OSI Model Presentation
OSI Model Presentation
Understanding the
Seven Layers of Computer Networks
Introduction
Note: The Physical Layer of the OSI model is only part of a LAN
(Local Area Network).
Layer 2 – The Data Link Layer
1
Common networking components that
function at layer 2 include:
• Network interface cards
• Ethernet and Token Ring switches
3
• Bridges
• Bridges and switches function in a
similar fashion; however, bridging is
normally a software program on a
CPU,
• while switches use Application-
Specific Integrated Circuits (ASICs)
to perform the task in dedicated
hardware, which is much faster.
2
• NICs have a layer 2 or MAC address.
• A switch uses this address to filter
and forward traffic, helping relieve
congestion and collisions on a
network segment.
Layer 3 – The Network Layer
• Layer 3, the network layer of the OSI model, provides an end-to-end logical
addressing system so that a packet of data can be routed across several layer 2
networks (Ethernet, Token Ring, Frame Relay, etc.).
• Note that network layer addresses can also be referred to as logical addresses.
Layer 3 – The Network Layer
1
Initially, software manufacturers, such as Novell,
developed proprietary layer 3 addressing.
However, the networking industry has evolved to Routers use the network or
the point that it requires a common layer 3 subnet portion of the IP
addressing system. addressing to route traffic
between different networks.
The Internet Protocol (IP) addresses make
networks easier to both set up and connect with one Each router must be configured
another. specifically for the networks or
subnets that will be connected
The Internet uses IP addressing to provide to its interfaces.
connectivity to millions of networks around the
world.
3
2
To make it easier to manage the network and
control the flow of packets, many organizations
separate their network layer addressing into
smaller parts known as subnets.
Layer 3 – The Network Layer
4
Routers communicate with one another using
routing protocols, such as Routing Information The network layer accomplishes
Protocol (RIP) and Open version of Shortest Path this via a process known as
First (OSPF), fragmentation.
To learn of other networks that are present and to A router’s network layer is usually
calculate the best way to reach each network based responsible for doing the
on a variety of criteria (such as the path with the fragmentation.
fewest routers). All reassembly of fragmented
Routers and other networked systems make these packets happens at the network
routing decisions at the network layer. layer of the final destination system.
6
5
When passing packets between different
networks, it may become necessary to adjust their
outbound size to one that is compatible with the
layer 2 protocol that is being used.
Layer 3 – The Network Layer
7
Two of the additional functions of the network
layer are diagnostics and the reporting of logical
variations in normal network operation.
While the network layer diagnostics may be
initiated by any networked system, the system
8
discovering the variation reports it to the original
Some basic security functionality
sender of the packet that is found to be outside
can also be set up by filtering
normal network operation.
traffic using layer 3 addressing
The variation reporting exception is content on routers or other similar
validation calculations. If the calculation done by devices.
the receiving system does not match the value sent
by the originating system, the receiver discards the
related packet with no report to the sender.
Retransmission is left to a higher layer’s protocol.
Layer 4 – The Transport Layer
Some of the functions offered by the Control of data flow to prevent memory
transport layer include: overruns
Functionality includes:
Virtual connection between
application entities
Synchronization of data flow
Creation of dialog units
Connection parameter
negotiations
Partitioning of services into
functional groups
Layer 5, the session layer, provides various Acknowledgements of data
services, including tracking the number of received during a session
bytes that each end of the session has
acknowledged receiving from the other end of Retransmission of data if it is
the session. not received by a device
This session layer allows applications
functioning on devices to establish, manage,
and terminate a dialog through a network.
Layer 6 – The Presentation Layer
Examples of presentation
layer functionality include:
• Encryption and decryption of a
message for security
• Compression and expansion of a
message so that it travels
efficiently
TCP/IP LAYERS
networking protocol
that use those seven
layers, most networks 5 HOST TO HOST
today use TCP/IP.
LAYER
OSI
• But, networking 4
professionals continue
to describe networking 3 INTERNET LAYER
functions in relation to
the OSI layer that
performs those tasks. 2 NETWORK ACCES
LAYER
1
TCP/IP Model Overview
• The TCP/IP model uses • Things get a bit more • The TCP/IP process
four layers to perform complicated at the host- layer, when used with
the functions of the to-host layer of the TCP, provides the
seven-layer OSI model. TCP/IP model. functions of the OSI
model’s presentation
• The network access • If the host-to-host and application layers (6
layer is functionally protocol is TCP, the and 7).
equal to a combination matching functionality
of OSI physical and is found in the OSI • When the TCP/IP
data link layers (1 and transport and session transport layer protocol
2). layers (4 and 5). is UDP, the process
layer’s functions are
• The Internet layer • Using UDP equates to equivalent to OSI
performs the same the functions of only the session, presentation,
functions as the OSI transport layer of the and application layers
network layer (3). OSI model. (5, 6, and 7).
Equipment at the Layers