In this article, we are going to learn about the OSI reference model, different characteristics, and functions of each layer of the OSI model.
The main objective of this article is to know about:
- Concept of data encapsulation
- Characteristics of the OSI Layers
- OSI Model and Communication Between Systems
- OSI layers
Introduction of OSI reference Model
- The International Organization introduced the OSI layer for Standardization (ISO) in 1984 to provide a reference model to ensure products of different vendors would interoperate in networks. OSI is short for Open System Interconnection.
- The OSI layer shows WHAT needs to be done to send data from an application on one computer, through a network, to an application on another computer, not HOW it should be done. A layer in the OSI model communicates with three other layers: the layer above it, the layer below it, and the same layer at its communication partner. Data transmitted between software programs pass all 7 OSI layers.
- The Application, Presentation, and Session layers are also known as the Upper Layers. The Data Link and Physical layers are often implemented together to define LAN and WAN specifications.
- Before knowing the OSI reference model and its layers we will learn about Data Encapsulation. We will know the definition of it and then we will see how Data Encapsulation works in the OSI reference model.
- Data Encapsulation is the process of adding a header to wrap the data that flows down the OSI model. Each OSI layer may add its own header to the data received from above. (from the layer above or from the software program ‘above’ the Application layer.)
- There are five steps of Data Encapsulation:
- The Application, Presentation, and Session layers create DATA from users’ input.
- The Transport layer converts the DATA into SEGMENTS
- The Network layer converts the SEGMENTS to PACKETS (or datagrams)
- The Data Link layer converts the PACKETS to FRAMES
- The Physical layer converts the FRAMES to BITS.
- At the sending computer, the information goes from top to bottom while each layer divides the information received from the upper layers into smaller pieces and adds a header.
- At the receiving computer, the information flows up the model discarding the corresponding header at each layer and putting the pieces back together.
- The Figure shows a layered model of two directly interconnected end systems. The transmission media is not included in the seven layers and, therefore, it can be regarded as layer number zero. Functions and services of various layers are described
Characteristics of the OSI Reference Model Layers
The seven layers of the OSI reference model can be divided into two categories:
- upper layers
- lower layers.
- Upper Layers: The upper layers of the OSI model deal with application issues and generally are implemented only in software. The highest layer, the application layer, is closest to the end user. Both users and application layer processes interact with software applications that contain a communications component. The term upper layer is sometimes used to refer to any layer above another layer in the OSI model.
- Lower Layers: The lower layers of the OSI model handle data transport issues. The physical layer and the data link layer are implemented in hardware and software. The lowest layer, the physical layer, is closest to the physical network medium (the network cabling, for example) and is responsible for actually placing information on the medium.
Protocols Used in OSI reference Model
- The OSI model provides a conceptual framework for communication between computers, but the model itself is not a method of communication. Actual communication is made possible by using communication protocols. In the context of data networking, a protocol is a formal set of rules and conventions that governs how computers exchange information over a network medium. A protocol implements the functions of one or more of the OSI layers. A wide variety of communication protocols exist. Some of these include:
- LAN protocols operate at the physical and data link layers of the OSI model and define communication over the various LAN media.
- WAN protocols operate at the lowest three layers of the OSI model and define communication over the various wide-area media.
- Routing protocols are network layer protocols that are responsible for exchanging information between routers so that the routers can select the proper path for network traffic.
- Network protocols are the various upper-layer protocols that exist in a given protocol suite. Many protocols rely on others for operation.
- For example, many routing protocols use network protocols to exchange information between routers. This concept of building upon the layers already in existence is the foundation of the OSI model.
OSI Model & Communication Between Systems
- Information being transferred from a software application in one computer system to a software application in another must pass through the OSI layers. For example, if a software application in System A has information to transmit to a software application in System B.
- The application program in System A will pass its information to the application layer (Layer 7) of System A. The application layer then passes the information to the presentation layer (Layer 6), which relays the data to the session layer (Layer 5), and so on down to the physical layer (Layer 1). At the physical layer, the information is placed on the physical network medium and is sent across the medium to System B. The physical layer of System B removes the information from the physical medium, and then its physical layer passes the information up to the data link layer (Layer 2), which passes it to the network layer (Layer 3), and so on, until it reaches the application layer (Layer 7) of System B. Finally, the application layer of System B passes the information to the recipient application program to complete the communication process.
- A given layer in the OSI model generally communicates with three other OSI layers: the layer directly above it, the layer directly below it, and its peer layer in other networked computer systems. The data link layer in System A, for example, communicates with the network layer of System A, the physical layer of System A, and the data link layer in System B. Figure below illustrates this example.
Interaction between OSI model layers
- One OSI layer communicates with another layer to make use of the services provided by the second layer. The services provided by adjacent layers help a given OSI layer communicate with its peer layer in other computer systems. Three basic elements are involved in layer services: the service user, the service provider, and the service access point (SAP).
- In this context, the service user is the OSI layer that requests services from an adjacent OSI layer. The service provider is the OSI layer that provides services to service users. OSI layers can provide services to multiple service users. The SAP is a conceptual location at which one OSI layer can request the services of another OSI layer.
Application Layer (Layer 7)
- The application layer provides network services directly to applications. The type of software programs varies a lot: from groupware and web browser to Tactical Ops (video game). Software programs themselves are not part of the OSI model. It determines the identity and availability of communication partners and determines if sufficient resources are available to start program-to-program communication. This layer is closest to the user. Gateways operate at this layer.
