0% found this document useful (0 votes)
26 views19 pages

Introduc Tion

The OSI Model is a framework that standardizes network communication into seven layers, each with specific functions and responsibilities. It ranges from the Physical Layer, which handles raw data transmission, to the Application Layer, which provides services directly to users. Understanding this model aids network professionals in diagnosing and troubleshooting network issues.

Uploaded by

Kunal Bhardwaj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views19 pages

Introduc Tion

The OSI Model is a framework that standardizes network communication into seven layers, each with specific functions and responsibilities. It ranges from the Physical Layer, which handles raw data transmission, to the Application Layer, which provides services directly to users. Understanding this model aids network professionals in diagnosing and troubleshooting network issues.

Uploaded by

Kunal Bhardwaj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

Introduc

tion
OSI 7-Layer Model - In-Depth Explanation

The OSI (Open Systems Interconnection) Model is a


theoretical framework designed to standardize network
communication. It defines how data moves from one device
to another across a network by segmenting the process into
seven layers.
Each layer in the OSI model serves a specific function and
communicates with the layers above and below it. Let's go deep
into each layer, including functions, protocols, and real-world
applications.
1. Physical Layer (Layer 1) – The Hardware & Transmission
Layer

Primary Function:
•Deals with physical transmission of raw binary data (0s and 1s).
•Converts data into electrical, radio, or light signals that travel through network
media.
Key Responsibilities:
•Bit transmission: Moves individual bits across a medium (copper wire, fiber
optics, radio waves).
•Physical topology: Defines the layout of cables and devices (e.g., star, bus, mesh
Examples & Protocols:
topology).
•Media Types: UTP (Ethernet cables), Fiber Optics, Wi-Fi (radio
•Synchronization: Ensures sender and receiver clocks are in sync for accurate
waves).
transmission.
•Devices: Hubs, repeaters, network adapters, antennas, modems.
•Data encoding & signaling: Defines how signals are represented (e.g., voltage
•Standards: IEEE 802.3 (Ethernet), IEEE 802.11 (Wi-Fi), RS-232 (Serial
levels, modulation).
communication).
Devices Used:
🔹 Cables (Twisted Pair, Coaxial, Fiber Optic)
🔹 Hubs (Repeats signals to multiple devices)
🔹 Repeaters (Amplifies weak signals)
🔹 Network Interface Cards (NICs)
🔹 Radio Frequencies (Wi-Fi, Bluetooth, 4G, 5G)
Protocols & Standards:
🔹 IEEE 802.3 (Ethernet)
🔹 IEEE 802.11 (Wi-Fi)
🔹 RS-232 (Serial communication)
🔹 SONET (Fiber Optics)
2. Data Link Layer (Layer 2) – The Node-to-Node
Transfer Layer
Primary Function:
•Ensures error-free data transfer between directly
connected devices.
•Uses MAC addresses for node identification.
Key Responsibilities:
•Framing: Organizes bits into structured frames (packets
with headers & trailers).
•Error Detection & Correction: Uses Cyclic
Redundancy Check (CRC) or checksum methods.
•Media Access Control (MAC): Determines who gets to
send data in a shared medium.
•Flow Control: Ensures sender does not overload the
receiver with data.
Sublayers:
•MAC (Media Access Control): Deals with hardware (MAC
addresses, collision detection).
•LLC (Logical Link Control): Manages link communication, flow,
and error control.
Examples & Protocols:
•Ethernet (IEEE 802.3), Wi-Fi (802.11), Bluetooth.
•Switches, Bridges, NICs (Network Interface Cards).
•PPP (Point-to-Point
Devices Used: Protocol), HDLC, ARP (Address
Resolution
🔹 Switches Protocol).
(Forwards data using MAC addresses)
🔹 Bridges (Connects two LANs)
🔹 Network Interface Cards (NICs)
Protocols & Standards:
🔹 Ethernet (IEEE 802.3)
🔹 Wi-Fi (IEEE 802.11)
🔹 ARP (Address Resolution Protocol)
🔹 PPP (Point-to-Point Protocol)
3. Network Layer (Layer 3) – The Routing Layer
Primary Function:
•Determines the best path for data to travel between different
networks.
•Uses logical addressing (IP addresses) for device
identification.
Key Responsibilities:
•Routing: Finds the best path for data packets using routers.
•Logical Addressing: Uses IP addresses (IPv4/IPv6) to identify
devices uniquely.
•Packet Forwarding: Moves data from one network to another.
•Fragmentation & Reassembly: Breaks large packets into
smaller ones (MTU control).
Examples & Protocols:
•Internet Protocol (IP) - IPv4 & IPv6
•ICMP (Internet Control Message Protocol) - Used for Ping,
error reporting.
•ARP (Address Resolution Protocol) - Maps IP to MAC
addresses.
•OSPF, BGP, RIP - Routing protocols used in large networks.
•Routers and Layer 3 switches.
Devices Used:
🔹 Routers (Route packets between networks)
🔹 Layer 3 Switches
Protocols & Standards:
🔹 IP (Internet Protocol - IPv4, IPv6)
🔹 ICMP (Ping, Traceroute)
🔹 OSPF, BGP, RIP (Routing Protocols)
🔹 ARP (Maps IP addresses to MAC addresses)
4. Transport Layer (Layer 4) – The End-to-End
Communication Layer
Primary Function:
•Ensures reliable or fast data transmission between
devices.
•Divides data into segments and reassembles them
on arrival.
Key Responsibilities:
•Segmentation & Reassembly: Breaks data into
small, manageable pieces.
•Flow Control: Prevents sender from overwhelming
the receiver.
•Error Checking: Ensures data integrity and
retransmits lost packets.
Types of Transport Protocols:
1.TCP (Transmission Control Protocol)
1. Reliable, connection-oriented protocol.
2. Uses three-way handshake (SYN, SYN-ACK, ACK) before
communication.
3. Ensures error detection and retransmission of lost packets.
4. Used in HTTP, HTTPS, FTP, SSH, SMTP.
2.UDP (User Datagram Protocol)
1.Faster but unreliable, connectionless protocol.
2. No error checking or retransmission.
3. Used in DNS, VoIP, online gaming, live streaming.
Examples & Protocols:
•TCP, UDP, SCTP (Stream Control Transmission Protocol).
•Port Numbers (e.g., HTTP = 80, HTTPS = 443, FTP = 21).
•Firewalls operate at this layer.
5. Session Layer (Layer 5) – The Communication
Management Layer
Primary Function:
•Manages session creation, maintenance, and
termination between applications.
•Ensures continuous communication even after interruptions.
Key Responsibilities:
•Establishing, Maintaining, & Terminating Sessions:
Keeps track of multiple network sessions.
•Authentication & Authorization: Verifies user identity
before communication.
•Session Checkpointing: Resumes interrupted transfers
(useful in FTP, VoIP calls).
Examples & Protocols:
•NetBIOS, RPC (Remote Procedure Call), PPTP (Point-
to-Point Tunneling Protocol).
•Sockets and APIs use session management.
Key Functions:
✔ Session Establishment: Starts, maintains, and ends
communication sessions.
✔ Synchronization: Recovers from network
interruptions.
✔ Authentication & Authorization: Verifies user
access.
Examples & Protocols:
🔹 NetBIOS (Network Basic Input Output System)
🔹 PPTP (Point-to-Point Tunneling Protocol)
🔹 Remote Procedure Call (RPC)
6. Presentation Layer (Layer 6) – The Data
Formatting Layer
Primary Function:
•Translates, encrypts, and compresses data for proper
interpretation by the Application Layer.
Key Responsibilities:
•Data Translation: Converts between character
encoding (ASCII, Unicode, EBCDIC).
•Encryption & Decryption: Secures data during
transmission (SSL/TLS).
•Compression: Reduces data size for faster
transmission (JPEG, MP3, MPEG).
Examples & Protocols:
•SSL/TLS (for secure web communication).
•JPEG, PNG (Image formats).
•MP3, MP4 (Audio/Video codecs).
Key Functions:
✔ Data Translation: Converts data formats (e.g., ASCII
to Unicode).
✔ Encryption & Decryption: Secures data
transmission (SSL/TLS).
✔ Compression: Reduces file size (JPEG, MP3, MPEG).
Examples & Protocols:
🔹 SSL/TLS (Secure Web Communication)
🔹 JPEG, PNG (Image Formats)
🔹 MP3, MPEG (Audio/Video Formats)
7. Application Layer (Layer 7) – The User
Interaction Layer
Primary Function:
•Provides network services directly to applications
and users.
Key Responsibilities:
•User Interface: Interacts with end-user applications
(e.g., web browsers, email clients).
•Network Services: Supports functions like file
transfers, emails, and web browsing.
•Protocol Implementation: Defines how applications
communicate over the network.
Examples & Protocols:
•HTTP (Web Browsing), HTTPS (Secure Web), FTP
(File Transfer).
•DNS (Domain Name System), SMTP/POP3/IMAP
(Email protocols).
Key Functions:
✔ User Interface: Provides interaction with
applications (browsers, email clients).
✔ Data Access: Retrieves web pages, downloads files,
sends emails.
✔ Protocol Handling: Defines how applications
communicate over the network.
Examples & Protocols:
🔹 HTTP/HTTPS (Web Browsing)
🔹 FTP (File Transfers)
🔹 SMTP/POP3/IMAP (Email Communication)
🔹 DNS (Domain Name System - Resolves domain
names to IP addresses)
📌 Summary Table: OSI Model Layers & Key Functions
Layer Function Key Protocols Devices
Layer 7: User interaction, web HTTP, FTP, SMTP, Web browsers, email
Application services DNS clients
Layer 6: Data translation, None (handled in
SSL/TLS, JPEG, MP3
Presentation encryption software)
Session
None (handled in
Layer 5: Session management, NetBIOS, PPTP, RPC
software)
authentication
Reliable/unreliable Firewalls, load
Layer 4: Transport TCP, UDP
data delivery balancers
Routing, IP Routers, Layer 3
Layer 3: Network IP, ICMP, ARP, OSPF
addressing switches
MAC addressing, Switches, bridges,
Layer 2: Data Link Ethernet, Wi-Fi, PPP
error detection NICs
Ethernet (IEEE
Bit transmission, Cables, hubs,
Layer 1: Physical 802.3), Wi-Fi
media control repeaters
(802.11)
Key Points:
•Lower layers (1-4) focus on data transmission and
routing.
•Upper layers (5-7) handle application-level services
and user interaction.
•Helps with troubleshooting and network design by
defining specific responsibilities.
Conclusion:
Each OSI layer plays a crucial role in network
communication. By understanding this model, network
engineers, administrators, and cybersecurity
professionals can effectively diagnose and troubleshoot
network issues.

You might also like