OSI Model
OSI Model
Overview
When networks first came into being, computers could typically communicate only with computers from the same manufacturer. For example, companies ran either a complete DECnet solution or an IBM solutionnot both together. In the late 1970s, the Open Systems Interconnection (OSI) reference model was created by the International Organization for Standardization (ISO) to break this barrier. The OSI model was meant to help vendors create interoperable network devices and software in the form of protocols so that different vendor networks could work with each other.
Aman G. (2007) 2
The OSI model describes how data and network information are communicated from an application on one computer, through the network media, to an application on another computer. The OSI reference model breaks this approach into layers. Layers Departments If programmers are developing a protocol for a certain layer, all they need to concern themselves with is the specific layers functions, not those of any other layer.
Aman G. (2007) 3
2. 3. 4.
divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting. allows multiple-vendor development through standardization of network components. allows various types of network hardware and software to communicate. prevents changes in one layer from affecting other layers, so it does not hamper development.
Aman G. (2007) 4
Aman G. (2007)
The OSI has seven different layers, divided into two groups.
The top three layers define how the applications within the end stations will communicate with each other and with users. The bottom four layers define how data is transmitted end-to-end.
The OSI reference model remains today the most popular means of comparison for protocol suites.
Aman G. (2007) 6
Aman G. (2007)
Aman G. (2007)
is also responsible for identifying and establishing the availability of the intended communication partner Typical protocols
World Wide Web (WWW) File Transfer Protocol (FTP) E-mail (SMTP)
Aman G. (2007)
10
Connection-Oriented Communication
Aman G. (2007)
15
Too much traffic for too small a capacity? Solution -> flow control
Aman G. (2007)
16
Wouldnt it be slow if the transmitting machine had to wait for an acknowledgment after sending each segment? Solution Windowing
Aman G. (2007)
17
UDP - doesnt offer all the bells and whistles of TCP either, but it does do a fabulous job of transporting information that doesnt require reliable deliveryand it does so using far fewer network resources.
Aman G. (2007) 18
manages device addressing, tracks the location of devices on the network, and determines the best way to move data transports traffic between devices that arent locally attached. Concerned about network addressing
Network addresses allow a system to be identified on the network by a logically assigned address. The logical assignment of addresses allows a more hierarchical approach to addressing than MAC addresses provide.
19
Switching Methods
1.
describes how the data sent from one node reaches another. Circuit switching just like is a telephone call.
The link between caller and receiver is created, then a dedicated communications link between the two points (hence the term circuit) is created. The circuit cannot be broken, meaning no one else can use the line. In a data communications environment, however, this is a disadvantage because the data often originates from various sources.
2.
Aman G. (2007)
21
1.
has two distinct sublayers Logical Link Control (LLC) sublayer - controls the access of the media, allowing multiple high-level protocols to use a single network link.
tells the Data Link layer what to do with a packet once a frame is received
2.
Media Access Control (MAC) - manages and controls access to the network media for the protocols trying to use it.
The MAC address (Physical address) is defined at this layer, as well as logical topologies. Defines how packets are placed on the media. first come/first served access where everyone shares the same bandwidth Line discipline, error notification (not correction), ordered delivery of frames are used at this layer
Aman G. (2007) 23
The layer 2 device puts the source hardware address in a filter table and keeps track of which port the frame was received on. This information (logged in the bridges or switchs filter table) is what helps the machine determine the location of the specific sending device. The biggest benefit of using switches instead of hubs in a network is that each switch port is actually its own collision domain.
Aman G. (2007) 24
Aman G. (2007)
25
also defines how the data actually travels across the network. defines the voltage used on the cable and the frequency at which the signals that carry the data are transitioned from one state to another (speed and maximum distance) defines the physical topology of the network. Hubs and repeaters are layer 1 devices although NICs are physical components, they are defined as data-link layer devices because they are used in physical media access (which is handled at the MAC sublayer) and the logical access of the network media (which is handled at the LLC sublayer).
Aman G. (2007)
26
Aman G. (2007)
27
Aman G. (2007)
28
Aman G. (2007)
29
Aman G. (2007)
30
Aman G. (2007)
31
Aman G. (2007)
32