OSI Model: Upper Layers
OSI Model: Upper Layers
OSI Model: Upper Layers
It was created by the International Standards Organization (ISO). The model is called the ISO OSI (Open Systems Interconnection) Reference Model because it deals with connecting open systems that is, systems that are open for communication with other systems. It breaks network functions into seven layers. It illustrates how each layer provides specific services and shares with the layers above and below. The flow between layers goes down when data is sent and up when data is received. The function that each layer performs is to add or remove network information on a packet. As a message sent by the top layer is passed on to the next lower layer until the most bottom layer. At each level a header may be prepended to the message. Some layers add both a header and a trailer. The lowest layer transmits the message over the network to the receiving machine. It communicates with the most bottom layer of the receiver. Each layer then strips the header (trailer), handles the message using the protocol provided by the layer and passes it on to the next higher layer. Finally to the highest layer in the receiver. Upper Layers Layers 7 through 4 comprise the upper layers of the OSI protocol stack. They are more geared to the type of application than the lower layers, which are designed to move packets, no matter what they contain, from one place to another. Application Layer 7 The Application layer provides for communication between software applications and lower layer network services. Application layer protocols include formatting, procedural, security, and synchronization. HTTP (HyperText Transfer Protocol), telnet, ftp, and mail (pop3 and smtp) are examples of protocols that run in the Application layer. In other words, the Application layer provides the interface between software applications and the network for interpreting applications' requests and requirements
the application layer makes network services available to applications (i.e. programs) It also hides all other layers from programmers, and makes using a network application transparent to the user This top layer defines the language and syntax that programs use to communicate with other programs. The application layer represents the purpose of communicating in the first place. For example, a program in a client workstation uses commands to request data from a program in the server. Common functions at this layer are opening, closing, reading and writing files, transferring files and e-mail messages, executing remote jobs and obtaining directory information about network resources. Presentation Layer 6 The presentation layer is concerned with the syntax and semantics of the information transmitted. Presentation layer protocols take data from the Application Layer and format it for software applications running on the same, or other, kind of host. When data are transmitted between different types of computer systems, the presentation layer negotiates and manages the way data are represented and encoded. For example, it provides a common denominator between ASCII and EBCDIC machines as well as between different floating point and binary formats. This layer serves as a translator, ensuring that data formats are respected. For example, graphic files formats, (de)compresion, and encoding and decoding are handled at this layer. The Presentation layer also handles data encryption and decryption protocols, for passwords, etcetera. In other words, the Presentation layer allows hosts and applications to use a common language; performs data formatting, encryption, and compresion. Sun's XDR and OSI's ASN.1 are two protocols used for this purpose. Session Layer 5 The session layer allows users on different machines to establish sessions between them. A session allows ordinary data transport, as does the transport layer, but it also provides enhanced services useful in some applications. A session might be used to allow a user to log into a remote timesharing system or to transfer a file between two machines. One of the services of the session layer is to manage dialogue control The Session layer protocols co-ordinate and maintain communication between two nodes on the network.
There can be multiple software applications, and multiple sessions running on any given node. The Session layer maintains the logical link between communicating node 'sessions'. These protocols are responsible for establishing and terminating the communications link, synchronizing the dialogue between the two nodes, and controlling the nodes' transmission periods. Session layer protocols also monitor session node IDs and enforce authorization for session access. In other words, the Session layer Establishes, maintains, and terminates user, or Presentation Layer connections. Provides coordination of the communications in an orderly manner. It determines one-way or two-way communications and manages the dialog between both parties; for example, making sure that the previous request has been fulfilled before the next one is sent. It also marks significant parts of the transmitted data with checkpoints to allow for fast recovery in the event of a connection failure. In practice, this layer is often not used or services within this layer are sometimes incorporated into the transport layer. Transport Layer 4 The basic function of the transport layer is to accept data from the session layer, split it up into smaller units if need be, pass these to the network layer, and ensure that the pieces all arrive correctly at the other end. Furthermore, all this must be done efficiently, and in a way that isolates the upper layers from the inevitable changes in the hardware technology. The Transport layer protocols take care of end-to-end delivery of data. This layer is responsible for reliable transfer of data between two points. This layer handles flow control, and data integrity, using checksums, and acknowledgements. These protocols are called connection-oriented protocols. TCP is an example of a Transport layer protocol. Some Transport layer protocols do not bother with data reliability. These are called connectionless protocols. Transport layer protocols also manage segmentation of data to optimize the data packet transfers over a connection. Some Transport layer protocols may use packet sequence numbers to enable more efficient transfer of segmented data streams. (This may include error correction schemes.)
