0% found this document useful (0 votes)
8 views20 pages

OSI MODEL

The document discusses the OSI and TCP/IP reference models, highlighting the OSI model's relevance despite outdated protocols and the TCP/IP model's practical utility due to its widely used protocols. It details the seven layers of the OSI model, from the Physical Layer to the Application Layer, along with their functions and associated protocols. Additionally, it addresses the implications of layering in networking, including the potential for increased complexity and the distinction between connection-oriented and connectionless services.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views20 pages

OSI MODEL

The document discusses the OSI and TCP/IP reference models, highlighting the OSI model's relevance despite outdated protocols and the TCP/IP model's practical utility due to its widely used protocols. It details the seven layers of the OSI model, from the Physical Layer to the Application Layer, along with their functions and associated protocols. Additionally, it addresses the implications of layering in networking, including the potential for increased complexity and the distinction between connection-oriented and connectionless services.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

OSI Model

REFERENCE MODELS

We will discuss two important network architectures:


• the OSI reference model
• the TCP/IP reference model.

• Although the protocols associated with the OSI model are not
used any more, the model itself is actually quite general and
still valid, and the features discussed at each layer are still
very important.

• The TCP/IP model has the opposite properties: the model


itself is not of much use but the protocols are widely used.
The OSI Reference Model
7-Layer OSI Model
Layer 7 Application Layer • Layers 1-4 relate to
Layer 6 Presentation Layer communications technology.
• Layers 5-7 relate to user
Layer 5 Session Layer
applications.
Layer 4 Transport Layer

Layer 3 Network Layer

Layer 2 Data Link Layer

Layer 1 Physical Layer

Communications subnet boundary


Layer 7: Application

Layer
Level at which applications access network services.
• Represents services that directly support software applications
for file transfers, database access, and electronic mail etc.
• Examples of application layer protocols :
– Hypertext Transfer Protocol (HTTP),
– File Transfer Protocol (FTP),
– Post Office Protocol (POP): transferring messages from an e-mail server
to an e-mail client
– Simple Mail Transfer Protocol (SMTP) : This protocol is used by most
e-mail clients to deliver messages to the server, and is also used by servers to
forward messages to their final destination.
– Domain Name System (DNS): translates domain names to IP addresses so
browsers can load Internet resources.
Layer 6: Presentation

Layer
Related to representation of transmitted data: Translates
different data representations from the Application layer into
uniform standard format.
• Providing services for secure efficient data transmission like
data encryption and data compression.
• Presentation layer protocols include
– MIDI- used for digitized music
– MPEG- Moving Picture Experts Group-Video compression
– TDI- Transport Driver Interface
– TLS- serves encryption to higher layers
– XDR- transfers data between different computer architectures
– HTTP/HTML- determine how information on the world wide web is
transmitted and the format in which web pages are displayed
Layer 5: Session Layer
SERVICES-
• Authentication
• Authorization
• Session establish /restoration
 Allows two applications on different computers to establish,
use, and end a session.
 e.g. file transfer, remote login
 Establishes dialog control
 Regulates which side transmits, plus when and how long it
transmits.
 Performs token management and synchronization.
 Protocol example: PAP, PPTP, RPC, RTCP etc
Layer 4: Transport
• Layer
Manages transmission packets
– Repackages long messages when necessary into small
packets for transmission.(sending)
– Reassembles packets in correct order to get the original
message. (receiving)
• Handles error recognition and recovery.
– Transport layer at receiving acknowledges packet delivery.
– Request for missing packets. (receiving)
• Some Transport Layer Protocol-
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)
• Stream Control Transmission Protocol (SCTP)
• Datagram Congestion Control Protocol (DCCP)
• AppleTalk Transaction Protocol (ATP)
Layer 3: Network Layer
• Manages addressing/routing of data within the subnet
 Addresses messages and translates logical addresses and names into physical
addresses.
 Determines the route from the source to the destination computer
 Manages traffic problems, such as switching, routing, and congestion
controlling
• Routing can be:
• Based on static tables
• determined at start of each session
• Individually determined for each packet, reflecting the current network load.
• Protocol example:
• ICMP-Internet Control Message Protocol
• IGMP- Internet Group Management Protocol
• Ipsec- Internet Protocol Security
• IPv4/IPv6- Internet Protocol
Layer 2: Data Link
·
Layer
Packages raw bits from the Physical layer into frames
(logical, structured packets for data).
· Provides reliable transmission of frames
 It waits for an acknowledgment from the receiving
computer.
 Retransmits frames for which acknowledgement
not received
· Example:
· Point-to-Point Protocol(PPP)
· Link Layer Discovery Protocol(LLDP)
Layer 1: Physical Layer
• Transmits bits from one computer to another
• Regulates the transmission of a stream of bits over a
physical medium.
• Defines how the cable is attached to the network
adapter and what transmission technique is used to
send data over the cable. Deals with issues like
– The definition of 0 and 1, e.g. how many volts represents a
1, and how long a bit lasts?
– Whether the channel is simplex or duplex?
– How many pins a connector has, and what the function of
each pin is?
Introduction TCP/IP
• The Internet Protocol Suite (commonly
known as TCP/IP) is the set
of communications protocols used for
the Internet and other similar networks.
• It is named from two of the most important
protocols in it:
– the Transmission Control Protocol (TCP) and
– the Internet Protocol (IP), which were the first two
networking protocols defined in this standard.
TCP/IP Layers
OSI TCP/IP

