SlideShare a Scribd company logo
1 of 4
Download to read offline
Tutorial:Overview




                 Understanding The
                 OSI 7-Layer Model
            The OSI model is a way of describing how different applications and protocols interact
                 on network-aware devices. We explain the role of each layer and of the stack.

                                                                                                                       By Neil Briscoe




     I    f you spend much time in the com-
          pany of network technicians you
          will eventually hear them say
     something like “That’s Layer 2 only”
                                                 on a slightly modified layer system.
                                                 TCP/IP, for example, uses a 6- rather
                                                 than a 7-layer model. Nevertheless, in
                                                 order to ease the exchange of ideas,
                                                                                             governed by a device’s MAC address,
                                                                                             the six-byte number that is unique to
                                                                                             each NIC. Devices which depend on
                                                                                             this level include bridges and
     or “That’s our new Layer 4 switch”.         even those who only ever use TCP/IP         switches, which learn which segment’s
     The technicians are referring to the OSI    will refer to the 7-layer model when        devices are on by learning the MAC
     (Open System Interconnection) Refer-        discussing networking principles with       addresses of devices attached to vari-
     ence Model.                                 peers from a different networking           ous ports.
         This model defines seven Layers         background.                                    This is how bridges are eventually
     that describe how applications run-            Confusingly, the OSI was a work-         able to segment off a large network,
     ning upon network-aware devices             ing group within the ISO (Interna-          only forwarding packets between
     may communicate with each other.            tional Standards Organisation) and,         ports if two devices on separate seg-
     The model is generic and applies to all     therefore, many people refer to the         ments need to communicate. Switches
     network types, not just TCP/IP, and         model as the ISO 7-layer model. They        quickly learn a topology map of the
     all media types, not just Ethernet. It is   are referring to the same thing.            network, and can thus switch packets
     for this reason that any network tech-         Traditionally, layer diagrams are        between communicating devices very
     nician will glibly throw around the         drawn with Layer 1 at the bottom and        quickly. It is for this reason that mi-
     term “Layer 4” and expect to be under-      Layer 7 at the top. The remainder of        grating a device between different
     stood.                                      this article describes each layer, start-   switch ports can cause the device to
         It should be noted, however, that       ing from the bottom, and explains           lose network connectivity for a while,
     most protocols in day-to-day use work       some of the devices and protocols you       until the switch, or bridge, re-ARPs
                                                 might expect to find in your data cen-      (see box on ARP).
                                                 tre operating at this layer.
                                                                                             Layer 3
                                                 Layer 1
                                                                                                 Layer 3 is the Network Layer, pro-
                                                     Layer 1 is the Physical Layer and,      viding a means for communicating
                                                 under the OSI Model, defines the            open systems to establish, maintain
                                                 physical and electrical characteristics     and terminate network connections.
                                                 of the network. The NIC cards in your       The IP protocol lives at this layer, and
                                                 PC and the interfaces on your routers       so do some routing protocols. All the
                                                 all run at this level since, eventually,    routers in your network are operating
                                                 they have to pass strings of ones and       at this layer.
                                                 zeros down the wire.
                                                                                             Layer 4
                                                 Layer 2
                                                                                                Layer 4 is the Transport Layer, and
                                                    Layer 2 is known as the Data Link        is where TCP lives. The standard says
                                                 Layer. It defines the access strategy for   that “The Transport Layer relieves the
                                                 sharing the physical medium, includ-        Session Layer [see Layer 5] of the bur-
                                                 ing data link and media access issues.      den of ensuring data reliability and
                                                 Protocols such as PPP, SLIP and HDLC        integrity”. It is for this reason that peo-
            Figure 1 - The 7 layers of           live here.                                  ple are becoming very excited about
                 the OSI model.                     On an Ethernet, of course, access is     the new Layer 4 switching technology.



