SlideShare a Scribd company logo
1 of 7
Download to read offline
FIT ASSIGNMENT#OSI MODEL
November
21, 2017
The Open System Interconnection (OSI) reference model (Figure 1.1) is a seven-
layer model used in networking. The model specifies layer by layer how information from an
application on a network device (e.g., computer, router, etc.) moves from the source to the
destination using a physical medium, and then how it interacts with the software application
on that specific network device. In other words, the OSI model defines the network functions
required for sending data and divides them into seven categories.
OSI was developed by the International Organization for Standardization (ISO) in
1984. The OSI mechanism involves the following two concepts:
๏‚ท The OSI reference model, which has seven layers
๏‚ท OSI protocols that map to each of the seven layers
Network Fundamentals: OSI Model
Fig (1.1): OSI Model
The seven layers of the OSI model, starting from the top, are as follows:
Layer 7 Application
Layer 6 Presentation
Layer 5 Session
Layer 4 Transport
Layer 3 Network
Layer 2 Data Link
Layer 1 Physical
The upper three layers are concerned with application issues, such as user
interfacing and data formatting. The lower four layers relate to transport issues, such as data
transmission and the physical characteristics of the network.
It is essential to understand the OSI reference model from a design standpoint
because of its modular architecture. The OSI model divides the specific tasks that are
involved in moving the information from one networking device to another into seven smaller,
more manageable groups of tasks/actions. The overall goals of the OSI model are to
enhance interoperability and functionality between different applications and vendors, as well
as make it easier for network administrators to focus on the design of particular layers of the
model. For example, applications can be designed without having to worry about the lower
OSI layers, because, if the packet has already been analyzed by the lower layers, there is a
certain level of trust that the lower layers will process and send the packet over the wire
successfully.
The OSI model is a key concept in the networking industry and it plays an important
role in the design phase of a network using a modular (layered) approach.
Note: The OSI model represents the actions required to send data, but it does not specify
how these actions are carried out. However, the OSI model does provide a framework for
the communication protocols to be used between devices, where different protocols
implement functions at various layers of the model.
Protocols
A protocol is a set of rules. Network devices need to agree on a set of rules in order
to communicate, and they must use the same protocol to understand each other. A wide
variety of network protocols exists at different OSI layers. For example, at the lower OSI
layers, LAN and WAN protocols are used, while routed and routing protocols are found at
Layer 3.
Protocols can be organized in protocol suites or stacks. TCP/IP is the most common
network protocol suite, named after the two protocols in the stack. The TCP/IP suite can be
found in almost all modern networks, and it is the core feature for the Internet and within
organizationsโ€™ networks. Other examples of protocol suites are AppleTalk and Novell
NetWare.
The OSI layers and their associated protocols are described in the following sections,
beginning with the highest layer of the model.
Application Layer
The Application Layer (Layer 7) is where the end-user interacts directly with an
application. For example, when a user has information to transmit (e.g., data request,
pictures, document file, etc.), the application layer interacts directly with any software
application that communicates with the internetwork.
Depending on the information the user wants to send over the network, a specific
protocol is used, such as the following:
๏‚ท The SMTP or POP3 protocol is used to send an e-mail message
๏‚ท The FTP protocol is used to transmit a file over the network
๏‚ท The Telnet protocol is used to control a remote device
Presentation Layer
The Presentation Layer (Layer 6) ensures that the data is understandable by the end
system. In other words, the data must be converted and formatted in such a way that the
system recognizes it and knows how to handle the content, so that information sent from one
host can be interpreted properly by the destination host. This includes the translation and
conversion required for formatting, data structure, coding, compression schemes for video
and audio (e.g., MPEG, AVI, JPEG, GIF, and TIF files), encryption schemes, and character
representation formats (e.g., ASCII to Unicode). In sum, if the packets from the Application
Layer are sent unformatted, the Presentation Layer translates them and then passes them
on to the Session Layer (Layer 5).
Session Layer
From a technical standpoint, communications systems are comprised of different
service requests, and service responses between applications are located on different
networking devices. The Session Layer (Layer 5) establishes, manages, and terminates
these communication sessions and connects the lower layers with the Presentation and
Application Layers.
Transport Layer
The Transport Layer (Layer 4) accepts data from the Session Layer and breaks it up into
transportable segments. This layer is responsible for the information reaching the destination
device error-free and in the proper order (i.e., sequence of packets); it is also responsible for
the following:
๏‚ท Reliability
๏‚ท Transmission error checking
๏‚ท Error correction
๏‚ท Data retransmission
๏‚ท Flow control
๏‚ท Sequencing
๏‚ท Data multiplexing
From a technical standpoint, all of these features are implemented by establishing a
virtual circuit between the sender and the receiver devices. The Transport Layer initiates,
maintains, and terminates these virtual circuits and uses segments as the protocol data unit.
Segments are defined sets of data that include control information and are sent between the
Transport Layers of the endpoints.
The two main Transport Layer protocols used on the Internet are as follows:
๏‚ท TCP (Transmission Control Protocol): a connection-oriented protocol
๏‚ท UDP (User Datagram Protocol): an unreliable, low-overhead, connectionless protocol
Connection-oriented protocols establish a logical connection and use sequence numbers
to ensure that all data is received at the destination. Connectionless protocols only send the
data and rely on the upper-layer protocols to handle error detection and to correct possible
problems.
Network Layer
The Network Layer (Layer 3) is responsible for knowing the internetwork path
(routing) from the sender device to the receiver device. It is also responsible for the logical
addressing schemes (e.g., IP, IPX, and AppleTalk) that assign logical addresses to the
network hosts on both sides of the communication path.
The Network Layer sends datagrams (or packets), which contain a defined set of