This layer is responsible for overall end-to-end validity and integrity of the transmission. The lower layers may drop packets, but the transport layer performs a sequence check on the data and ensures that if a 12MB file is sent, the full 12MB is received. "OSI transport services" include layers 1 through 4, collectively responsible for delivering a complete message or file from sending to receiving station without error. In other words, the Transport layer ensures accurate delivery of data through flow control, segmentation and reassembly, error correction, and acknowledgement
Lower Layers Layers 3 through 1 are responsible for moving packets from the sending station to the receiving station. Network Layer 3 network layer determines how packets are routed from source to destination. The Network layer protocols take care of network address translation, and routing. Network layer protocols accept Transport Layer data segments and add logical addressing information, in a network header. This layer is also responsible for assigning priorities for network data packets to accomodate audio or video streaming, compared to, say e-mail messages. This layer also manages routing to account for network traffic congestion, quality of service, or traffic route cost factors. IP (Internet Protocols) are an example of Network layer protocols. Fragmentation, similar to segmentation at the Transport Layer can be performed at this layer. Packet size variation for optimal throuhput is normally, and preferably, managed with segmentation at the Transport Layer but Network layer protocols can perform similar optimization with Fragmentation methods. In other words, the Network layer establishes network connections, translates network addresses into their physical counterparts, and determines routing. The network layer establishes the route between the sender and receiver across switching points, which are typically routers Data Link Layer 2 The main task of the data link layer is to take a raw transmission facility and transform it into a line that appears free of undetected transmission errors to the network layer.
It accomplishes this task by having the sender break the input data up into data frames (typically a few hundred or a few thousand bytes), transmit the frames sequentially, and process the acknowledgment frames sent back by the receiver. The Data Link layer divides data, received from the Network Layer into frames that are transmitted through the Physical Layer. The Data Link layer defines the access strategy for sharing the physical medium, including data link and media access issues. Protocols such as PPP, SLIP and HDLC operate in this layer. Devices which operate at this level include bridges and switches. The Data Link layer is actually comprised of two sublayers:Upper LLC (Logical Link Control) sublayer Lower MAC (Media Access Control) sublayer In other words, the Data Link layer packages the data into frames, appropriate for the network transmission being used The data link is responsible for node to node validity and integrity of the transmission. Physical Layer 1 The Physical Layer defines the physical and electrical characteristics of the network. The physical layer is concerned with transmitting raw bits over a communication channel. The design issues have to with making sure that when one side send a 1 bit, it is received by the other side as a 1 bit, not as a 0 bit. The physical layer is responsible for passing bits onto and receiving them from the connecting medium. This layer has no understanding of the meaning of the bits, but deals with the electrical and mechanical characteristics of the signals and signaling methods. For example, it comprises the RTS and CTS signals in an RS-232 environment, as well as TDM and FDM techniques for multiplexing data on a line. SONET also provides layer 1 capability. Protocols at this layer move data between the Data Link layer and the network comunication hardware e.g. cable, radio, fibre-optic equipment. NIC (Network Interface cards) and the interface in routers, hubs, switches, and repeaters all run at this level. In other words, the Physical layer manages the signalling over the transmission medium (wire, radio, of fibre-optic, etc.) for the network connection.
