7 Layers of the OSI Reference Model
Computers & Technology → Networking
- Author M. Aslam
- Published June 7, 2008
- Word count 783
The Application Layer (Layer 7) refers to communication services to applications and is the interface between the network and the application. Most application layer protocols offer services that programs use to access the network, such as the Simple Mail Transfer Protocol (SMTP).
Application layer protocols often include the session and presentation layer functions. A typical protocol stack consists of four separate protocols, which run at the application, transport, network, and data-link layers.Examples include: Telnet, HTTP, FTP, Internet browsers, NFS, SMTP gateways, SNMP, X.400 mail, and FTAM.
The Presentation Layer (Layer 6) defining data formats, such as ASCII text, EBCDIC text, binary, BCD, and JPEG and is responsible for formatting data exchange..
Encryption also is defined as a presentation layer service. Examples include: JPEG, ASCII, EBCDIC, TIFF, GIF, PICT, encryption, MPEG, and MIDI.
The Session Layer (Layer 5) defines how two computers establish, synchronize, maintain, and end communication sessions. This includes the control and management of multiple bidirectional messages so that the application can be notified if only some of a series of messages are completed. This allows the presentation layer to have a seamless view of an incoming stream of data.
The presentation layer can be presented with data if all flows occur in some cases. There are no separate session layer protocols as there are at the lower layers. Session layer functions are integrated into other protocols that include presentation and application layer functions. The transport, network, data-link, and physical layers are concerned with the proper transmission of data across the network. The session layer and above are not involved in that part of the communications process. The session layer provides 22 services. The most important of these services are called dialog control and dialog separation. Examples include: RPC, SQL, NFS, NetBIOS names, AppleTalk ASP, and DECnet SCP.
Transport Layer (Layer 4) defines several functions, including the choice of protocols. The most important Layer 4 functions are error recovery and flow control. The transport layer may provide for retransmission, i.e., error recovery, and may use flow control to prevent unnecessary congestion by attempting to send data at a rate that the network can accommodate, or it might not, depending on the choice of protocols. Multiplexing of incoming data for different flows to applications on the same host is also performed. Reordering of the incoming data stream when packets arrive out of order is included. Examples include: TCP, UDP, and SPX.
Network Layer (Layer 3) defines end-to-end delivery of data packets and defines logical addressing to accomplish this. It also defines how routing works and how routes are learned. The OSI Reference Model fragments a packet into smaller packets to accommodate media with smaller maximum transmission unit sizes. The Internet Protocol (IP) is the cornerstone of the Transmission Control Protocol/Internet Protocol (TCP/IP) suite and the most frequently used network layer protocol. Other examples include: IPX, AppleTalk DDP, NetBIOS, NetBEUI and ICMP.
Data Link Layer (Layer 2) is the channel between the computer's networking hardware and networking software. This layer is concerned with getting data across one particular link or medium. The data link protocols define delivery across an individual link. These protocols are necessarily concerned with the type of media in use. To implement a data-link layer protocol, the following hardware and software is needed: Network interface cards (NICs), which are also called Network adapters; Network adapter drivers;
Network cables and ancillary connecting hardware; and Network hubs. NICs and hubs are designed for specific data-link layer protocols, and it cannot mix with other products or different kinds of protocols. Some network cables are protocol-specific, while others can be used with different protocols. The most popular data-link layer protocol is Ethernet while Token Ring is also common. Data-link layer protocol specifications include the three basic elements: A format for the frame, A mechanism for controlling access to the network medium, One or more physical layer specifications for use with the protocol Examples include: IEEE 802.3/802.2, HDLC, Frame Relay, PPP, FDDI, ATM, and IEEE 802.5/802.2.
Physical Layer (Layer 1) deals with the physical characteristics of the transmission medium. Connectors, pins, use of pins, electrical currents, encoding, and light modulation are all part of different physical layer specifications. It defines the nature of the network's hardware elements. It also defines what kind of network interface adapter should be used and the hub that should be used. Different kinds of copper or fiber optic cable can be used, and a wide variety of wireless solutions. Usually when a LAN is set up, the physical layer specifications are related to the data-link layer. The data-link layer protocol, Ethernet, helps with the different kinds of options in the physical layer. Examples includes:
EIA/TIA- 232, V.35, EIA/TIA-449, V.24, RJ-45, Ethernet, 802.3, 802.5, FDDI, NRZI, NRZ, and B8ZS.
Get FreeCCENT , A+ and CCNA Practice Exams and Study Guides.
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- Optimize Your Website for the Better Sight
- How To Develop & Implement A Network Security Plan
- Mastering VoIP: Overcoming Common Communication Challenges
- What Concerns Do Enterprises Have When Choosing Network Monitoring Software?
- Spectrum Router Red Light: Troubleshooting Guide and Solutions
- Web Development Made Easy: Why Outsourcing is the Smart Choice
- INTERNET OF THINGS
- Enhancing Business Communication with 3CX: A Powerful Unified Communications Solution
- How to Fix "No Signal, Please Check Your Antenna Connection" Error
- AN INTRODUCTION TO INTERNET MARKETING
- Passwordless is the New Cyber Security, Emir Ceric’s Meveto Transform Verification, Logging In and Remote Sign Out
- The Ultimate Guide to Master YouTube and Monetization
- Preventing data theft in an enterprise environment
- The Art Of Cold Calling [Mastery In Seven Simple Steps]
- Quantum Computing and the future of IT Security
- 5G TECHNOLOGY AND IOT: HOW DO THESE TRENDS RELATE?
- SkyVPN Launches New Gaming Servers with Dedicated Servers for PUBG
- Smm reseller panel
- Steps to Transfer Files Using Kindle Desktop Application
- Save time on your FTP updates with FTPGetter Professional
- Add a file hosting and sharing service to your site with YetiShare
- MCS Multicast Switch for Next Generation ROADM
- Business Networking Tips for Beginners
- Using Virtual Serial Ports in Proteus
- Network Security Checklist for All Types of Businesses
- Create Your Own File-Hosting Website with YetiShare
- Cat5 cable vs Cat6 Cables: What are the Contrast?
- Automate FTP Downloads and Uploads with FTPGetter Professional
- On Demand Freelance Marketplace For Field Engineers
- Cisco Network Infrastructure Services in San Francisco