data that includes addressing and control information and is routed between the source and
destination devices. If a datagram needs to be sent across a network that can handle only a
certain amount of data at a time, the datagram can be fragmented into multiple packets and
reassembled by the receiving device. If no fragmentation occurs, then a datagram is sent as
a single packet. It is important to note that a datagram is a unit of data, while a packet is sent
physically through the network.
In addition to logical addressing schemes, the Network Layer is also responsible for
router selection and packet forwarding, using the following types of protocols:
๏‚ท Routed protocols (IP, IPX/SPX, AppleTalk, and DECnet)
๏‚ท Routing protocols (RIP, EIGRP, OSPF, IS-IS, and BGP)
Routed protocols are responsible for the actual rules and processes regarding the
encapsulation of the data packets, and they are ultimately routed over the internetwork,
whereas routing protocols actually move the routed protocol packets (Layer 3 data units)
across the internetwork, from one router to another, using particular routing algorithms.
Data Link Layer
The Data Link Layer (Layer 2) defines the format of the data that is transmitted
across the physical network. This layer has two sublayers: the LLC (Logical Link Control)
Sublayer and the MAC (Media Access Control) Sublayer (Figure 1.2). LLC deals with the
Network Layer while MAC has access to the Physical Layer (Layer 1).
The LLC Sublayer (IEEE 802.2) allows multiple network Layer 3 protocols to
communicate over the same physical link by allowing those protocols to be specified in the
LLC fields.
The MAC Sublayer (IEEE 802.3) specifies the physical MAC address that identifies a
device on a network. Each frame sent over the wire contains a MAC address field, and only
devices with a specific MAC address can process the frame. A source MAC address field is
also included in the frame.
The Data Link Layer is responsible for reliable transmission of data across a physical
network link, using specifications that provide different network and protocol characteristics,
which includes physical addressing, different network topologies, error notifications, frame
(Layer 2 data units) sequences, and frame flow control.
Layer 2 is concerned with a specific addressing structure, namely physical
addressing, as opposed to the Layer 3 logical addressing scheme. Physical addressing
generally comes in the form of MAC addresses that are burned onto a computer network
interface card (NIC) or on the interfaces of network devices.
Physical Layer
The Physical Layer (Layer 1) lies at the bottom of the OSI protocol stack and it
represents the actual physical medium on which the information is travelling between
network devices. As mentioned, Layer 1 interconnects with the Data Link Layer through the
Figure 1.2 โ€“ Data Link Sublayers
MAC Sublayer, which controls the sending of the physical signals that encode 0 and 1 bits,
or binary digits (e.g., electrical signals over a copper link).
The following protocols operate at the Physical Layer:
๏‚ท Local Area Network (LAN) protocols (Ethernet, IEEE 802.3, 100Base-T,
Token Ring/IEEE 802.5, and FDDI)
๏‚ท Wide Area Network (WAN) protocols (EIA/TIA-232, EIA/TIA-449, V.35, and
EIA-530)
Layer 1 defines physical media procedures, electrical and mechanical aspects,
encoding, and modulation (voltage) on the line (i.e., the electrical signal is either a 0 or a 1,
or is in a transition state), as well as activating, maintaining, and deactivating the actual
physical link between multiple systems on LAN or WAN networks.
Encapsulation
In both LANs and WANs, packet transmission can be analyzed using the seven-layer
OSI model. When data is transmitted by the source toward a specific destination, it passes
through the Application, Presentation, and Session Layers and the protocol data unit arrives
at the Transport Layer (Layer 4). At this layer, a 20-byte header is placed in front of the data.
Regardless of whether the protocol is a reliable, connection-oriented protocol (TCP) or an
unreliable, connectionless protocol (UDP), the data and the Layer 4 header, which together
form a segment, is passed down to Layer 3, as illustrated in Figure 1.3 below:
Figure 1.3 โ€“ Packet Encapsulation
The Network Layer places its Layer 3 header in front of the received segment and
this group becomes a packet (or a datagram). The Layer 3 header contains important fields,
such as the logical address (IP address) of both the source and the destination device. The
newly formed packet is then passed down to Layer 2. The Data Link Layer creates a new
data unit, called a frame, by adding the Layer 2 frame header and trailer. The frame is then
passed down to the Physical Layer, which converts the information into 0 and 1 bits that are
sent over the physical media using electrical signals (i.e., on a copper link). Finally, the data
is sent over the wire using a wide variety of methods, such as Ethernet or Token Ring.
The headers and trailers are a specific form of control information that allows the
data to go through the network properly. Thus, the data at each layer is encapsulated in the
information appropriate for the specific layer, including addressing and error checking.
A Protocol Data Unit (PDU) is a grouping of data used to exchange information at a
particular OSI layer. The Layer 1 to Layer 4 PDU types, signifying the group of data and the
specific headers and trailers, are summarized as follows:
The overall size of the information increases as the data travels through the lower
layers (from Layer 1 to Layer 4). The destination device receives the data, and this additional
information is analyzed and is then removed as the data passes through the higher layers,
up to the Application Layer, where the data is unwrapped (or decapsulated).
In addition to the Layer 3 logical addressing fields in the header, an addressing
structure is also applied in the Layer 2 header (i.e., the MAC address). Every network device
has a physical address burned onto it, which is located in a special field in the Data Link
Layer header. This address changes as the packet passes from one device to another (e.g.,
from the source PC to a switch to a router to another switch and, finally, to the destination
PC). However, the original IP source and destination addresses do not change when
transiting the network because the packet is stripped of its Layer 3 header only when it goes
beyond a router. When it stays within the same LAN, it only passes through switches, which
decapsulate it at the Layer 2 header containing the MAC address. As a result, the header
changes as the packet is re-encapsulated, as does the MAC address fields.
Because different protocols are available at each layer (e.g., IP packets are different
from IPX packets), proper network operation requires that both the source and the receiver
endpoints communicate using the same protocol.
Layer PDU Name
Layer 1 Bit
Layer 2 Frame
Layer 3 Packet (Datagram)
Layer 4 Segment