Issue 120 (July 2000) Page 13                    PC Network Advisor                                                            File: T04124.1
                                                       www.itp-journals.com
Tutorial:Overview




                                                                                               B, the packets have to descend and
                                                                                               then re-ascend the layers (the stack).
          “They are called stacks because, in                                                      Consider the following example.
                                                                                               An application forms a packet of data
        order to get a packet from an application                                              to be sent; this takes place at Layer 7.
                                                                                               As the packet descends the stack, it is
         running on device A to an application                                                 wrapped in headers and trailers, as
                                                                                               required by the various protocols, un-
           running on device B, the packets                                                    til, having reached Layer 1, it is trans-
                                                                                               mitted as a frame across the medium
          have to descend and then re-ascend                                                   in use. Upon reaching device B, it re-
                                                                                               ascends the stack, as the device strips
                 the layers (the stack).”                                                      off the appropriate headers and trail-
                                                                                               ers, delivering just the application data
                                                                                               to the application.
                                                                                                   The OSI tried to keep to as few lay-
     Before these devices became available,        software to look further up the layer       ers as possible for the sake of simplic-
     only software operated at this layer.         model. They are required to under-          ity. The fact that the 7-Layer model is
         Hopefully, you will now also un-          stand when a session is taking place,       universally used to describe where a
     derstand why TCP/IP is uttered in one         and not to interfere with it.               device or protocol sits in the scheme of
     breath. TCP over IP, since Layer 4 is                                                     things shows that the designers did an
     above (over) Layer 3. It is at this layer     Layer 6                                     excellent job of achieving their aims.
     that, should a packet fail to arrive (per-
     haps due to misrouting, or because it            Layer 6 is the Presentation Layer.
     was dropped by a busy router), it will        This is where application data is either
     be re-transmitted, when the sending           packed or unpacked, ready for use by                Further Reading
     party fails to receive an acknow-             the running application. Protocol con-
                                                                                                 www.whatis.com
     ledgement from the device with which          versions, encryption/decryption and
                                                                                                 This impressive site hosts infor-
     it is communicating.                          graphics expansion all takes place
                                                                                                 mation on a wide range of sub-
         The more powerful routing proto-          here.
                                                                                                 jects, a lot of it network-related,
     cols also operate here. OSPF and BGP,
                                                                                                 including a more in-depth discus-
     for example, are implemented as pro-          Layer 7                                       sion of the OSI. Visit the site, click
     tocols directly over IP.
                                                                                                 on the letter O at the top, and then
                                                      Finally, Layer 7 is the Application
                                                                                                 scroll down the list of topics until
     Layer 5                                       Layer. This is where you find your
                                                                                                 you find OSI.
                                                   end-user and end-application proto-
        Layer 5 is the Session Layer. It pro-      cols, such as telnet, ftp, and mail (pop3
     vides for two communicating presen-           and smtp).
     tation entities to exchange data with
     each other. The Session Layer is very         The Stack
     important in the E-commerce field
     since, once a user starts buying items           Our imaginary listener, eavesdrop-
     and filling their “shopping basket” on        ping on the conversations of network                                       PCNA
     a Web server, it is very important that       engineers, would hear them refer to IP
     they are not load-balanced across dif-        stacks quite frequently. They are called
     ferent servers in a server pool.              stacks because, in order to get a packet
        This is why, clever as Layer 4             from an application running on device
     switching is, these devices still operate     A to an application running on device

                                                                                                                    Copyright ITP, 2000
                      Address Resolution Protocol (ARP)
           Bridges, switches, and most network devices keep a table mapping IP
        addresses to Media Access addresses. Moving a device between ports
        invalidates these tables, and hence the device’s view of the world.
        Fortunately, the devices age their table entries, typically clearing them out                    The Author
        five minutes after the last time a packet was seen from a particular entity.             Neil Briscoe is a networking con-
        This is sometimes called re-ARPing. Most bridges and switches provide                    sultant and Cisco guru and can be
        management functions to allow you to clear the ARP entry manually, should                contacted as neil.briscoe@itp-
        you have needed to move a device due to a failed port.                                   journals.com.




File: T04124.2                                    PC Network Advisor                                            Issue 120 (July 2000) Page 14
                                                         www.itp-journals.com
Additional Resources

    •   TCP/IP Tutorial

    •   Understanding IPv6

    •   Understanding NAT

    •   Understanding Frame Relay

    •   Understanding DHCP

    •   Virtual Private Networking Explained



All these articles are available free online now at
www.pcnetworkadvisor.com




                                                                            PCNA

                                                                 Copyright ITP, 2002


                                PC Network Advisor
                                      www.pcnetworkadvisor.com
New Reviews from Tech Support Alert

Anti-Trojan Software Reviews
A detailed review of six of the best anti trojan software programs. Two products
were impressive with a clear gap between these and other contenders in their
ability to detect and remove dangerous modern trojans.

Inkjet Printer Cartridge Suppliers
Everyone gets inundated by hundreds of ads for inkjet printer cartridges, all
claiming to be the cheapest or best. But which vendor do you believe? Our
editors decided to put them to the test by anonymously buying printer cartridges
and testing them in our office inkjet printers. Many suppliers disappointed but we
came up with several web sites that offer good quality cheap inkjet cartridges
with impressive customer service.

Windows Backup Software
In this review we looked at 18 different backup software products for home or
SOHO use. In the end we could only recommend six though only two were good
enough to get our “Editor’s Choice” award

The 46 Best Freeware Programs
There are many free utilities that perform as well or better than expensive
commercial products. Our Editor Ian Richards picks out his selection of the very
best freeware programs and he comes up with some real gems.




                              Tech Support Alert
                           http://www.techsupportalert.com

More Related Content

What's hot

TransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinksTransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinks
Swapnil Raut
 
Important questions in optical communication and networking ec2402 ec 2402 su...
Important questions in optical communication and networking ec2402 ec 2402 su...Important questions in optical communication and networking ec2402 ec 2402 su...
Important questions in optical communication and networking ec2402 ec 2402 su...
kalathi
 
IEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer ProtocolIEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer Protocol
Sajith Ekanayaka
 
Wireless network basics
Wireless network basicsWireless network basics
Wireless network basics
Kumar
 
A Methodology for the Emulation of Boolean Logic that Paved the Way for the S...
A Methodology for the Emulation of Boolean Logic that Paved the Way for the S...A Methodology for the Emulation of Boolean Logic that Paved the Way for the S...
A Methodology for the Emulation of Boolean Logic that Paved the Way for the S...
ricky_pi_tercios
 
Chapter 10.slides
Chapter 10.slidesChapter 10.slides
Chapter 10.slides
lara_ays
 
640 802-study-guide-sample
640 802-study-guide-sample640 802-study-guide-sample
640 802-study-guide-sample
rickybcool
 

What's hot (20)

Ch02
Ch02Ch02
Ch02
 
Chapter 2: Network Models
Chapter 2: Network ModelsChapter 2: Network Models
Chapter 2: Network Models
 
Iso layers
Iso layersIso layers
Iso layers
 
Chapter 2 network models -computer_network
Chapter 2   network models -computer_networkChapter 2   network models -computer_network
Chapter 2 network models -computer_network
 
TransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinksTransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinks
 
Chapter 9 v6.0
Chapter 9 v6.0Chapter 9 v6.0
Chapter 9 v6.0
 
ONOS Deployment Brigade
ONOS Deployment BrigadeONOS Deployment Brigade
ONOS Deployment Brigade
 
Computer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabusComputer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabus
 
Important questions in optical communication and networking ec2402 ec 2402 su...
Important questions in optical communication and networking ec2402 ec 2402 su...Important questions in optical communication and networking ec2402 ec 2402 su...
Important questions in optical communication and networking ec2402 ec 2402 su...
 
Chapter 4 v6.11
Chapter 4 v6.11Chapter 4 v6.11
Chapter 4 v6.11
 
IEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer ProtocolIEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer Protocol
 
Wireless network basics
Wireless network basicsWireless network basics
Wireless network basics
 
OSI Pankaj yadav
OSI  Pankaj yadavOSI  Pankaj yadav
OSI Pankaj yadav
 
A Methodology for the Emulation of Boolean Logic that Paved the Way for the S...
A Methodology for the Emulation of Boolean Logic that Paved the Way for the S...A Methodology for the Emulation of Boolean Logic that Paved the Way for the S...
A Methodology for the Emulation of Boolean Logic that Paved the Way for the S...
 
Chapter 10.slides
Chapter 10.slidesChapter 10.slides
Chapter 10.slides
 
640 802-study-guide-sample
640 802-study-guide-sample640 802-study-guide-sample
640 802-study-guide-sample
 
Chap2
Chap2Chap2
Chap2
 
Chapter 5 v6.01
Chapter 5 v6.01Chapter 5 v6.01
Chapter 5 v6.01
 
Solution manual for_data_communications
Solution manual for_data_communicationsSolution manual for_data_communications
Solution manual for_data_communications
 
Chapter 3 v6.01
Chapter 3 v6.01Chapter 3 v6.01
Chapter 3 v6.01
 

Viewers also liked (8)

International Movement of Labor
International Movement of LaborInternational Movement of Labor
International Movement of Labor
 
Century of phil. labor movement
Century of phil. labor movementCentury of phil. labor movement
Century of phil. labor movement
 
U.S. Labor Movement
U.S. Labor MovementU.S. Labor Movement
U.S. Labor Movement
 
Imf and world bank
Imf and world bankImf and world bank
Imf and world bank
 
Unit 1 powerpoint #7 (the gilded age the rise of unions)
Unit 1 powerpoint #7 (the gilded age   the rise of unions)Unit 1 powerpoint #7 (the gilded age   the rise of unions)
Unit 1 powerpoint #7 (the gilded age the rise of unions)
 
role of imf and world bank
role of imf and world bankrole of imf and world bank
role of imf and world bank
 
Imf & world bank
Imf & world bankImf & world bank
Imf & world bank
 
World Bank Ppt
World Bank PptWorld Bank Ppt
World Bank Ppt
 

Similar to T04124

1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf
1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf
1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf
anandatalapatra
 
1. Summarize and describe the basic functions in the IEEE 802.11 Phy.pdf
1. Summarize and describe the basic functions in the IEEE 802.11 Phy.pdf1. Summarize and describe the basic functions in the IEEE 802.11 Phy.pdf
1. Summarize and describe the basic functions in the IEEE 802.11 Phy.pdf
FashionBoutiquedelhi
 
Understanding tcp=ip
Understanding tcp=ipUnderstanding tcp=ip
Understanding tcp=ip
Ilaya Raja
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
ahmady
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3
Raghu nath
 
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
NguynTy5
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
Mannu Khani
 
OSI model (Tamil)
OSI model (Tamil)OSI model (Tamil)
OSI model (Tamil)
Nifras Ismail
 
The osi layers and ethernet protocols
The osi layers and ethernet protocolsThe osi layers and ethernet protocols
The osi layers and ethernet protocols
Hassan Raza
 

Similar to T04124 (20)

1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf
1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf
1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf
 
1. Summarize and describe the basic functions in the IEEE 802.11 Phy.pdf
1. Summarize and describe the basic functions in the IEEE 802.11 Phy.pdf1. Summarize and describe the basic functions in the IEEE 802.11 Phy.pdf
1. Summarize and describe the basic functions in the IEEE 802.11 Phy.pdf
 
The Solaris Network Environment (Presentation
The Solaris Network Environment (PresentationThe Solaris Network Environment (Presentation
The Solaris Network Environment (Presentation
 
Understanding tcp=ip
Understanding tcp=ipUnderstanding tcp=ip
Understanding tcp=ip
 
639588.pptx
639588.pptx639588.pptx
639588.pptx
 
OsI reference model
OsI reference modelOsI reference model
OsI reference model
 
Osi model
Osi modelOsi model
Osi model
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
 
Wp simoneau osi_model
Wp simoneau osi_modelWp simoneau osi_model
Wp simoneau osi_model
 
Osi model
Osi modelOsi model
Osi model
 
Introduction to TCP / IP model
Introduction to TCP / IP modelIntroduction to TCP / IP model
Introduction to TCP / IP model
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3
 
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
 
Osi model
Osi modelOsi model
Osi model
 
Practical Wireless, Ethernet and TCP/IP Networking
Practical Wireless, Ethernet and TCP/IP NetworkingPractical Wireless, Ethernet and TCP/IP Networking
Practical Wireless, Ethernet and TCP/IP Networking
 
OSI model (Tamil)
OSI model (Tamil)OSI model (Tamil)
OSI model (Tamil)
 
The osi layers and ethernet protocols
The osi layers and ethernet protocolsThe osi layers and ethernet protocols
The osi layers and ethernet protocols
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP Layer
 
7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

T04124

  • 1. Tutorial:Overview Understanding The OSI 7-Layer Model The OSI model is a way of describing how different applications and protocols interact on network-aware devices. We explain the role of each layer and of the stack. By Neil Briscoe I f you spend much time in the com- pany of network technicians you will eventually hear them say something like “That’s Layer 2 only” on a slightly modified layer system. TCP/IP, for example, uses a 6- rather than a 7-layer model. Nevertheless, in order to ease the exchange of ideas, governed by a device’s MAC address, the six-byte number that is unique to each NIC. Devices which depend on this level include bridges and or “That’s our new Layer 4 switch”. even those who only ever use TCP/IP switches, which learn which segment’s The technicians are referring to the OSI will refer to the 7-layer model when devices are on by learning the MAC (Open System Interconnection) Refer- discussing networking principles with addresses of devices attached to vari- ence Model. peers from a different networking ous ports. This model defines seven Layers background. This is how bridges are eventually that describe how applications run- Confusingly, the OSI was a work- able to segment off a large network, ning upon network-aware devices ing group within the ISO (Interna- only forwarding packets between may communicate with each other. tional Standards Organisation) and, ports if two devices on separate seg- The model is generic and applies to all therefore, many people refer to the ments need to communicate. Switches network types, not just TCP/IP, and model as the ISO 7-layer model. They quickly learn a topology map of the all media types, not just Ethernet. It is are referring to the same thing. network, and can thus switch packets for this reason that any network tech- Traditionally, layer diagrams are between communicating devices very nician will glibly throw around the drawn with Layer 1 at the bottom and quickly. It is for this reason that mi- term “Layer 4” and expect to be under- Layer 7 at the top. The remainder of grating a device between different stood. this article describes each layer, start- switch ports can cause the device to It should be noted, however, that ing from the bottom, and explains lose network connectivity for a while, most protocols in day-to-day use work some of the devices and protocols you until the switch, or bridge, re-ARPs might expect to find in your data cen- (see box on ARP). tre operating at this layer. Layer 3 Layer 1 Layer 3 is the Network Layer, pro- Layer 1 is the Physical Layer and, viding a means for communicating under the OSI Model, defines the open systems to establish, maintain physical and electrical characteristics and terminate network connections. of the network. The NIC cards in your The IP protocol lives at this layer, and PC and the interfaces on your routers so do some routing protocols. All the all run at this level since, eventually, routers in your network are operating they have to pass strings of ones and at this layer. zeros down the wire. Layer 4 Layer 2 Layer 4 is the Transport Layer, and Layer 2 is known as the Data Link is where TCP lives. The standard says Layer. It defines the access strategy for that “The Transport Layer relieves the sharing the physical medium, includ- Session Layer [see Layer 5] of the bur- ing data link and media access issues. den of ensuring data reliability and Protocols such as PPP, SLIP and HDLC integrity”. It is for this reason that peo- Figure 1 - The 7 layers of live here. ple are becoming very excited about the OSI model. On an Ethernet, of course, access is the new Layer 4 switching technology. Issue 120 (July 2000) Page 13 PC Network Advisor File: T04124.1 www.itp-journals.com
  • 2. Tutorial:Overview B, the packets have to descend and then re-ascend the layers (the stack). “They are called stacks because, in Consider the following example. An application forms a packet of data order to get a packet from an application to be sent; this takes place at Layer 7. As the packet descends the stack, it is running on device A to an application wrapped in headers and trailers, as required by the various protocols, un- running on device B, the packets til, having reached Layer 1, it is trans- mitted as a frame across the medium have to descend and then re-ascend in use. Upon reaching device B, it re- ascends the stack, as the device strips the layers (the stack).” off the appropriate headers and trail- ers, delivering just the application data