7. Application Layer NNTP SIP SSI DNS FTP Gopher HTTP NFS NTP SMPP SMTP SNMP Telnet (more) 6. Presentation Layer MIME XDR 5. Session Layer Named Pipes NetBIOS SAP
3. Network Layer IP ICMP IPsec IGMP IPX AppleTalk 2. Data Link Layer ARP CSLIP SLIP Ethernet Frame relay ITU-T G.hn DLL L2TP PPP 1. Physical Layer RS232 V.35 V.34 I.430 I.431T1 E1POTS SONET /SDH OTN DSL 802.11a/b/g/n PHY ITU-T
The Network Layer adds logical addressing information, at which point the PDU becomes a Packet, which is passed on to ... The Data Link Layer adds a header and trailer, containing data for error checking, to the packet to make a frame, and passes the modified PDU on to ... The Physical Layer) does not add anything to the frame but takes care of the actual transmission (and reception) thereof. The process is then reversed at the receiving end.
Connection Oriented: A type of transport layer protocol that requires a verified session (a connection established at the Session layer), And guarantees data delivery. Connectionless: A type of transport layer protocol that does not require a verified session, and does not guarantee delivery. Segmentation: The process of decreasing the size of data units, when moving data from a network that can handle larger data units to a network that can only handle smaller data units .
PROTOCOLS Protocols are rules for communication. A combination of protocols is called a protocol stack or protocol suite. A connectionless protocol assumes that packets will arrive. A connection-oriented protocol establishes a link between devices.
o o o o o
TCP/IP - Internet's protocol IPX - Novell LAN Netbeui - Microsoft LAN Appletalk - Apple LAN DECnet - DEC (Compaq)
application: supporting network applications FTP, SMTP, HTTP# transport: host-host data transfer TCP, UDP network: routing of datagrams from source to destination IP, routing protocols link: data transfer between neighboring network elements PPP, Ethernet physical: bits on the wire (signaling)
Network Layer
DHCP DVMRP
ICMP/ICMPv6 IGMP IP IPv6 MARS PIM RIP2 RIPng for IPv6 RSVP VRRP
Internet Control Message Protocol Internet Group Management Protocol Internet Protocol version 4 Internet Protocol version 6 Multicast Address Resolution Server Protocol Independent Multicast-Sparse Mode (PIM-SM) Routing Information Protocol Routing Information Protocol for IPv6 Resource ReSerVation setup Protocol Virtual Router Redundancy Protocol
Transport Layer
ISTP Mobile IP RUDP TALI TCP UDP Van Jacobson XOT
Mobile IP Protocol Reliable UDP Transport Adapter Layer Interface Transmission Control Protocol User Datagram Protocol compressed TCP X.25 over TCP Border Gateway Multicast Protocol Distributed Interactive Simulation Domain Name Service Internet Security Association and Key Management Protocol and Internet Key Exchange Protocol Small Computer Systems Interface Lightweight Directory Access Protocol Multicast-Scope Zone Announcement Protocol NetBIOS/IP for TCP/IP Environment
Session Layer
BGMP Diameter DIS DNS ISAKMP/IKE iSCSI LDAP MZAP NetBIOS/IP
Application Layer
COPS FANP Finger FTP HTTP IMAP4 IMPPpre/IMPPmes IPDC IRC ISAKMP ISP NTP POP3 Radius RLOGIN
Common Open Policy Service Flow Attribute Notification Protocol User Information Protocol File Transfer Protocol Hypertext Transfer Protocol Internet Message Access Protocol rev 4 Instant Messaging and Presence Protocols IP Device Control Internet Relay Chat Protocol Internet Message Access Protocol version 4rev1 Network Time Protocol Post Office Protocol version 3 Remote Authentication Dial In User Service Remote Login
RTSP SCTP S-HTTP SLP SMTP SNMP SOCKS TACACS+ TELNET TFTP WCCP X-Window