More Related Content

What's hot

THE COMPLETE OSI MODEL
THE COMPLETE OSI MODEL THE COMPLETE OSI MODEL
THE COMPLETE OSI MODEL AMIT GUPTA
ย 
Osi model
Osi modelOsi model
Osi modelOnline
ย 
OSI Model - Open Systems Interconnection
OSI Model - Open Systems InterconnectionOSI Model - Open Systems Interconnection
OSI Model - Open Systems InterconnectionAdeel Rasheed
ย 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsGayathri Kesavan
ย 
Chapter02 -- networking standards and the osi model
Chapter02  -- networking standards and the osi modelChapter02  -- networking standards and the osi model
Chapter02 -- networking standards and the osi modelRaja Waseem Akhtar
ย 
Full presentation of The OSI model
Full presentation of The OSI model Full presentation of The OSI model
Full presentation of The OSI model FizzaShehwar
ย 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPMukesh Chinta
ย 
Osi Layer model provided by TopTechy.com
Osi Layer model provided by TopTechy.comOsi Layer model provided by TopTechy.com
Osi Layer model provided by TopTechy.comVicky Kamboj
ย 
Network models and Attacks
Network models and AttacksNetwork models and Attacks
Network models and AttacksN S
ย 
OSI MODEL - A PROJECT
OSI MODEL - A PROJECTOSI MODEL - A PROJECT
OSI MODEL - A PROJECTAbhi shreshtha
ย 
OSI MODEL
OSI MODELOSI MODEL
OSI MODELMousa_k
ย 
Osi reference model
Osi reference modelOsi reference model
Osi reference modelprashob7
ย 
Osi model in networking
Osi model in networkingOsi model in networking
Osi model in networkingFuture Programming
ย 
OSI Layers
OSI LayersOSI Layers
OSI LayersKashif Latif
ย 

