Osi Model
Osi Model
The OSI model provides a standardized framework for communication between network devices,
allowing for interoperability, flexibility, and scalability in network design and implementation. The
OSI model is widely used in the development and implementation of network protocols, and it is a
useful tool for understanding how network protocols work and for troubleshooting network
communication issues.
Following are the reasons, why OSI developed:
Standardization: The OSI model was created to provide a standard framework for network
communication that could be used globally. By providing a common language and framework, the
OSI model allows for interoperability, flexibility, and scalability in network design and
implementation.
Modularity: The OSI model is designed to be modular, meaning that changes can be made to one
layer without affecting the other layers. This allows for easier development, maintenance, and
troubleshooting of network protocols.
Layered approach: The OSI model is composed of seven layers, each with a specific set of functions
and services. This layering provides a hierarchical approach to network design and allows for efficient
and effective communication between network devices.
Independence: The OSI model is designed to be independent of any specific hardware or software,
which means that it can be implemented on any type of computer or network device. This allows for
greater flexibility and interoperability in network design.
Encapsulation: The OSI model uses encapsulation to provide addressing, error detection, and control
information for each layer. This encapsulation allows for data to be transmitted from one layer to
another in a standardized format.
The OSI (Open Systems Interconnection) model was developed by the International Organization for
Standardization (ISO) in the late 1970s and early 1980s. The goal of the OSI model was to create a
standard framework for network communication that could be used globally. Prior to the development
of the OSI model, there were a variety of different networking protocols being used, each with its own
unique characteristics and limitations.
The OSI model was created by a group of networking experts from around the world who were
brought together by the ISO to develop a standard framework for network communication. The group
was led by a Belgian computer scientist named Louis Pouzin, who had previously worked on the
development of the Cyclades network in France.
The OSI model was based on a number of existing networking models, including the ARPANET
reference model developed by the U.S. Department of Defense and the SNA (Systems Network
Architecture) developed by IBM. The OSI model was designed to be a layered architecture, with each
layer providing a specific set of functions and services necessary for communication between
networked devices.
The OSI model was first published as an ISO standard in 1984, and it quickly became a widely
accepted standard for network communication. However, despite its popularity, the OSI model was
not adopted by many network vendors, who continued to develop and implement their own
proprietary networking protocols. As a result, the OSI model was never fully implemented as a global
standard, but it did provide a valuable framework for the development of modern networking
protocols, including TCP/IP, which is the most widely used protocol for internet communication
today.
These layers provide a framework for understanding and designing computer networks, with each
layer responsible for specific functions and services necessary for communication between networked
devices. Following are the 7 layers of OSI model
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
PHYSICAL LAYER
The Physical Layer is the first and lowest layer of the OSI (Open Systems Interconnection) model. It
is responsible for the physical aspects of communication, such as transmitting raw data over a
physical medium. The physical layer defines the physical media and signaling methods used to
transmit data over the network, such as cables, connectors, and electromagnetic waves.
The Physical Layer is responsible for transmitting a stream of bits over a communication channel.
This includes encoding and decoding the data, as well as defining the physical characteristics of the
transmission medium. The physical layer specifies the physical connection between the transmitting
and receiving devices, including the pin assignments of connectors, the voltage levels used, and the
transmission rate.
The main function of the Physical Layer is to transmit a bit stream across a communication channel
without error. It accomplishes this by encoding the data into signals that can be transmitted over the
physical medium. The physical layer also provides basic error detection mechanisms, such as parity
checks and checksums, to ensure that the data is transmitted accurately.
The Data Link Layer is the second layer of the OSI (Open Systems Interconnection) model. It is
responsible for providing reliable communication between two devices over a physical link by
dividing data into frames and adding error detection and correction codes. The data link layer also
manages access to the physical media and controls the flow of data between devices.
The main functions of the Data Link Layer include:
Framing: The Data Link Layer divides data into frames, with each frame containing a header,
payload, and trailer. The header and trailer contain control information that allows the receiving
device to detect errors and reassemble the frames in the correct order.
Error Detection and Correction: The Data Link Layer provides error detection and correction
mechanisms, such as cyclic redundancy checks (CRC), to ensure that the data is transmitted
accurately.
Flow Control: The Data Link Layer manages the flow of data between devices to prevent buffer
overflow or underflow. It uses various flow control mechanisms, such as windowing, to regulate the
flow of data.
Access Control: The Data Link Layer manages access to the physical media, ensuring that only one
device can transmit at a time. It uses various access control mechanisms, such as Carrier Sense
Multiple Access with Collision Detection (CSMA/CD), to manage access to the media.
NETWORK LAYER
The Network Layer is the third layer of the OSI (Open Systems Interconnection) model. It is
responsible for providing routing and addressing services to enable communication between different
networks. The Network Layer operates at the network level and provides logical addressing to
identify devices on the network.