- Following are the examples of Application layer protocols:
|1. Telnet||2. SMTP||3. FTP|
|4. SNMP||5. NCP||6. SMP|
Presentation Layer (Layer 6)
- The presentation layer defines coding and conversion functions. It ensures that information sent from the application layer of one system is readable by the application layer of another system. It includes common data representation formats, conversion of character representation formats, common data compression schemes, and common data encryption schemes, common examples of these formats and schemes are:
|1. MPEG, QuickTime||2. ASCII, EBCDIC||3. GIF, TIFF, JPEG|
- Gateways operate at this layer. It transmits data to lower layers.
Session Layer (Layer 5)
- The session layer establishes, manages, maintains, and terminates communication channels between software programs on network nodes. It provides error reporting for the Application and Presentation layer. Examples of Session layer protocols are:
|1. NFS||2. SQL||3. RPC||4. Zone Information Protocol (ZIP)|
- Gateways operate at this layer. It transmits data to lower layers.
Transport Layer (Layer 4)
The main purpose of these layers is to make sure that the data is delivered error-free and in the correct sequence. It establishes, maintains, and terminates virtual circuits. It provides error detection and recovery. It is concerned with reliable and unreliable transport. When using a connection-oriented, reliable transport protocol, such as TCP, acknowledgments are sent back to the sender to confirm that the data has been received. It provides Flow Control and Windowing. It provides multiplexing; the support of different flows of data to different applications on the same host. Examples of Transport layer protocols are:
|1. TCP (connection-oriented, reliable, provides guaranteed delivery.)||2. UDP (connectionless, unreliable, less overhead, reliability can be provided by the Application layer)||3. SPX|
Gateways operate at this layer. It transmits data to lower layers.
Network Layer (Layer 3)
This layer defines logical addressing for nodes and networks/segments. It enables internetworking, passing data from one network to another. It defines the logical network layout so routers can determine how to forward packets through the internetwork. Routing occurs at this layer, hence Routed and Routing protocols reside on this layer. Routed protocols are used to encapsulate data into packets. The header added by the Network layer contains a network address so it can be routed through the internetwork. Examples of Network layer Routed protocols are:
|1. IP||2. IPX||3. AppleTalk|
Routing protocols are used to create routing tables; routing tables are used to determine the best path/route. Routing protocols provide periodic communication between routers in an Internet work to maintain information on network links in a routing table. It transmits Packets. Routers operate at this layer. Examples of Network layer Routing protocols are:
|1. OSPF||2. IGRP/EIGRP||3. RIP||4. BGP||5. NLSP|
Data Link Layer (Layer 2)
It defines psychical addressing, and network topology, and is also concerned with error notification, sequencing of frames, and flow control. Examples of network topologies are:
Physical addresses are also known as hardware and BIA’s (Burned In Addresses) but are most commonly as MAC addresses. Examples of Data Link LAN specifications are:
|1. Ethernet||2. Fast Ethernet||3. Token Ring||4. FDDI|
Examples of Data Link WAN specifications are:
|Frame Relay (operates also on the Physical layer)||PPP (operates also on the Physical layer)||X.25 (operates also on the Physical and Network layer)|
Data Link layer Transmits Frames. Bridges and Switches operate at this layer. The Data Link layer consists of two sub-layers:
- LCC (Logical Link Control) Layer: Manages communication between devices over a single link of a network. Enables multiple higher-layer protocols to share a single physical data link.
- MAC Layer: Manages protocol access to the physical network medium and determines hardware addresses.
Physical Layer (Layer 1)
The physical layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between communicating network systems. It transmits and receives bits (bit stream) to transmission media. Physical layer specifications define characteristics such as:
|Voltage levels||Timing of voltage changes||Physical data rates||Maximum transmission distances||Physical connectors|
physical layer implementations can be categorized as either LAN or WAN specifications. The examples of LAN and WAN specifications are given below:
|1. Ethernet||2. Fast Ethernet||3. Token Ring||3. FDDI|
WAN specifications are:
|1. HSSI||2. V.24||3. V.35|
|4. BRI||5. SLIP||6. RS-232|
The core of this standard is the OSI Reference Model, a set of seven layers that define the different stages that data must go through to travel from one device to another over a network.
The core of this standard is the OSI Reference Model, a set of seven layers that define the different stages that data must go through to travel from one device to another over a network. Think of the layers as the assembly line in the computer. At each layer, certain things happen to the data that prepare it for the next layer. The seven layers, which separate into two sets, are:
- Layer 7: Application – This is the layer that actually interacts with the operating system or application whenever the user chooses to transfer files, read messages or perform other network-related activities.
- Layer 6: Presentation – Takes the data provided by the Application layer and converts it into a standard format that the other layers can understand.
- Layer 5: Session – Establishes, maintains, and ends communication with the receiving device.
- Layer 4: Transport – This layer maintains flow control of data and provides for error checking and recovery of data between the devices. Flow control means that the Transport layer looks to see if data is coming from more than one application and integrates each application’s data into a single stream for the physical network.
- Layer 3: Network – The way that the data will be sent to the recipient device is determined in this layer. Logical protocols, routing, and addressing are handled here.
- Layer 2: Data – In this layer, the appropriate physical protocol is assigned to the data. Also, the type of network and packet sequencing is defined.
- Layer 1: Physical – This is the level of the actual hardware. It defines the physical characteristics of the network such as connections, voltage levels, and timing