What's hot (20)

THE COMPLETE OSI MODEL
THE COMPLETE OSI MODEL THE COMPLETE OSI MODEL
THE COMPLETE OSI MODEL
ย 
OSI model
OSI model OSI model
OSI model
ย 
Osi model
Osi modelOsi model
Osi model
ย 
OSI Model - Open Systems Interconnection
OSI Model - Open Systems InterconnectionOSI Model - Open Systems Interconnection
OSI Model - Open Systems Interconnection
ย 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol Functions
ย 
Osi model
Osi modelOsi model
Osi model
ย 
OSI Model
OSI ModelOSI Model
OSI Model
ย 
Chapter02 -- networking standards and the osi model
Chapter02  -- networking standards and the osi modelChapter02  -- networking standards and the osi model
Chapter02 -- networking standards and the osi model
ย 
Osi model
Osi modelOsi model
Osi model
ย 
Full presentation of The OSI model
Full presentation of The OSI model Full presentation of The OSI model
Full presentation of The OSI model
ย 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
ย 
OSI layer by cisco
OSI layer by ciscoOSI layer by cisco
OSI layer by cisco
ย 
Osi layers
Osi layersOsi layers
Osi layers
ย 
Osi Layer model provided by TopTechy.com
Osi Layer model provided by TopTechy.comOsi Layer model provided by TopTechy.com
Osi Layer model provided by TopTechy.com
ย 
Network models and Attacks
Network models and AttacksNetwork models and Attacks
Network models and Attacks
ย 
OSI MODEL - A PROJECT
OSI MODEL - A PROJECTOSI MODEL - A PROJECT
OSI MODEL - A PROJECT
ย 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
ย 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
ย 
Osi model in networking
Osi model in networkingOsi model in networking
Osi model in networking
ย 
OSI Layers
OSI LayersOSI Layers
OSI Layers
ย 

Similar to Network Fundamentals: OSI Model

006 Osi Model
006 Osi Model006 Osi Model
006 Osi ModelBELKA08
ย 
Osi reference model
Osi reference modelOsi reference model
Osi reference modelSagar Gor
ย 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP ModelShamima Akther
ย 
osireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdfosireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdfFira253524
ย 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptxTadeseBeyene
ย 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference ModelJohnson Ubah
ย 
Lalit bhati ppt osi
Lalit bhati ppt osiLalit bhati ppt osi
Lalit bhati ppt osiLalit Bhati
ย 
Unit 1 introduction
Unit 1 introductionUnit 1 introduction
Unit 1 introductionPRADEEP
ย 
Osi model and tcpip model.
Osi model and tcpip model.Osi model and tcpip model.
Osi model and tcpip model.kona paul
ย 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP ModelNajmulIslam38
ย 
Osi model
Osi modelOsi model
Osi modeldhawal mehta
ย 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptxshucaybcabdi
ย 

Similar to Network Fundamentals: OSI Model (20)

006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
ย 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
ย 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
ย 
osireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdfosireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdf
ย 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
ย 
Assignment3
Assignment3Assignment3
Assignment3
ย 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference Model
ย 
Lalit bhati ppt osi
Lalit bhati ppt osiLalit bhati ppt osi
Lalit bhati ppt osi
ย 
Unit 1 introduction
Unit 1 introductionUnit 1 introduction
Unit 1 introduction
ย 
Osi model and tcpip model.
Osi model and tcpip model.Osi model and tcpip model.
Osi model and tcpip model.
ย 
Learn basics of ip addressing
Learn basics of  ip addressingLearn basics of  ip addressing
Learn basics of ip addressing
ย 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
ย 
Ccna notes
Ccna notesCcna notes
Ccna notes
ย 
Osi model
Osi modelOsi model
Osi model
ย 
OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.
ย 
Ccna notes
Ccna notesCcna notes
Ccna notes
ย 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
ย 
OSI models
OSI modelsOSI models
OSI models
ย 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
ย 
Chapter#4
Chapter#4Chapter#4
Chapter#4
ย 

Recently uploaded

Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
ย 
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort ServiceBusty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort ServiceDelhi Call girls
ย 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
ย 
Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...Sheetaleventcompany
ย 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
ย 
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...Delhi Call girls
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
ย 
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
ย 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
ย 
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”soniya singh
ย 
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Standkumarajju5765
ย 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
ย 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
ย 
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445ruhi
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
ย 

Recently uploaded (20)

Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
ย 
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort ServiceBusty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
ย 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ย 
Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...
ย 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
ย 
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
ย 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
ย 
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
ย 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
ย 
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
ย 
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
ย 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
ย 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
ย 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 ๐Ÿซฆ Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 ๐Ÿซฆ Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 ๐Ÿซฆ Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 ๐Ÿซฆ Vanshika Verma More Our Se...
ย 
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
ย 

