OSI
REFERENCE MODEL
When people
talk about connecting computers together, then they referred the term
Networking. So, OSI model is behind this communication to share the resources
between them
OSI model is a logical model for how systems in the network should communicate to each other. All the model does is to bre
ak down all the components for communication and arrange them into layers.
OSI model
consists of seven logical layers that allows you to troubleshoot or know about
the network.
The layers from
top to bottom are for what is closer to the end user. So, what the user is
interacting with will be at the top,
7. APPLICATION LAYER:
- This
is the layer that the user is actually interacting with. Like Chrome,
Safari, Firefox or somehow Internet Explorer.
- Not
just browsers any application or piece of code or any software such as
Outlook.
- This
is the actual stuff that user sees or use to interact with the Network.
6. PRESENTATION LAYER:
- This
is the layer where the operating system comes into play.
- The
Application layer sends the information to the presentation layer.
- Device
drivers for the Network Interface Card reside on this layer.
- It
is concerned about the format of data exchanging between the two systems.
5. SESSION LAYER:
- This
is the layer which deals with the communication creating a session between
the two computers.
- When
you visit a website on your computer, your computer at the session layer
creates a session with the web server that you are trying to get data
from.
- It
is a session maintained between your computer and host server so that the
connection is alive till you close the browser Tab or the page.
- If
an application creates different transport streams session layer binds all
these streams belonging to the same application.
4. TRANSPORT LAYER:
- It
decides that how much information should be sent at one time. Windowing –
send information back and forth.
- Receive
data from Session layer and divide it into smaller units called as
messages which are passed on to the Network Layer.
- On the receiving end, it makes sure that the messages are accepted and
arranged in the correct order. These messages are merged and passed on to
the upper layers.
3. NETWORK LAYER:
- Routers
operates on the Network layer.
- Your
IP address is at the network layer.
- It
breaks a message into packets and transmits them across the network.
- It
makes sure that the packet reaches the correct destination.
- This
is implemented on every node in the network.
- A
node here can be a computer, a router etc.
2. DATA LINK LAYER:
- This
the layer where all the switching occurs or where the switches operate on.
- MAC
Addresses exists here.
- It
is responsible for transmission of error-free data.
- It
divides packets into frames and passes on to the physical layer for
transmission.
- On the receiving end, it takes the raw bytes from the physical layer and
aggregates them into frames.
- Data-encoding
framing error detection and correction are applied here.
1. PHYSICAL LAYER:
- The
physical is literally all the physical stuff that a network requires. Like
wires, Network Interface Cards and all other devices.
- It
is responsible for transmission of raw bits over the communication link.
UNDERSTANDING THE FLOW OF INFORMATION:
- Let us assume that there are two systems System A and System B which wants to communicate with each other over a network.
All the seven layers will be implemented by both the systems.
All the intermediate nodes will implement only the bottom 3 layers (Network Layer, Data Link Layer and Physical Layer) as their job is just to pass on the data to the next node.
The top 4 layers are implemented only by the end systems, but the bottom 3 layers are implemented by every node in the path.
Every layer has some protocols through which it communicates with the corresponding layer in the other system.
Every layer also communicates with the layer above and below it, or every layer provides some service to the layer above it.
Note: Protocols work between same layers of different machines, whereas services work among different layers within the same machine.
- An application, creates data that will be sent, such as an email message. The Application layer places a header fields that contains information about the source and destination ports, and passes the data to the Presentation layer.
–| Source and Destination Port | Data |– - The Presentation layer places layer 6 header information. For example, the text in the message might be converted to ASCII. The Presentation layer will then pass the new data to the Session layer.
–| Encryption Info | Source and Destination Port | Data |– - The Session layer follows the same process by adding layer 5 header information. Session layer will manage the data flow, and passes this data to the Transport layer.
–| Session Header | Encryption Info | Source and Destination Port | Data |– - The Transport layer places information, such as a sequence number to message, and passes it to the Network layer. It allows multiple applications to use the same network at the same time.
–| Session Header | Encryption Info | Source and Destination Port |Message Secuence | Message Secuence | Data |– - The Network layer places information, such as the source and destination address so the Network layer can determine the best delivery path for the packets, and passes this data to the Data Link layer.
–| Source and Destination IP | Session Header | Encryption Info | Source and Destination Port | Message Secuence | Data |– - The Data Link layer places header and trailer information, such as a Frame Check Sequence (FCS) to ensure that the information is not corrupt, the Source and Destination MAC addresses, and passes this new data to the Physical layer for transmission across the media.
–| Source and Destination MAC | Source and Destination IP | Session Header | Encryption Info | Source and Destination Port | Message Secuence |Data | FCS |– - The bit stream is then transmitted as ones and zeros on the Physical layer. It is at this point that the Physical layer ensures bit synchronization. Bit synchronization will ensure the end user data is assembled in the correct order it was sent.
- Steps 1 to 7 occur in reverse order on the destination device. Device B collects the raw bits from the physical wire and passes them up the Data Link layer. The Data Link layer removes the headers and trailers and passes the remaining information to the Network layer and so forth until data is received by the Application layer.
- Once the request has reached, the response is snet in the same secuence as steps 1 to 7 while reversing the source and destination information recieved in the request (ie. the source becomes the destination and the destination becomes the source).
Message Secuence is Message Sequence
ReplyDelete