SlideShare a Scribd company logo
the OSI layers and Ethernet protocols.
History of the OSI Model
The work on the Open Standard Interface (OSI) reference model was started in 1977 by the
International Organization for Standards. It was then decided that OSI will have two major
components - a 7-layer model and a set of specific protocols. The various issues on OSI design have
evolved from a networking model called CYCLADES. This also influenced the design of Internet
architecture then. Since the inception of OSI, the working of Internet technology has become very
smooth.
Before the advent of OSI, communication with different entities and different vendors was
extremely difficult. This was because every vendor would have a different mechanism to
communicate. Therefore, to communicate with entities of different vendors, there arose the need to
have a common platform. This need forced the International Organization for Standards to have a
viable and universally accepted platform. Thus, the OSI reference model was born.
OSI Layers
Physical Layer: The physical layer is at the bottom of this model. It deals with crude data that is in
the form of electrical signals. The data bits are sent as 0s and 1s. 0s correspond to low voltage
signals and 1s correspond to high voltage signals. The mechanical aspects of communication, such as
wires or connectors come under this layer. The physical layer also deals with how these wires,
connectors, and voltage electrical signals work. Also, the process that is required for these physical
aspects are taken into account in this layer itself.
The Data Link Layer: The transmission of the data over the communication medium is the
responsibility of this layer. The 0s and 1s that are used in the communication are grouped into
logical encapsulation. This encapsulation is called frames. The data is transported in frames. The
responsibility of these frames is that of the data link layer.
Network Layer: All over the world, there are many different types of Ethernet. These networks are
connected to each other through various media. When a data packet wants to reach a particular
destination, it has to traverse through these networks. Essentially, there are a lot of operations that
are taking place between the connected networks. Also, the packet data which is traversing has to
choose an optimum route, and the addressing of these packets has to be proper. The various
operations between the networks, packet data issues, addressing and routing, are handled by this
network layer.
Transport Layer: The transport layer ensures quality and reliability of the communication. The data
packet switching is entirely handled by the transport layer. There are basically two types of packet
switching. They are connectionless packet switching and connection oriented packet switching. In
connectionless packet switching, the packet data is allowed to choose the route in which it is going
to reach the destination. Obviously, the packet in itself can't do this. Physical devices like routers are
mainly responsible for the behavior of packets, but the packets formed from the same datum can
reach their destination in different ways. Whereas, in connection oriented packet switching, once
the route is decided, then all the packets have to follow the same route. An example of
connectionless packet switching is text messages in mobile phones, and the example of connection
oriented switching is a direct voice call.
The Sessions Layer: The sessions layer is mainly responsible for creating, maintaining and destroying
the communication link. PDU (Protocol Data Unit), in which various protocols are defined that have
to be followed during communication, are the responsibility of the sessions layer. The applications
that use RPCs (remote procedure calls) are taken care of by the sessions layer.
Presentation Layer: There are various techniques of data compression which are used to send and
receive the optimized data. For example, if certain data is repeating itself a number of times, then it
is logical to send the data only once, and specify the number of times it is repeated. This bundling of
the repeated data is one of the techniques of compressions. The compression and decompression of
the data is handled by the presentation layer. Also, encryption and decryption techniques used to
thwart malicious attacks on data are handled by the presentation layer.
Application Layer: This layer comes into picture when there is a process to process communication.
Whenever a user invokes any application, all the associated processes are run. Many times, when an
application wants to communicate with another application, then there has to be communication
between these associated processes. The application layer is responsible for this inter-process
communication.
Protocols
OSI Layer Protocols
Application Layer DNS, FTP, TFTP, BOOTP, SNMP, SMTP
Presentation Layer SMB, NCP
Sessions Layer NETBIOS
Transport LayerTCP, ARP, RARP, SPX, NWLINK, NETBIOS
Network Layer IP, ARP, RARP, ICMP, IGMP
Data link Layer LLC
Physical Layer LLC
OSI Layer Model vs TCP/IP Reference Model
Sr. No. OSI Reference Model TCP/IP Reference Model
1. Model was first defined before implementation takes place Model was defined after
protocols were implemented
2. Reliable delivery of packet data Service interface and protocols were not clearly
distinguished before
3. Internet working not supported TCP/IP supports Internet working
4. Strict Layered Loosely layered
Since the establishment of OSI, there has been a revolution in the field of communication. The entire
industry of communication can find its backbone in this model. Hope this article has been apt and
informative.
Read more at Buzzle: http://www.buzzle.com/articles/osi-model-explained.html

More Related Content

What's hot

THE OSI MODEL
THE OSI MODELTHE OSI MODEL
THE OSI MODEL
Md Saylab
 
Networking Cable
Networking CableNetworking Cable
Networking Cable
AfsanaAkterRubi
 
Presentation on osi layer
Presentation on osi layerPresentation on osi layer
Presentation on osi layer
Kuldeep Pathak
 
Class work 1
Class work 1Class work 1
Class work 1
RaziaSultanaHimu
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
Maksudujjaman
 
Osi
OsiOsi
OSI Model
OSI ModelOSI Model
OSI Model
Dulal Miah
 
Open Systems Interconnection
Open Systems InterconnectionOpen Systems Interconnection
Open Systems Interconnection
SanowerHossainRabbi
 
OSI Model
OSI ModelOSI Model
OSI Model
TahsinaTabassum1
 
Computer Network [OSI Model]
Computer Network [OSI Model]Computer Network [OSI Model]
Computer Network [OSI Model]
AfsanaAkterRubi
 
Osi model and tcpip model.
Osi model and tcpip model.Osi model and tcpip model.
Osi model and tcpip model.
kona paul
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks
AfsanaAkterRubi
 
Network Topology
Network TopologyNetwork Topology
Network Topology
TahsinaTabassum1
 
Conceptos basicos de redes
Conceptos basicos de redesConceptos basicos de redes
Conceptos basicos de redes
Franke Boy
 
Network Topology
Network TopologyNetwork Topology
Transmission Mode (Simplex, Half Duplex, Full Duplex), Device, Switch, Hub, R...
Transmission Mode (Simplex, Half Duplex, Full Duplex), Device, Switch, Hub, R...Transmission Mode (Simplex, Half Duplex, Full Duplex), Device, Switch, Hub, R...
Transmission Mode (Simplex, Half Duplex, Full Duplex), Device, Switch, Hub, R...
SanowerHossainRabbi
 
Network fundamentals
Network fundamentalsNetwork fundamentals
Network fundamentals
Syed Measum Haider Bokhari
 
Network Topology
Network Topology Network Topology
Network Topology
Md.Al-amin Hossen
 
Questions from chapter 1 data communication and networking
Questions from chapter 1 data communication and networkingQuestions from chapter 1 data communication and networking
Questions from chapter 1 data communication and networking
Anuja Lad
 
Network Software, System Software, Hardware, Software, Firmware, App
Network Software, System Software, Hardware, Software, Firmware, AppNetwork Software, System Software, Hardware, Software, Firmware, App
Network Software, System Software, Hardware, Software, Firmware, App
AfsanaAkterRubi
 

What's hot (20)

THE OSI MODEL
THE OSI MODELTHE OSI MODEL
THE OSI MODEL
 
Networking Cable
Networking CableNetworking Cable
Networking Cable
 
Presentation on osi layer
Presentation on osi layerPresentation on osi layer
Presentation on osi layer
 
Class work 1
Class work 1Class work 1
Class work 1
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
 
Osi
OsiOsi
Osi
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Open Systems Interconnection
Open Systems InterconnectionOpen Systems Interconnection
Open Systems Interconnection
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Computer Network [OSI Model]
Computer Network [OSI Model]Computer Network [OSI Model]
Computer Network [OSI Model]
 
Osi model and tcpip model.
Osi model and tcpip model.Osi model and tcpip model.
Osi model and tcpip model.
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Conceptos basicos de redes
Conceptos basicos de redesConceptos basicos de redes
Conceptos basicos de redes
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Transmission Mode (Simplex, Half Duplex, Full Duplex), Device, Switch, Hub, R...
Transmission Mode (Simplex, Half Duplex, Full Duplex), Device, Switch, Hub, R...Transmission Mode (Simplex, Half Duplex, Full Duplex), Device, Switch, Hub, R...
Transmission Mode (Simplex, Half Duplex, Full Duplex), Device, Switch, Hub, R...
 
Network fundamentals
Network fundamentalsNetwork fundamentals
Network fundamentals
 
Network Topology
Network Topology Network Topology
Network Topology
 
Questions from chapter 1 data communication and networking
Questions from chapter 1 data communication and networkingQuestions from chapter 1 data communication and networking
Questions from chapter 1 data communication and networking
 
Network Software, System Software, Hardware, Software, Firmware, App
Network Software, System Software, Hardware, Software, Firmware, AppNetwork Software, System Software, Hardware, Software, Firmware, App
Network Software, System Software, Hardware, Software, Firmware, App
 

Similar to The osi layers and ethernet protocols

CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
skknowledge
 
OsI reference model
OsI reference modelOsI reference model
OsI reference model
LakshmiSamivel
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi model
Naiyan Noor
 
Osi model
Osi modelOsi model
Osi model
dhawal mehta
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
DeepVala5
 
osi reference model ppt
osi reference model pptosi reference model ppt
osi reference model ppt
JayshreeChouhan3
 
savli_._Jagrati._Yash_ppt.ppt
savli_._Jagrati._Yash_ppt.pptsavli_._Jagrati._Yash_ppt.ppt
savli_._Jagrati._Yash_ppt.ppt
JayshreeChouhan3
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
Shamima Akther
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networking
MeenakshiGupta233101
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
NajmulIslam38
 
Networking (osi model)
Networking (osi model)Networking (osi model)
Networking (osi model)
Pooja Bhojwani
 
Osi model
Osi modelOsi model
Osi model
samriti_talwar
 
Network Fundamentals: OSI Model
Network Fundamentals: OSI Model Network Fundamentals: OSI Model
Network Fundamentals: OSI Model
Diwash Sapkota
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
MosesOkumu4
 
osi-tcp.ppt
osi-tcp.pptosi-tcp.ppt
osi-tcp.ppt
Rashmin Tanna
 
osi-tcp ppt 1.pptx........................
osi-tcp ppt 1.pptx........................osi-tcp ppt 1.pptx........................
osi-tcp ppt 1.pptx........................
swarnimprateek
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
Steven Cahill
 
Osi model
Osi modelOsi model
Osi model
Manju Lakkegowda
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
isma ishak
 
Network architecture
Network architectureNetwork architecture
Network architecture
Dr. Shalini Pandey
 

Similar to The osi layers and ethernet protocols (20)

CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
 
OsI reference model
OsI reference modelOsI reference model
OsI reference model
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi model
 
Osi model
Osi modelOsi model
Osi model
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
 
osi reference model ppt
osi reference model pptosi reference model ppt
osi reference model ppt
 
savli_._Jagrati._Yash_ppt.ppt
savli_._Jagrati._Yash_ppt.pptsavli_._Jagrati._Yash_ppt.ppt
savli_._Jagrati._Yash_ppt.ppt
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networking
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
 
Networking (osi model)
Networking (osi model)Networking (osi model)
Networking (osi model)
 
Osi model
Osi modelOsi model
Osi model
 
Network Fundamentals: OSI Model
Network Fundamentals: OSI Model Network Fundamentals: OSI Model
Network Fundamentals: OSI Model
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
 
osi-tcp.ppt
osi-tcp.pptosi-tcp.ppt
osi-tcp.ppt
 
osi-tcp ppt 1.pptx........................
osi-tcp ppt 1.pptx........................osi-tcp ppt 1.pptx........................
osi-tcp ppt 1.pptx........................
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Osi model
Osi modelOsi model
Osi model
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
Network architecture
Network architectureNetwork architecture
Network architecture
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 

The osi layers and ethernet protocols

  • 1. the OSI layers and Ethernet protocols. History of the OSI Model The work on the Open Standard Interface (OSI) reference model was started in 1977 by the International Organization for Standards. It was then decided that OSI will have two major components - a 7-layer model and a set of specific protocols. The various issues on OSI design have evolved from a networking model called CYCLADES. This also influenced the design of Internet architecture then. Since the inception of OSI, the working of Internet technology has become very smooth. Before the advent of OSI, communication with different entities and different vendors was extremely difficult. This was because every vendor would have a different mechanism to communicate. Therefore, to communicate with entities of different vendors, there arose the need to have a common platform. This need forced the International Organization for Standards to have a viable and universally accepted platform. Thus, the OSI reference model was born. OSI Layers Physical Layer: The physical layer is at the bottom of this model. It deals with crude data that is in the form of electrical signals. The data bits are sent as 0s and 1s. 0s correspond to low voltage signals and 1s correspond to high voltage signals. The mechanical aspects of communication, such as wires or connectors come under this layer. The physical layer also deals with how these wires, connectors, and voltage electrical signals work. Also, the process that is required for these physical aspects are taken into account in this layer itself. The Data Link Layer: The transmission of the data over the communication medium is the responsibility of this layer. The 0s and 1s that are used in the communication are grouped into logical encapsulation. This encapsulation is called frames. The data is transported in frames. The responsibility of these frames is that of the data link layer. Network Layer: All over the world, there are many different types of Ethernet. These networks are connected to each other through various media. When a data packet wants to reach a particular destination, it has to traverse through these networks. Essentially, there are a lot of operations that are taking place between the connected networks. Also, the packet data which is traversing has to choose an optimum route, and the addressing of these packets has to be proper. The various
  • 2. operations between the networks, packet data issues, addressing and routing, are handled by this network layer. Transport Layer: The transport layer ensures quality and reliability of the communication. The data packet switching is entirely handled by the transport layer. There are basically two types of packet switching. They are connectionless packet switching and connection oriented packet switching. In connectionless packet switching, the packet data is allowed to choose the route in which it is going to reach the destination. Obviously, the packet in itself can't do this. Physical devices like routers are mainly responsible for the behavior of packets, but the packets formed from the same datum can reach their destination in different ways. Whereas, in connection oriented packet switching, once the route is decided, then all the packets have to follow the same route. An example of connectionless packet switching is text messages in mobile phones, and the example of connection oriented switching is a direct voice call. The Sessions Layer: The sessions layer is mainly responsible for creating, maintaining and destroying the communication link. PDU (Protocol Data Unit), in which various protocols are defined that have to be followed during communication, are the responsibility of the sessions layer. The applications that use RPCs (remote procedure calls) are taken care of by the sessions layer. Presentation Layer: There are various techniques of data compression which are used to send and receive the optimized data. For example, if certain data is repeating itself a number of times, then it is logical to send the data only once, and specify the number of times it is repeated. This bundling of the repeated data is one of the techniques of compressions. The compression and decompression of the data is handled by the presentation layer. Also, encryption and decryption techniques used to thwart malicious attacks on data are handled by the presentation layer. Application Layer: This layer comes into picture when there is a process to process communication. Whenever a user invokes any application, all the associated processes are run. Many times, when an application wants to communicate with another application, then there has to be communication between these associated processes. The application layer is responsible for this inter-process communication. Protocols OSI Layer Protocols Application Layer DNS, FTP, TFTP, BOOTP, SNMP, SMTP
  • 3. Presentation Layer SMB, NCP Sessions Layer NETBIOS Transport LayerTCP, ARP, RARP, SPX, NWLINK, NETBIOS Network Layer IP, ARP, RARP, ICMP, IGMP Data link Layer LLC Physical Layer LLC OSI Layer Model vs TCP/IP Reference Model Sr. No. OSI Reference Model TCP/IP Reference Model 1. Model was first defined before implementation takes place Model was defined after protocols were implemented 2. Reliable delivery of packet data Service interface and protocols were not clearly distinguished before 3. Internet working not supported TCP/IP supports Internet working 4. Strict Layered Loosely layered Since the establishment of OSI, there has been a revolution in the field of communication. The entire industry of communication can find its backbone in this model. Hope this article has been apt and informative. Read more at Buzzle: http://www.buzzle.com/articles/osi-model-explained.html