Network Fundamentals: OSI Model

  • 1. FIT ASSIGNMENT#OSI MODEL November 21, 2017 The Open System Interconnection (OSI) reference model (Figure 1.1) is a seven- layer model used in networking. The model specifies layer by layer how information from an application on a network device (e.g., computer, router, etc.) moves from the source to the destination using a physical medium, and then how it interacts with the software application on that specific network device. In other words, the OSI model defines the network functions required for sending data and divides them into seven categories. OSI was developed by the International Organization for Standardization (ISO) in 1984. The OSI mechanism involves the following two concepts: ๏‚ท The OSI reference model, which has seven layers ๏‚ท OSI protocols that map to each of the seven layers Network Fundamentals: OSI Model Fig (1.1): OSI Model
  • 2. The seven layers of the OSI model, starting from the top, are as follows: Layer 7 Application Layer 6 Presentation Layer 5 Session Layer 4 Transport Layer 3 Network Layer 2 Data Link Layer 1 Physical The upper three layers are concerned with application issues, such as user interfacing and data formatting. The lower four layers relate to transport issues, such as data transmission and the physical characteristics of the network. It is essential to understand the OSI reference model from a design standpoint because of its modular architecture. The OSI model divides the specific tasks that are involved in moving the information from one networking device to another into seven smaller, more manageable groups of tasks/actions. The overall goals of the OSI model are to enhance interoperability and functionality between different applications and vendors, as well as make it easier for network administrators to focus on the design of particular layers of the model. For example, applications can be designed without having to worry about the lower OSI layers, because, if the packet has already been analyzed by the lower layers, there is a certain level of trust that the lower layers will process and send the packet over the wire successfully. The OSI model is a key concept in the networking industry and it plays an important role in the design phase of a network using a modular (layered) approach. Note: The OSI model represents the actions required to send data, but it does not specify how these actions are carried out. However, the OSI model does provide a framework for the communication protocols to be used between devices, where different protocols implement functions at various layers of the model. Protocols A protocol is a set of rules. Network devices need to agree on a set of rules in order to communicate, and they must use the same protocol to understand each other. A wide variety of network protocols exists at different OSI layers. For example, at the lower OSI layers, LAN and WAN protocols are used, while routed and routing protocols are found at Layer 3.
  • 3. Protocols can be organized in protocol suites or stacks. TCP/IP is the most common network protocol suite, named after the two protocols in the stack. The TCP/IP suite can be found in almost all modern networks, and it is the core feature for the Internet and within organizationsโ€™ networks. Other examples of protocol suites are AppleTalk and Novell NetWare. The OSI layers and their associated protocols are described in the following sections, beginning with the highest layer of the model. Application Layer The Application Layer (Layer 7) is where the end-user interacts directly with an application. For example, when a user has information to transmit (e.g., data request, pictures, document file, etc.), the application layer interacts directly with any software application that communicates with the internetwork. Depending on the information the user wants to send over the network, a specific protocol is used, such as the following: ๏‚ท The SMTP or POP3 protocol is used to send an e-mail message ๏‚ท The FTP protocol is used to transmit a file over the network ๏‚ท The Telnet protocol is used to control a remote device Presentation Layer The Presentation Layer (Layer 6) ensures that the data is understandable by the end system. In other words, the data must be converted and formatted in such a way that the system recognizes it and knows how to handle the content, so that information sent from one host can be interpreted properly by the destination host. This includes the translation and conversion required for formatting, data structure, coding, compression schemes for video and audio (e.g., MPEG, AVI, JPEG, GIF, and TIF files), encryption schemes, and character representation formats (e.g., ASCII to Unicode). In sum, if the packets from the Application Layer are sent unformatted, the Presentation Layer translates them and then passes them on to the Session Layer (Layer 5). Session Layer From a technical standpoint, communications systems are comprised of different service requests, and service responses between applications are located on different networking devices. The Session Layer (Layer 5) establishes, manages, and terminates these communication sessions and connects the lower layers with the Presentation and Application Layers. Transport Layer The Transport Layer (Layer 4) accepts data from the Session Layer and breaks it up into transportable segments. This layer is responsible for the information reaching the destination device error-free and in the proper order (i.e., sequence of packets); it is also responsible for the following: ๏‚ท Reliability
  • 4. ๏‚ท Transmission error checking ๏‚ท Error correction ๏‚ท Data retransmission ๏‚ท Flow control ๏‚ท Sequencing ๏‚ท Data multiplexing From a technical standpoint, all of these features are implemented by establishing a virtual circuit between the sender and the receiver devices. The Transport Layer initiates, maintains, and terminates these virtual circuits and uses segments as the protocol data unit. Segments are defined sets of data that include control information and are sent between the Transport Layers of the endpoints. The two main Transport Layer protocols used on the Internet are as follows: ๏‚ท TCP (Transmission Control Protocol): a connection-oriented protocol ๏‚ท UDP (User Datagram Protocol): an unreliable, low-overhead, connectionless protocol Connection-oriented protocols establish a logical connection and use sequence numbers to ensure that all data is received at the destination. Connectionless protocols only send the data and rely on the upper-layer protocols to handle error detection and to correct possible problems. Network Layer The Network Layer (Layer 3) is responsible for knowing the internetwork path (routing) from the sender device to the receiver device. It is also responsible for the logical addressing schemes (e.g., IP, IPX, and AppleTalk) that assign logical addresses to the network hosts on both sides of the communication path. The Network Layer sends datagrams (or packets), which contain a defined set