Real-time Streaming Protocol Stream Control Transmision Protocol Secure Hypertext Transfer Protocol Service Location Protocol Simple Mail Transfer Protocol Simple Network Management Protocol Socket Secure (Server) Terminal Access Controller Access Control System TCP/IP Terminal Emulation Protocol Trivial File Transfer Protocol Web Cache Coordination Protocol X Window Border Gateway Protocol Exterior Gateway Protocol Enhanced Interior Gateway Routing Protocol Cisco Hot Standby Router Protocol Interior Gateway Routing NBMA Address Resolution Protocol Next Hop Resolution Protocol Open Shortest Path First Telephony Routing over IP Ascend Tunnel Management Protocol The Layer 2 Forwarding Protocol Layer 2 Tunneling Protocol Point to Point Tunneling Protocol
Routing
BGP-4 EGP EIGRP HSRP IGRP NARP NHRP OSPF TRIP
Tunneling
ATMP L2F L2TP PPTP
Security
AH ESP TLS
Authentication Header Encapsulating Security Payload Transport Layer Security Protocol
Most commonly used protocols 3.1.1 PPP Point-to-Point Protocol PPP is used protocol for creating a TCP/IP connection over synchronous or asynchronous systems. PPP provides connections for host to network or between two routers; it also has a security mechanism. PPP is well known as a protocol for connections over regular telephone lines using modems on both ends. This protocol is widely used for
connecting personal computers to the Internet. One big advantage of PPP is its ability to transport multi-protocol data grams over serial lines. PPP has the abilities for error correction, compression etc. 3.1.2 SLIP Serial Line Internet Protocol SLIP is a predecessor to PPP protocol. There is also an advanced version of this protocol known as CSLIP (compressed serial line internet protocol) which reduce overhead on a SLIP connection by sending just a header information when possible, thus increasing packet throughput. 3.1.3 FTP File Transfer Protocol FTP is a Client Server protocol, used for moving files between computers on a network. Of primary use is transferring files to/from our desktop/laptop personal computers and a Server. It can also be used to communicate with web servers, such as a download site, or any PCs or other machines running FTP servers. FTP, the File Transfer Protocol, documented in RFC 959, is one of oldest Internet protocols still in widespread use. FTP is implemented using the TCP Protocol. FTP enables transferring of text and binary files over TCP connection. FTP allows transfer of files according to a strict mechanism of ownership and access restrictions. It is one of the most commonly used protocols over the Internet now days. FTP uses port TCP port number 21. 3.1.4 Telnet The Telnet service provides a remote login capability. This lets a user on one machine log into another machine and act as if they are directly in front of the remote machine. The connection can be anywhere on the local network, or on another network anywhere in the world, as long as the user has permission to log into the remote system. Telnet uses TCP to maintain a connection between two machines. Telnet uses port number 23.
UDP is a simple protocol that transfers data grams (packets of data) to a remote computer. UDP doesn't guarantee delivery of packets (Contrast this with TCP that guarantees delivery of packets). UDP doesnt guarantee correct sequence of delivery. 3.1.9 TCP Transmission Control Protocol TCP, like UDP is a protocol used in a TCP/IP networks. TCP ensures that the packets are delivered at their destination, and in correct sequence. 3.1.10 IP Internet Protocol IP is the underline protocol for all the other protocols in the TCP/IP protocol suite. IP defines the means to identify and reach a target computer on the network. Computers in an IP network are identified by unique numbers which are known as IP addresses. 3.1.11 ARP Address Resolution Protocol In order to map an IP address into a hardware address the computer uses the ARP protocol. ARP protocol broadcasts a request message that contains an IP address, to which the target computer replies with both the original IP address and the hardware address. 3.1.12 NNTP Network News Transport Protocol A protocol used to carry USENET posting between News clients and USENET servers.
Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.
Alternative Proxies: