0% found this document useful (0 votes)
0 views

Why-OSI-layer

Uploaded by

rameshtharu076
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

Why-OSI-layer

Uploaded by

rameshtharu076
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Why OSI layer??

Problems before OSI model formed:


With the 19980s technology boom came the rise of several giants in the fields of networking
devices and software, including Cisco, Microsoft, Novell, IBM, HP, Apple, and others. Each
vendor had their own cable types and ports and ran their own communication protocols. This
caused major problems if you wanted to buy routers from one company, switches from
another, and serves from another.
Eventually, vendors had to agree on a common standard which works for everyone, and the
free suite of protocols called Transmission Control Protocol/Internet Protocol (TCP/IP) was
ultimately adopted by most. In the end, those vendors who failed to adopt TCP/IP lost market
share and went bust.
OSI REFERENCE MODEL
 OSI was developed by international organization for standardization (ISO) and
introduced around 19980.
 It is a layered architecture (consists of seven layers) which defines and explains how the
communication happens in between two or more networks devices within the
organization or internet.
 Each layer defines a set of function in data communication.
 The ISO created the OSI model the help vendors agree on a set of standards with which
they could all work. This involved dividing network function into a set of logical layers or
layers.
 There are 7 types of OSI model

ByEr. Ramesh Tharu


Application Layer
 Network access to application. E.g. web browser like Mozilla, Firefox, Gorble chrome.
 Exchange the information, send and received.
Presentation Layer
 Type of data: HTTPS-Encryption services.
Session Layer
 Starts and ends session and also keeps them isolated.
 Session layer depends upon time (duration).
 Time related all involved in session layer
Transport Layer
 Defines ports and reliability. Segment
 TCP/UDP Source port Data Destination port
 Depends which protocols
Network Layer
 Logical or IP addressing: determines best path for the destination
Packet

Source IP Segment Destination


Data Link Layer
 Switches (switch/Bridge) Frame
 MAC addressing Source MAC Packet Destination MAC
Physical Layer
 Cable
 Network Interface Cards - electric signals
OSI MNEMONICS
 Please Do Not Trust Sales Person's Answers
 All People Seem To Need Data Processing

What is encapsulation and de-encapsulation in OSI model?


ByEr. Ramesh Tharu
 As data is passed down from the top layers to the bottom for transportation across the
physical network media, the data is placed into different types of logical data boxes.
Although we often call these data boxes "packets" , they have different names
depending upon the OSI layer.
 The process of data moving down the OSI model is referred to to as encapsulation.
 Moving back up and having these boxes stripped of their data is called de-encapsulation.

DATA Application | Presentation | Session

DATA SEGMENT HEADER Transport

DATA PACKET HEADER Network

DATA FRAME HEADER Data Link

BITS Physical

Encapsulation

Application Layer (Layer 7)


 Network process to application
 Application layer is responsible for providing an interface for the users to interact with
application services or networking services.
Or
 Layer 7, supports application and end-user processes. Communication partners are
identified, quality of services is identified, user authentication and privacy are
considered, and any constraints on data syntax are identified. Everything at this layer is
application specific. This layer provides application services for file transfers, e-mail, and
other network software services, Telnet and FTP are application that exists entirely in the
application level. Tiered application architectures are part of this layer.

The application layer protocols are as follows:


1. HTTP (Hypertext Transfer Protocol):- Browses web pages.
2. FTP (File Transfer Protocol):- Reliably sends and retrieves all file types.
ByEr. Ramesh Tharu
3. SMTP (Simple Mail Transfer Protocol):- Sends email
4. POP3 (Post Office Protocol 3):- Retrieves email
5. IMAP (Internet Message Access protocol):- Sends and retrieves email with
additional features/ functionality.
6. NTP (Network Time Protocols):- Synchronizes network devices clocks.
7. SNMP (Simple Network Management Protocol):- Communicates status and
allows control of network devices.
8. TFTP (Trivial File Transfer Protocol):- Simple, lightweight, File transfer.
9. DNS (Domain Naming System):- Translates a website name (easy for people) to
an IP address (easy for computers).
10. DHCP (Dynamic Host Configuration Protocol):- Assigns IP, mask, and DNS server
(plus bunch of other stuff) to hosts.
11. Telnet:- provides a remote terminal connection to manage devices to which you
are not close enough to use console cable.
Presentation Layer (Layer 6)
 Presentation layer is responsible for defining a standard format for the data.
 It deals with data representation.
 Providing freedom from compatibility problems. It is sometime called syntax layer.
 Presentation layer examples includes encryption:- ASCII, EBCDIC, TIFE, GIF, MP3, JPEG,
MPEG, MD4.
 Extended binary coded decimal interchange code (EBCDIC)
 American Standard Code for information Interchange (ASCII)
 The major function described of this layer are:-
Encoding  Decoding
Encryption  Decryption
Compression  Decompression
Session Layer (Layer 5)
 It is responsible for establishing, maintaining and terminating the sessions.
 It deals with sessions or interactions between the applications.
 Session ID is used to identify a session or interaction.
Transport Layer (Layer 4)
 It is responsible for end-to-end transportation of data between the applications.
 The major functions described at the transport layer are:
 Identifying service

ByEr. Ramesh Tharu


 Multiplexing and de-multiplexing
 Segmentation
 Sequencing and reassembling
 Error correction  (if error correction is in the transport layer, but detection is in
the data link layer)
 Flow control (windowing)
Identifying a service:
Services are identified at this layer with the help of port No's. The major protocols which take
core of data transportation layer are… TCP, UDP.
TCP
Synchronize

System A Acknowledgment System B


+Synchronize

Acknowledgment

This process is called 3 way hand shack.


TCP UDP
Transmission Control Protocol User Datagram Protocol
Connection oriented. Connection less.
Reliable communication (with ACK's) Unreliable communication (no ACK's)
Slower data transportation Faster data transportation
Protocol No. is 6 Protocol No. is 17
Examples: HTTP, FTP, SMTP Examples: DNS, DHCP, TFTP

Network Layer (Layer 3)


 Logical addressing and path determination (Routing) are described at this layer.
 The protocols works at this network layer are:
 Routed Protocols:
 Routed protocols acts as data carriers and defines logical addressing.
 IP, IPX , AppleTalk… etc. (IPX by Novell NetWare network operating system)
 Routing Protocols:
 Routing protocols performs path determination (routing)
ByEr. Ramesh Tharu
 RIP, IGRP, EIGRP, OSPF……. ETC.

Protocol
 IP:- IP is the "mother protocol" of TCP/IP, featuring routable 32-bit addressing.
 ICMP:- Internet Connection Management Protocol. Incorporates ping and traceroute,
which are layer 3 link-testing utilities.
 OSPF, EIGRP, RIP, ISIS:- Dynamic routing protocols that learn about remote networks and
the best paths to them from other routes running the same protocols.
 ARP:- Address Resolution Protocol. ARP learns MAC address is associated with a given IP
address. (like in cmd arp -a)
Data-Link Layer (Layer 2)
 It is responsible for end-to-end delivery of data between the devices on a LAN network
segment. Data Link layer comprises of two sub-layers.
1. MAC (Media Access Control)
 It deals with hardware addresses (MAC addresses)
 MAC addresses are 12 digit hex-decimal identifiers used to identify the devices
uniquely on the network segment.
 It also provides ERROR detection using CRC (Cycle Redundancy Check) and framing
(encapsulation) examples: Ethernet, Token ring ………..etc
2. LLC (Logical Link Control
 It deals with layer # (network layer)
 The LLC layer controls frame synchronization, flow control and error checking.
 Devices works at data link layer are switch, bridge, NIC card etc.
Physical Layer (Layer 1)
 It deals with physical transmission of binary data on the given media (copper, fiber,
wireless..etc)
 It also deals with electrical, mechanical and functional specifications of the devices,
media ……. Etc.
 The major functions described at this layer are:
 Encoding/Decoding:- It is process of converting the binary data into signals based
on the type of media.

ByEr. Ramesh Tharu


 Mode of Transmissions of signals:- Signal communication happens in three
different modes- Simplex, Half-Duplex, and Full-Duplex.
Devices works at physical layer are Hub, Modems, Repeaters and Transmission media.

ByEr. Ramesh Tharu

You might also like