of data that includes addressing and control information and is routed between the source and destination devices. If a datagram needs to be sent across a network that can handle only a certain amount of data at a time, the datagram can be fragmented into multiple packets and reassembled by the receiving device. If no fragmentation occurs, then a datagram is sent as a single packet. It is important to note that a datagram is a unit of data, while a packet is sent physically through the network. In addition to logical addressing schemes, the Network Layer is also responsible for router selection and packet forwarding, using the following types of protocols: ๏‚ท Routed protocols (IP, IPX/SPX, AppleTalk, and DECnet) ๏‚ท Routing protocols (RIP, EIGRP, OSPF, IS-IS, and BGP) Routed protocols are responsible for the actual rules and processes regarding the encapsulation of the data packets, and they are ultimately routed over the internetwork, whereas routing protocols actually move the routed protocol packets (Layer 3 data units) across the internetwork, from one router to another, using particular routing algorithms.
  • 5. Data Link Layer The Data Link Layer (Layer 2) defines the format of the data that is transmitted across the physical network. This layer has two sublayers: the LLC (Logical Link Control) Sublayer and the MAC (Media Access Control) Sublayer (Figure 1.2). LLC deals with the Network Layer while MAC has access to the Physical Layer (Layer 1). The LLC Sublayer (IEEE 802.2) allows multiple network Layer 3 protocols to communicate over the same physical link by allowing those protocols to be specified in the LLC fields. The MAC Sublayer (IEEE 802.3) specifies the physical MAC address that identifies a device on a network. Each frame sent over the wire contains a MAC address field, and only devices with a specific MAC address can process the frame. A source MAC address field is also included in the frame. The Data Link Layer is responsible for reliable transmission of data across a physical network link, using specifications that provide different network and protocol characteristics, which includes physical addressing, different network topologies, error notifications, frame (Layer 2 data units) sequences, and frame flow control. Layer 2 is concerned with a specific addressing structure, namely physical addressing, as opposed to the Layer 3 logical addressing scheme. Physical addressing generally comes in the form of MAC addresses that are burned onto a computer network interface card (NIC) or on the interfaces of network devices. Physical Layer The Physical Layer (Layer 1) lies at the bottom of the OSI protocol stack and it represents the actual physical medium on which the information is travelling between network devices. As mentioned, Layer 1 interconnects with the Data Link Layer through the Figure 1.2 โ€“ Data Link Sublayers
  • 6. MAC Sublayer, which controls the sending of the physical signals that encode 0 and 1 bits, or binary digits (e.g., electrical signals over a copper link). The following protocols operate at the Physical Layer: ๏‚ท Local Area Network (LAN) protocols (Ethernet, IEEE 802.3, 100Base-T, Token Ring/IEEE 802.5, and FDDI) ๏‚ท Wide Area Network (WAN) protocols (EIA/TIA-232, EIA/TIA-449, V.35, and EIA-530) Layer 1 defines physical media procedures, electrical and mechanical aspects, encoding, and modulation (voltage) on the line (i.e., the electrical signal is either a 0 or a 1, or is in a transition state), as well as activating, maintaining, and deactivating the actual physical link between multiple systems on LAN or WAN networks. Encapsulation In both LANs and WANs, packet transmission can be analyzed using the seven-layer OSI model. When data is transmitted by the source toward a specific destination, it passes through the Application, Presentation, and Session Layers and the protocol data unit arrives at the Transport Layer (Layer 4). At this layer, a 20-byte header is placed in front of the data. Regardless of whether the protocol is a reliable, connection-oriented protocol (TCP) or an unreliable, connectionless protocol (UDP), the data and the Layer 4 header, which together form a segment, is passed down to Layer 3, as illustrated in Figure 1.3 below: Figure 1.3 โ€“ Packet Encapsulation
  • 7. The Network Layer places its Layer 3 header in front of the received segment and this group becomes a packet (or a datagram). The Layer 3 header contains important fields, such as the logical address (IP address) of both the source and the destination device. The newly formed packet is then passed down to Layer 2. The Data Link Layer creates a new data unit, called a frame, by adding the Layer 2 frame header and trailer. The frame is then passed down to the Physical Layer, which converts the information into 0 and 1 bits that are sent over the physical media using electrical signals (i.e., on a copper link). Finally, the data is sent over the wire using a wide variety of methods, such as Ethernet or Token Ring. The headers and trailers are a specific form of control information that allows the data to go through the network properly. Thus, the data at each layer is encapsulated in the information appropriate for the specific layer, including addressing and error checking. A Protocol Data Unit (PDU) is a grouping of data used to exchange information at a particular OSI layer. The Layer 1 to Layer 4 PDU types, signifying the group of data and the specific headers and trailers, are summarized as follows: The overall size of the information increases as the data travels through the lower layers (from Layer 1 to Layer 4). The destination device receives the data, and this additional information is analyzed and is then removed as the data passes through the higher layers, up to the Application Layer, where the data is unwrapped (or decapsulated). In addition to the Layer 3 logical addressing fields in the header, an addressing structure is also applied in the Layer 2 header (i.e., the MAC address). Every network device has a physical address burned onto it, which is located in a special field in the Data Link Layer header. This address changes as the packet passes from one device to another (e.g., from the source PC to a switch to a router to another switch and, finally, to the destination PC). However, the original IP source and destination addresses do not change when transiting the network because the packet is stripped of its Layer 3 header only when it goes beyond a router. When it stays within the same LAN, it only passes through switches, which decapsulate it at the Layer 2 header containing the MAC address. As a result, the header changes as the packet is re-encapsulated, as does the MAC address fields. Because different protocols are available at each layer (e.g., IP packets are different from IPX packets), proper network operation requires that both the source and the receiver endpoints communicate using the same protocol. Layer PDU Name Layer 1 Bit Layer 2 Frame Layer 3 Packet (Datagram) Layer 4 Segment