to the application. The OSI tried to keep to as few lay- Before these devices became available, software to look further up the layer ers as possible for the sake of simplic- only software operated at this layer. model. They are required to under- ity. The fact that the 7-Layer model is Hopefully, you will now also un- stand when a session is taking place, universally used to describe where a derstand why TCP/IP is uttered in one and not to interfere with it. device or protocol sits in the scheme of breath. TCP over IP, since Layer 4 is things shows that the designers did an above (over) Layer 3. It is at this layer Layer 6 excellent job of achieving their aims. that, should a packet fail to arrive (per- haps due to misrouting, or because it Layer 6 is the Presentation Layer. was dropped by a busy router), it will This is where application data is either be re-transmitted, when the sending packed or unpacked, ready for use by Further Reading party fails to receive an acknow- the running application. Protocol con- www.whatis.com ledgement from the device with which versions, encryption/decryption and This impressive site hosts infor- it is communicating. graphics expansion all takes place mation on a wide range of sub- The more powerful routing proto- here. jects, a lot of it network-related, cols also operate here. OSPF and BGP, including a more in-depth discus- for example, are implemented as pro- Layer 7 sion of the OSI. Visit the site, click tocols directly over IP. on the letter O at the top, and then Finally, Layer 7 is the Application scroll down the list of topics until Layer 5 Layer. This is where you find your you find OSI. end-user and end-application proto- Layer 5 is the Session Layer. It pro- cols, such as telnet, ftp, and mail (pop3 vides for two communicating presen- and smtp). tation entities to exchange data with each other. The Session Layer is very The Stack important in the E-commerce field since, once a user starts buying items Our imaginary listener, eavesdrop- and filling their “shopping basket” on ping on the conversations of network PCNA a Web server, it is very important that engineers, would hear them refer to IP they are not load-balanced across dif- stacks quite frequently. They are called ferent servers in a server pool. stacks because, in order to get a packet This is why, clever as Layer 4 from an application running on device switching is, these devices still operate A to an application running on device Copyright ITP, 2000 Address Resolution Protocol (ARP) Bridges, switches, and most network devices keep a table mapping IP addresses to Media Access addresses. Moving a device between ports invalidates these tables, and hence the device’s view of the world. Fortunately, the devices age their table entries, typically clearing them out The Author five minutes after the last time a packet was seen from a particular entity. Neil Briscoe is a networking con- This is sometimes called re-ARPing. Most bridges and switches provide sultant and Cisco guru and can be management functions to allow you to clear the ARP entry manually, should contacted as neil.briscoe@itp- you have needed to move a device due to a failed port. journals.com. File: T04124.2 PC Network Advisor Issue 120 (July 2000) Page 14 www.itp-journals.com
  • 3. Additional Resources • TCP/IP Tutorial • Understanding IPv6 • Understanding NAT • Understanding Frame Relay • Understanding DHCP • Virtual Private Networking Explained All these articles are available free online now at www.pcnetworkadvisor.com PCNA Copyright ITP, 2002 PC Network Advisor www.pcnetworkadvisor.com
  • 4. New Reviews from Tech Support Alert Anti-Trojan Software Reviews A detailed review of six of the best anti trojan software programs. Two products were impressive with a clear gap between these and other contenders in their ability to detect and remove dangerous modern trojans. Inkjet Printer Cartridge Suppliers Everyone gets inundated by hundreds of ads for inkjet printer cartridges, all claiming to be the cheapest or best. But which vendor do you believe? Our editors decided to put them to the test by anonymously buying printer cartridges and testing them in our office inkjet printers. Many suppliers disappointed but we came up with several web sites that offer good quality cheap inkjet cartridges with impressive customer service. Windows Backup Software In this review we looked at 18 different backup software products for home or SOHO use. In the end we could only recommend six though only two were good enough to get our “Editor’s Choice” award The 46 Best Freeware Programs There are many free utilities that perform as well or better than expensive commercial products. Our Editor Ian Richards picks out his selection of the very best freeware programs and he comes up with some real gems. Tech Support Alert http://www.techsupportalert.com