0% found this document useful (0 votes)
14 views

OSI Model

Uploaded by

K Kiranmayi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

OSI Model

Uploaded by

K Kiranmayi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

OSI Model

The main aim of the layered architecture is to divide the design into small pieces. Each lower
layer adds its services to the higher layer to provide a full set of services to manage
communications and run the applications. It provides modularity and clear interfaces, i.e.,
provides interaction between subsystems.

What are the benefits of layering?


The division of network protocols and services into layers not only helps simplify networking
protocols by breaking them into smaller, more manageable units, but also offers greater
flexibility. By dividing protocols into layers, protocols can be designed for interoperability.

Why are layered communication models used?


Understanding this layered model makes it easier to troubleshoot communication problems.
When there is a problem, you can simply trace it down, out one end, into, and up the other.
LAN/WAN link and activity status indicators provide some visibility to the Network Interface
layer.

What is OSI Model? – Layers of OSI Model


OSI stands for Open Systems Interconnection. It was developed by ISO – ‘International
Organization for Standardization’, in the year 1984. It is a 7-layer architecture with each layer
having specific functionality to perform. All these 7 layers work collaboratively to transmit
the data from one person to another across the globe.
What are the 7 layers of the OSI Model?
The OSI model consists of seven abstraction layers arranged in a top-down order:
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer

Physical Layer – Layer 1


The lowest layer of the OSI reference model is the physical layer. It is responsible for the
actual physical connection between the devices. The physical layer contains information in
the form of bits. It is responsible for transmitting individual bits from one node to the next.
When receiving data, this layer will get the signal received and convert it into 0s and 1s and
send them to the Data Link layer, which will put the frame back together.

Functions of the Physical Layer

∙ Bit synchronization: The physical layer provides the synchronization of the bits by
providing a clock. This clock controls both sender and receiver thus providing
synchronization at the bit level.
∙ Bit rate control: The Physical layer also defines the transmission rate i.e. the number of
bits sent per second.
∙ Physical topologies: Physical layer specifies how the different, devices/nodes are arranged
in a network i.e. bus, star, or mesh topology.
∙ Transmission mode: Physical layer also defines how the data flows between the two
connected devices. The various transmission modes possible are Simplex, half-duplex and
full-duplex.

Note:
1. Hub, Repeater, Modem, and Cables are Physical Layer devices.
2. Network Layer, Data Link Layer, and Physical Layer are also known as Lower Layers or
Hardware Layers.

Data Link Layer (DLL) – Layer 2


The data link layer is responsible for the node-to-node delivery of the message. The main
function of this layer is to make sure data transfer is error-free from one node to another, over
the physical layer. When a packet arrives in a network, it is the responsibility of the DLL to
transmit it to the Host using its MAC address.
The Data Link Layer is divided into two sublayers:
1. Logical Link Control (LLC)
2. Media Access Control (MAC)
Logical Link Control (LLC) sublayer provides the logic for the data link. Thus, it
controls the synchronization, flow control, and error checking functions of the data
link layer. Media Access Control (MAC) sublayer provides control for accessing the
transmission medium.
The packet received from the Network layer is further divided into frames depending on the
frame size of the NIC(Network Interface Card). DLL also encapsulates Sender and
Receiver’s MAC address in the header.
The Receiver’s MAC address is obtained by placing an ARP(Address Resolution Protocol)
request onto the wire asking “Who has that IP address?” and the destination host will reply
with its MAC address.

Functions of the Data Link Layer

∙ Framing: Framing is a function of the data link layer. It provides a way for a sender to
transmit a set of bits that are meaningful to the receiver. This can be accomplished by
attaching special bit patterns to the beginning and end of the frame.
∙ Physical addressing: After creating frames, the Data link layer adds physical addresses
(MAC addresses) of the sender and/or receiver in the header of each frame. ∙ Error control:
The data link layer provides the mechanism of error control in which it detects and
retransmits damaged or lost frames.
∙ Flow Control: The data rate must be constant on both sides else the data may get corrupted
thus, flow control coordinates the amount of data that can be sent before receiving an
acknowledgment.
∙ Access control: When a single communication channel is shared by multiple devices, the
MAC sub-layer of the data link layer helps to determine which device has control over
the channel at a given time.

Note:
1. Packet in the Data Link layer is referred to as Frame.
2. Data Link layer is handled by the NIC (Network Interface Card) and device drivers of host
machines.
3. Switch & Bridge are Data Link Layer devices.

Network Layer – Layer 3


The network layer works for the transmission of data from one host to the other located in
different networks. It also takes care of packet routing i.e. selection of the shortest path to
transmit the packet, from the number of routes available. The sender & receiver’s IP
addresses are placed in the header by the network layer.

Functions of the Network Layer

∙ Routing: The network layer protocols determine which route is suitable from source to
destination. This function of the network layer is known as routing.
∙ Logical Addressing: To identify each device on Internetwork uniquely, the network layer
defines an addressing scheme. The sender & receiver’s IP addresses are placed in the
header by the network layer. Such an address distinguishes each device uniquely and
universally.
Note:
1. Segment in the Network layer is referred to as Packet.
2. Network layer is implemented by networking devices such as routers and switches.

Transport Layer – Layer 4


The transport layer provides services to the application layer and takes services from the
network layer. The data in the transport layer is referred to as Segments. It is responsible for
the End to End Delivery of the complete message. The transport layer also provides the
acknowledgment of the successful data transmission and re-transmits the data if an error is
found.
At the sender’s side: The transport layer receives the formatted data from the upper layers,
performs Segmentation, and also implements Flow & Error control to ensure proper data
transmission. It also adds Source and Destination port numbers in its header and forwards the
segmented data to the Network Layer.
Note: The sender needs to know the port number associated with the receiver’s application.
Generally, this destination port number is configured, either by default or manually. For
example, when a web application requests a web server, it typically uses port number 80,
because this is the default port assigned to web applications. Many applications have default
ports assigned.
At the receiver’s side: Transport Layer reads the port number from its header and forwards
the Data which it has received to the respective application. It also performs sequencing and
reassembling of the segmented data.

Functions of the Transport Layer

∙ Segmentation and Reassembly: This layer accepts the message from the (session) layer,
and breaks the message into smaller units. Each of the segments produced has a header
associated with it. The transport layer at the destination station reassembles the message.
∙ Service Point Addressing: To deliver the message to the correct process, the transport layer
header includes a type of address called service point address or port address. Thus by
specifying this address, the transport layer makes sure that the message is delivered to the
correct process.
Services Provided by Transport Layer
1. Connection-Oriented Service
2. Connectionless Service
1. Connection-Oriented Service: It is a three-phase process that includes ∙
Connection Establishment
∙ Data Transfer
∙ Termination/disconnection
In this type of transmission, the receiving device sends an acknowledgment, back to the
source after a packet or group of packets is received. This type of transmission is reliable and
secure.
2. Connectionless service: It is a one-phase process and includes Data Transfer. In this type
of transmission, the receiver does not acknowledge receipt of a packet. This approach allows
for much faster communication between devices. Connection-oriented service is more
reliable than connectionless Service.
Note:
1. Data in the Transport Layer is called Segments.
2. Transport layer is operated by the Operating System. It is a part of the OS and
communicates with the Application Layer by making system calls.
3. The transport layer is called as Heart of the OSI model.
4. Device or Protocol Use : TCP, UDP NetBIOS, PPTP
Session Layer – Layer 5
This layer is responsible for the establishment of connection, maintenance of sessions, and
authentication, and also ensures security.

Functions of the Session Layer

∙ Session
establishment, maintenance, and termination: The layer allows the two
processes to establish, use and terminate a connection.
∙ Synchronization: This layer allows a process to add checkpoints that are considered
synchronization points in the data. These synchronization points help to identify the error
so that the data is re-synchronized properly, and ends of the messages are not cut
prematurely and data loss is avoided.
∙ Dialog Controller: The session layer allows two systems to start communication with each
other in half-duplex or full-duplex.
Note:
1. All the below 3 layers(including Session Layer) are integrated as a single layer in the
TCP/IP model as the ????pplication Layer”.
2. Implementation of these 3 layers is done by the network application itself. These are also
known as Upper Layers or Software Layers.
3. Device or Protocol Use : NetBIOS, PPTP.
for Example:-
Let us consider a scenario where a user wants to send a message through some Messenger
application running in his browser. The “Messenger” here acts as the application layer which
provides the user with an interface to create the data. This message or so-called Data is
compressed, encrypted (if any secure data), and converted into bits (0’s and 1’s) so that it can
be transmitted.

Communication in Session Layer

Presentation Layer – Layer 6


The presentation layer is also called the Translation layer. The data from the application
layer is extracted here and manipulated as per the required format to transmit over the
network.
Functions of the Presentation Layer

∙ Translation: For example, ASCII to EBCDIC.


∙ Encryption/ Decryption: Data encryption translates the data into another form or code.
The encrypted data is known as the ciphertext and the decrypted data is known as plain
text. A key value is used for encrypting as well as decrypting data.
∙ Compression: Reduces the number of bits that need to be transmitted on the network.
Note: Device or Protocol Use : JPEG, MPEG, GIF
Application Layer – Layer 7
At the very top of the OSI Reference Model stack of layers, we find the Application layer
which is implemented by the network applications. These applications produce the data,
which has to be transferred over the network. This layer also serves as a window for the
application services to access the network and for displaying the received information to the
user.
Example: Application – Browsers, Skype Messenger, etc.
Note: 1. The application Layer is also called Desktop Layer.
2. Device or Protocol Use : SMTP

Functions of the Application Layer


The main functions of application layer are given below.
∙ Network Virtual Terminal: It allows a user to log on to a remote host. ∙ FTAM- File transfer
access and management : This application allows a user to access file in a remote host,
retrieve files in remote host and manage or control files from a remote computer.
∙ Mail Services : Provide email service.
∙ Directory Services : This application provides distributed database sources and access for
global information about various objects and services.
OSI Model in Summary
Lay Layer Name Responsibility Information Device or Protocol
er Form(Data
No Unit)

7 Application Helps in identifying the Message SMTP


Layer client and synchronizing
communication.

6 Presentati Data from the application Message JPEG, MPEG, GIF


on Layer layer is extracted and
manipulated in the required
format for transmission.

5 Session Establishes Connection, Message Gateway


Layer Maintenance, Ensures
Authentication, and Ensures
security.

4 Transport Take Service from Network Segment Firewall


Layer Layer and provide it to the
Application Layer.

3 Network Transmission of data from Packet Router


Layer one host to another, located
in different networks.

2 Data Link Node to Node Delivery of Frame Switch, Bridge


Layer Message.

1 Physical Establishing Physical Bits Hub, Repeater,


Layer Connections between Modem, Cables
Devices.

Note: OSI model acts as a reference model and is not implemented on the Internet
because of its late invention. The current model being used is the TCP/IP model.

You might also like