Top-Rated Free Essay
Preview

Osi References

Good Essays
962 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Osi References
Introduction to the OSI Reference Model

The International Organization for Standardization (ISO) defined the Open Systems Interconnection (OSI) reference model to standardize networking of devices from different vendors. The OSI reference model is mostly an architecture blueprint that networking and computer device manufacturers implement. The OSI model has never been implemented exactly as defined. The TCP/IP protocol stack is the closest implementation available today.

Application Layer (7)

This layer represents the various network applications such as e-mail reader, Web browser, Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), and Network File System (NFS).
✦ The application layer provides a user interface and processes network data.
✦ The application layer on the sending host produces the network data to be transmitted from the sender host.
✦ The application layer on the receiving host consumes the network data produced and transmitted by the sender host.

Presentation Layer (6)

This layer is mostly concerned with data format. It converts the data between different formats so that both the sender and the receiver can use heterogeneous data. For example, mail messages contain various data formats: text, application attachments, video, audio, and graphical signature.
✦ The presentation layer on the sending host receives the data payload from the application layer.
✦ The presentation layer on the sending host converts the data into a format that is easily transportable over the network.
✦ The presentation layer on the receiving host converts the data from the network format back to its native format that can be easily interpreted, used, and displayed by the application layer above.

Session Layer (5)

Some applications need to open logical communication channels between the computer hosts. Logical communication channels (sessions) maintain data about the communication established between the network application running on the sending host and the network application running on the receiving host. The session layer does the following:
✦ Opens and maintains logical communication channels between network applications running on the sending host and network applications running on the receiving host.
✦ Handles authentication: Some network applications use authentication mechanisms before they open a logical communication channel (session) with a remote host.

Transport Layer (4)

The transport layer manages the transport of data between two hosts over a network. In a nutshell, the transport layer does the following:
✦ Slices the data to be transmitted into small chunks called data segments that can be easily sent over the network medium.
✦ Reassembles the data in order on the receiving host: Data segments are not guaranteed to arrive in order at destination since they may use different routes to reach the destination host. The transport layer is responsible to reassemble the data in order on the receiving host.

Network Layer (3)

The network layer routes data packets across networks that link the sending and the receiving host. In a nutshell, the network layer does the following:
✦ Chooses the best route to send packets between hosts.
✦ Assigns logical addresses to all devices in the network to be able to identify each source host and each destination host, as well as each network through which packets need to be routed. Logical addresses are assigned at the network protocol level. Physical addresses are assigned on a physical device, such as a network card.
✦ Receives each data segment from the transport layer on the sending host and wraps it in a data packet along with routing data. The packet is sent down to the data link layer to send it over the network physical medium.
✦ On the receiving host, the network layer unwraps the packet received to extract the data segment and sends it up to the transport layer.
Several protocols operate at the network layer, such as IP, IPX, AppleTalk, and SNA. The Internet Protocol (IP) is the TCP/IP implementation of the network layer. IP addresses are logical addresses provided by the IP in TCP/IP.
Cisco routers are Layer 3 (network layer) devices.

Data Link Layer (2)

The data link layer does the following:
✦ Transmits the data on the physical medium.
✦ Routes the data locally on the physical network medium. The data link layer uses physical addresses assigned to each physical network device in the local network to route data from one physical device to another.
✦ The data link layer receives each packet from the network layer on the sending host and wraps it in a data frame along with local routing data.
✦ The data link layer sends each data frame down to the physical layer to code an electrical or optical signal to transmit the data frame over a wire or over the air (wireless transmission).
✦ On the receiving host, the data link layer unwraps the data frame received to extract the packet and sends it to the network layer.
Cisco switches are Layer 2 (data link layer) devices.

Physical Layer (1)

The physical layer provides the electrical, optical, or over-the-air connection between the sending host device and the receiving host device. This typically involves copper or fiber-optic cabling, or wireless radio connections, patch panels, signal repeaters, submarine cables, or satellites. Data is always converted into bits that can be transmitted over a medium using electrical current or optical signals that simulate a 1 (signal) or a 0 (no signal).
In a nutshell, the physical layer defines mechanical, electrical, optical, radio, procedural, and functional standards to enable the transmission of data-link (Layer 2) frames over a certain transmission medium. These standards define how a physical link is built, activated, maintained, and deactivated to enable transmissions between DTE (data terminal equipment) and DCE (data communications equipment). DTEs are host devices. DCEs are network devices, that is, any device that stands between two host devices. Most hubs amplify the electrical signal; therefore, they are really repeaters with several ports. Hubs and repeaters are Layer 1 (physical layer) devices.