The main functions of the Network Layer include:
Routing: The Network Layer provides routing services to enable communication between devices on
different networks. It determines the most efficient path for data to travel between the source and
destination devices.
Addressing: The Network Layer provides logical addressing to identify devices on the network. It
assigns unique addresses to each device, which are used to route data to the correct destination.
Fragmentation and Reassembly: The Network Layer is responsible for fragmenting data packets
into smaller units that can be transmitted over the network. It also reassembles the packets at the
receiving end to ensure that the data is transmitted accurately.
TRANSPORT LAYER
The Transport Layer is the fourth layer of the OSI (Open Systems Interconnection) model. It is
responsible for providing reliable, end-to-end communication between devices by breaking data into
segments and reassembling them at the receiving end. The Transport Layer operates at the host level
and provides transparent transport of data between applications on different devices.
The main functions of the Transport Layer include:
Segmentation and Reassembly: The Transport Layer breaks data into smaller segments that can be
transmitted over the network. It also reassembles the segments at the receiving end to ensure that the
data is transmitted accurately.
Flow Control: The Transport Layer manages the flow of data between devices to prevent buffer
overflow or underflow. It uses various flow control mechanisms, such as windowing, to regulate the
flow of data.
Error Detection and Recovery: The Transport Layer provides error detection and recovery
mechanisms, such as checksums and acknowledgments, to ensure that the data is transmitted
accurately.
Multiplexing and Demultiplexing: The Transport Layer allows multiple applications to use the same
network connection by multiplexing data from different applications into a single stream. It also
demultiplexes the data at the receiving end to ensure that it is delivered to the correct application.
SESSION LAYER
The Session Layer is the fifth layer of the OSI (Open Systems Interconnection) model. It is
responsible for establishing, maintaining, and terminating sessions between applications running on
different devices. The Session Layer operates at the host level and provides services to support
communication between applications.
The main functions of the Session Layer include:
Session Establishment: The Session Layer establishes and manages sessions between applications
running on different devices. It sets up the communication channel, authenticates the users, and
negotiates the parameters of the session.
Session Maintenance: The Session Layer manages the session between applications, ensuring that it
remains active and that data is transmitted accurately.
Session Termination: The Session Layer terminates the session between applications, releasing the
resources used by the session and freeing up the communication channel.
PRESENTATION LAYER
The Presentation Layer is the sixth layer of the OSI (Open Systems Interconnection) model. It is
responsible for data representation and encryption/decryption to ensure that data is presented in a
format that can be understood by the receiving device. The Presentation Layer operates at the host
level and provides services to enable applications to interpret and manipulate the data.
The main functions of the Presentation Layer include:
Data Translation: The Presentation Layer translates data between different formats, such as ASCII,
EBCDIC, and Unicode, to ensure that the data is presented in a format that can be understood by the
receiving device.
Data Compression: The Presentation Layer compresses data to optimize data transmission over the
network.
Data Encryption and Decryption: The Presentation Layer encrypts data to ensure that it is
transmitted securely over the network. It also decrypts data at the receiving end to enable the
receiving device to interpret the data.
APPLICATION LAYER
The Application Layer is the seventh and highest layer of the OSI (Open Systems Interconnection)
model. It is responsible for providing access to network services for applications and end-users. The
Application Layer operates at the user level and provides a variety of services to support
communication between applications.
The main functions of the Application Layer include:
Network Services: The Application Layer provides access to network services such as email, file
transfer, and remote login. It uses various protocols, such as the Simple Mail Transfer Protocol
(SMTP), the File Transfer Protocol (FTP), and the Telnet protocol, to enable communication between
applications.
User Services: The Application Layer provides user services such as database access, distributed file
systems, and remote procedure calls. These services enable applications to access data and services on
remote systems.
Interface Services: The Application Layer provides interface services to enable applications to
communicate with the lower layers of the OSI model. It provides services such as remote procedure
calls and message handling to enable applications to communicate with other applications on the
network.
The interaction between the layers of the OSI model is based on a set of protocols and procedures that
allow the layers to work together to provide end-to-end communication between devices. Each layer
interacts with the layers above and below it to provide a complete communication service.
The interaction between the layers can be described as follows:
Communication Services: Each layer provides a specific set of services to the layers above it.
For example, the Physical Layer provides raw data transmission services to the Data Link Layer,
while the Data Link Layer provides reliable communication services to the Network Layer.
Protocol Data Units (PDUs): The communication between the layers is based on a set of PDUs
that are passed between the layers. Each layer adds its own header and/or trailer to the PDU to
create a new PDU that is passed to the next layer.
Encapsulation and Decapsulation: Each layer encapsulates the PDU from the layer above it into
a new PDU that includes its own header and/or trailer. This process is called encapsulation. When
the PDU is received by the destination device, each layer removes its own header and/or trailer in
a process called decapsulation.
Service Access Points (SAPs): SAPs are points of access to the services provided by each layer.
