to handle the
problem.
- Flow control - A technique that prevents the sender from sending more, overflowing
the receiver with more data than it can handle.
- Framing - Data is broken up into frames that are transmitted as independent units. If
errors are detected in a frame, it is only necessary to retransmit that frame.

Lecturer: Kenrick Agustin S. Secugal


Lecture 7 Part 2 INFOT 3 -Networking 1

Devices Used:
- Bridges
- Switches
- Intelligent Hubs
- Ethernet incorporates both this layer and the Physical Layer

Protocol Used by the Data Link Layer:


- SDLC (Synchronous Data Link Control)
- HDLC (High-level Data Link Control)
- SLIP (Serial Line Interface Protocol)
- PPP (Point-to-Point Protocol)

7. The Physical Layer


- This layer conveys bit-stream, electrical impulses light or radio signal through the
network at electrical and mechanical level.
- Provides hardware means or sending and receiving data on a carrier including defining
cables, cards, and physical aspects.
- Defines cabling connections, transmits data over physical media.

Sub functions of the Physical Layer:


- Encoding and Signaling – correct encode of data for the hardware to accepts and
decode data to be ready for signaling.
- Hardware Specifications – standards hardware specification for the network to be used.
- Data Transmission and Reception – Physical layer as sender and receiver part of the
network

PHY Signaling Sub layers:


In a local area network (LAN) or a metropolitan area network (MAN) using open systems
interconnection (OSI) architecture, the physical signaling sublayer is the portion of the Physical
Layer that:
- interfaces with the Data Link Layer's medium access control (MAC) sublayer.
- performs character encoding, transmission, reception and decoding.
- performs mandatory isolation functions.

Lecturer: Kenrick Agustin S. Secugal


Lecture 7 Part 2 INFOT 3 -Networking 1

Example Uses:
- Wi-Fi: The PHY portion consists of the RF, mixed-signal and analog portions, that are
often called transceivers, and the digital baseband portion that place high demand on
the digital signal processing (DSP) and communication algorithm processing, including
channel codes. It is common that these PHY portions are integrated with the media
access control (MAC) layer in System-on-a-chip (SOC) implementations. Other similar
wireless applications are 3G/4G/LTE, WiMAX, UWB etc.
- Ethernet: A PHY chip (PHYceiver) is commonly found on Ethernet devices. Its purpose is
physical, analog signal access to the link. It is usually used in conjunction with an Media
Independent Interface (MII) chip or interfaced to a microcontroller that takes care of the
higher layer functions.
- Universal Serial Bus (USB): A PHY chip is integrated into most USB controllers in hosts or
embedded systems and provides the bridge between the digital and modulated parts of
the interface.
- IrDA: The Infrared Data Associations IrDA specification includes an IrPHY specification
for the physical layer of the data transport.
- Serial ATA (SATA): Serial ATA controllers like the VIA Technologies VT6421 use a PHY.
- SDRAM chip interfaces
- Flash memory chip interfaces
- Cables
- LAN Cards (NIC’s)

Example of how the OSI Layers work using an e-mail sent from the computer on the left.

- Data travels from the sending computer down through all the layers to the physical
layer where the data is put onto the network cabling, and then sent to the physical layer
of the receiving computer where the process reverses and the data travels up through
the layers to the application layer of the receiving computer.

Lecturer: Kenrick Agustin S. Secugal


E-mail sent from John: E-mail received from
John:
Meet me at Carl's 1:30
Meet me at Carl's 1:30
John
John

Identify sender and Identified sender and


intended receiver; is there intended receiver; found e-
an e-mail application APPLICATION mail application.
available?
layer 7

Encode data with X Decoded data with X


coding key; use ASCII decoding key; used ASCII
characters. PRESENTATION characters.

layer 6

Initiate and terminate the Initiated and terminated


session according to X the session according to X
protocol. SESSION protocol.

layer 5

Make sure all data is sent Make sure all data has
intact. arrived intact.
TRANSPORT

layer 4

Keep track of how many Keep track of how many


hops; hops;
NETWORK
open shortest path First; opened the shortest path
layer 3 First;
Go to IP address
255.65.0.123 Went to IP address
255.65.0.123

Is the initial connection set The initial connection set


up? Put data into frames up. Decoded data in frame

Lecturer: Kenrick Agustin S. Secugal


according to X standard. DATA LINK according to X standard.

layer 2

Send as electrical signal Receive electrical signal


over the network cable at over the network cable at
X voltage, and X Mbps. PHYSICAL X voltage, and X Mbps.

layer 1

-
- A look at each of the OSI layers , and the role it plays.

Lecturer: Kenrick Agustin S. Secugal

You might also like