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 3 Quiz

    • 1152 Words
    • 5 Pages

    During data transfer, what is the receiving host responsible for? (Choose the best two answers).…

    • 1152 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    The reason for picking answer A and D is because they are the only that makes sense. The purpose of the transport layer takes a large amount of packet or data and sends it on the network and break it into smaller pieces on the source host. Then, the network layer take the same data or packet and reassemble them for the destination host on the network.…

    • 247 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 1 Assignment

    • 987 Words
    • 4 Pages

    (This layer is not the application itself, although some applications may perform application layer functions.)…

    • 987 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 5 Assignment 1

    • 1348 Words
    • 6 Pages

    4. The server accept the connection and to send the data from server to client and vice…

    • 1348 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    IEEE802 standard series protocol, the data link layer includes a logical link control (LLC) sublayer and the media access control (MAC) sub-layer which is located between the MAC layer and the physical LLC, which allows adaptation to different LLC media access technology and physical media. MAC sublayer as a separate, they will not change the impact of the media access method and higher level protocols. MAC disassembly of data and media access management of two modules, the completion of the data frame encapsulation, re-opened send and receive functions. Ethernet frame encapsulation format as shown in Table 1, where the destination address, source address, length / type field and the data generated by the four layer protocol module when transmitting data frames, data encapsulation module automatically adding data to be transmitted in the first seven bytes of preamble and a delimiter byte and add at the end of the data transfer byte sent four cyclic redundancy check code, if the data length is less than 46 bytes , the data is automatically filled in order to achieve the minimum length required when receiving data frame, the data will be automatically discarded removable module preamble and delimiter two fields.…

    • 312 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    4. The data link layer strips the data-link header and trailer, and then passes the remaining data up to the network layer.…

    • 648 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    This layer holds whatever IP will run above, e.g., Ethernet, token-ring, and Fiber Distributed Digital Interface (FDDI) systems. Distinct network protocols, e.g., Ethernet, exertion at this level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    TCP – This protocol is what is used to break data down into manageable pieces and package them to send out to the proper address.…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1

    • 4209 Words
    • 17 Pages

    83) Which process is responsible for establishing a connection between the client and the server?…

    • 4209 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Mis 589 Unit 7

    • 943 Words
    • 4 Pages

    Each computer in the network has software that operates at each of the layers and performs the functions required by those layers. Each layer in the network uses a formal…

    • 943 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The three types of addresses used in a network are the application layer, network layer and the Data link layer. When users work with application software, they typically use the application layer address. For example, in Chapter 2, we discussed application software that used Internet addresses (e.g., www.tsu.edu). This is an application layer address (or a server name). When a user types an Internet address into a Web browser, the request is passed to the network layer as part of an application layer packet formatted using the HTTP protocol.…

    • 1082 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    2. Assuming that a mesh topology network has 6 connected devices there would be a need for fifteen (15) cables, and five (5) ports for each device.…

    • 280 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Osi Transport Model

    • 7553 Words
    • 31 Pages

    At the receiving host, each piece of data may be directed to the appropriate application. Additionally, these individual pieces of data must also be reconstructed into a complete data stream that is useful to the Application layer. The protocols at the Transport layer describe the how the Transport layer header information is used to reassemble the data pieces into streams to be passed to the Application layer.…

    • 7553 Words
    • 31 Pages
    Good Essays
  • Powerful Essays

    Lan Technology

    • 2876 Words
    • 9 Pages

    In the Open Systems Interconnection (OSI) model of communication, the Media Access Control layer is one of two sub layers of the Data Link Control layer and is concerned with sharing the physical connection to the network among several computers. Each computer has its own unique MAC address. Ethernet is an example of a protocol that works at the Media Access Control layer level.…

    • 2876 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Client-Server Model

    • 296 Words
    • 2 Pages

    Clients and servers exchange messages in a request-response messaging pattern: The client sends a request, and the server returns a response. To communicate, the computers must have a common language, and they must follow rules so that both the client and the server know what to expect. The language and rules of communication are defined in a communications protocol. All client-server protocols operate in the application layer.…

    • 296 Words
    • 2 Pages
    Satisfactory Essays