Each layer has two SAPs, one for communication with the layer above it and one for
communication with the layer below it.
Layer Services: Each layer provides a specific set of services to the layer above it. These services
include addressing and routing at the Network Layer, error detection and correction at the Data
Link Layer, and flow control and segmentation at the Transport Layer.
The OSI (Open Systems Interconnection) model is a conceptual model that describes the
communication functions of a computer or telecommunication system. The OSI model is composed of
seven layers, each with a specific set of functions and services. Each layer uses a set of protocols to
provide the necessary services and functions for communication between devices on a network. The
protocols supported at various levels are:
1. Physical Layer: The Physical Layer uses protocols such as RS-232, Ethernet, Wi-Fi,
Bluetooth, and USB to transmit raw data over the network. These protocols define the
physical media and signalling methods used to transmit data.
2. Data Link Layer: The Data Link Layer uses protocols such as Ethernet, Point-to-Point
Protocol (PPP), High-Level Data Link Control (HDLC), and Asynchronous Transfer Mode
(ATM) to provide reliable communication between devices over a physical link. These
protocols divide data into frames and add error detection and correction codes.
3. Network Layer: The Network Layer uses protocols such as the Internet Protocol (IP),
Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP), and Open
Shortest Path First (OSPF) to provide routing and addressing services. These protocols
determine the most efficient path for data to travel between devices and assign unique
addresses to each device.
4. Transport Layer: The Transport Layer uses protocols such as Transmission Control Protocol
(TCP), User Datagram Protocol (UDP), Stream Control Transmission Protocol (SCTP), and
Datagram Congestion Control Protocol (DCCP) to provide reliable, end-to-end
communication between devices. These protocols break data into segments and reassemble
them at the receiving end.
5. Session Layer: The Session Layer uses protocols such as Remote Procedure Call (RPC) and
Network Basic Input/Output System (NetBIOS) to manage sessions between applications
running on different devices. These protocols establish, maintain, and terminate sessions
between applications.
6. Presentation Layer: The Presentation Layer uses protocols such as Secure Sockets Layer
(SSL), Transport Layer Security (TLS), and Simple Network Management Protocol (SNMP)
to provide data representation and encryption/decryption services. These protocols ensure that
data is presented in a format that can be understood by the receiving device and transmitted
securely over the network.
7. Application Layer: The Application Layer uses protocols such as Simple Mail Transfer
Protocol (SMTP), File Transfer Protocol (FTP), Hypertext Transfer Protocol (HTTP), and
Domain Name System (DNS) to provide access to network services for applications and end-
users. These protocols enable communication between different types of applications and
provide access to network services such as email, web browsing, and remote login.
The OSI (Open Systems Interconnection) model is a conceptual model that describes the
communication functions of a computer or telecommunication system. The OSI model has several
advantages, including:
Standardization: The OSI model provides a standardized framework for communication between
networked devices. This allows devices from different vendors and manufacturers to communicate
with each other, as long as they adhere to the same set of standards and protocols.
Modular Design: The OSI model is designed as a series of independent layers, each with its own set
of functions and services. This modular design makes it easier to develop, test, and maintain network
protocols and applications.
Interoperability: The standardized protocols used in the OSI model enable devices from different
vendors and manufacturers to communicate with each other, regardless of the specific technology
used. This promotes interoperability between devices and reduces the need for proprietary solutions
Fault Isolation: The layered design of the OSI model makes it easier to isolate and diagnose faults in
the network. If a problem occurs in one layer, it can be isolated and resolved without affecting the
other layers of the network.
Flexibility: The OSI model is flexible and can be adapted to different network architectures and
technologies. It can be used with different types of physical media, such as copper, fiber optic, and
wireless.
Scalability: The modular design of the OSI model makes it easy to add new services and functions as
the network grows and evolves. This makes it a scalable solution for networks of all sizes.
Although the OSI (Open Systems Interconnection) model has several advantages, it also has some
disadvantages. These disadvantages include:
Complex: The OSI model is a complex model with seven layers and a large number of protocols. It
can be difficult to understand and implement, especially for non-technical users.
Expensive: Implementing the OSI model can be expensive, especially for small or medium-sized
organizations. It requires specialized hardware and software, and can be time-consuming to
implement and maintain.
Inefficient: The layered design of the OSI model can lead to inefficiencies in the network. Each layer
adds overhead, which can result in slower communication speeds and increased latency.
Not always compatible with existing technologies: The OSI model is not always compatible with
existing technologies, such as legacy systems or proprietary solutions. This can make it difficult to
integrate new devices into existing networks.
Limited applicability: The OSI model was designed for use in computer and telecommunication
systems, and may not be applicable to other types of systems. This can limit its usefulness in certain
industries or applications.
Lack of vendor support: While the OSI model is a standard, it may not be fully supported by all
vendors. This can lead to compatibility issues and may limit the ability to integrate devices from
different vendors.
Diagram