Application Layer Application Layer


Presentation Layer
TELNET, FTP, SMTP, POP3,
SNMP, NNTP, DNS,NIS, NFS,
Session Layer HTTP, ...

Transport Layer
Transport Layer
TCP , UDP , ...
Network Layer
Internet Layer
IP , ICMP, ARP, RARP, ...
Data Link Layer
Link Layer
Physical Layer FDDI, Ethernet, ISDN, X.25,...
TCP/IP Stack
TCP/IP Encapsulation
TCP/IP - Some Protocol
Layer Protocol

DNS, TFTP, TLS/


SSL, FTP, Gopher, HTTP, IMAP, IRC, NNTP, POP3, SIP, SMTP, SMPP, SN
MP, SSH, Telnet, Echo, RMTP, PNRP, rlogin, ENRP
Application

Routing protocols like BGP and RIP which run over TCP/UDP, may also be
considered part of the Internet Layer.

Transport TCP, UDP, DCCP, SCTP, IL, RUDP, RSVP

IP (IPv4, IPv6), ICMP, IGMP, and ICMPv6

Internet
OSPF for IPv4 was initially considered IP layer protocol since it runs per IP-
subnet, but has been placed on the Link since RFC 2740.

Link ARP, RARP, OSPF (IPv4/IPv6), IS-IS, NDP


Internet Protocols vs
OSI
Application
• Explicit
Presentation and
Presentation Application session layers
Session missing in
Internet
Transport TCP
Protocols
IP •
Network Data Link and
Data Link Network Interface Network Layers
redesigned
Physical Hardware
Why Layering Considered Harmful?
• In the data networking context structured
layering implies that the functions of each
layer are carried out completely before the
protocol data unit is passed to the next
layer.
• This means that the optimization of each
layer has to be done separately.
• Such ordering constraints are in conflict
with efficient implementation of data
manipulation functions.
Why Layering Considered Harmful?
• As a result of inter-layer dependencies,
increased layering can quickly lead to violation
of the Simplicity Principle.
• Industry experience has taught us that
increased layering frequently increases
complexity and hence leads to increases in
OPEX(Operating Expense), as is predicted by
the Simplicity Principle.
• It is always possible to agglutinate multiple
separate problems into a single complex
interdependent solution. In most cases this is a
bad idea.
Connections
• Layers can offer connection-oriented or
connectionless services.
• Connection-oriented like telephone system.
• Connectionless like postal system.
• Each service has an associated Quality-of-
service (e.g. reliable or unreliable).
Reliability
• Reliable services never lose/corrupt data.
• Reliable service costs more.
• Typical application for reliable service is file
transfer.
• Typical application not needing reliable service
is voice traffic.
• Not all applications need connections.

You might also like