Software Information |
OSI Layers Model
Introduction During the early years of our modern computer era, very few standards and protocols existed between various manufacturers. However, as time went on and computer technology continued to improve and become more widespread, it became apparent that standards would be necessary to ensure compatibility. This was especially true with regard to networks, and networking technology. Since the main purpose of a network is to share information, a standard that governs how this information is formatted, transmitted, received and verified would make it possible for information to be shared openly, even when dealing with dissimilar networks. This need for a standard means of implementing open communications led the ISO and ANSI to develop the seven-layer network communications model known as Open Systems Interconnect. By providing guidelines regarding the way network equipment should be manufactured and how network operating systems communicate on a network, the OSI model became the common link that allows data to be transmitted and exchanged reliably. Although it does not actually perform any functions or do any of the actual work, the OSI model defines the way things should be done by the software and hardware on a network so that communications can take place between two computers or nodes. In this way, the OSI model provides a universal set of rules that make it possible for various manufacturers and developers to create software and hardware that is compatible with each other. This makes for organized communications. As I thought about this, I related it to the freeways that connect the various states of the mainland U.S. Because all of these freeways were constructed with the same set of standards regarding the width of each lane, the proper side that a person should drive on, the speed at which they should travel, and so on, people can comfortably drive across the country in an organized and efficient manner and car manufacturers are able to design cars within these guidelines as well. On the other hand, if each state had devised its own set of rules, each differing from the other, not only would there be a lot more chaos on the roads, but also car manufacturers would have a hard time designing vehicles that would be compatible with each state's roads. To me, this illustrates the importance of the OSI model with respect to network communications. Not only is it the foundation for all network communications today, but also because it is such a fundamental part of these communications, it becomes very apparent to me that it is very important for a network technician to understand the OSI model in full detail. The OSI model is made up of the following layers: the physical, data link, network, transport, session, presentation and application. Together, these seven layers are collectively referred to as a stack. As a node receives data, each layer starting with the physical layer extracts the various portions of the packet and this process works its way up to the application layer. When data is sent, it begins at the application layer and travels down to the physical layer. The information is pushed to the next layer of the stack by means of commands called primitives. Each layer uses a peer protocol to encode the information, which ensures that the same layer on the receiving node will be able to understand the information. Physical Layer Beginning at the bottom, the first layer is the physical layer. It governs the actual voltages, type of electrical signals, mechanical connections and other items relating to the actual data transmission medium. This includes cabling types, distances and connectors, as well as protocols like CSMA/CD. Data Link Layer The next layer is the data link layer. This is the layer that actually constructs the frames, and it also performs error checking using CRC. It ensures that the frames are sent up to the next layer in the same order that they were received, providing an error free virtual path to the network layer. The data link layer consists of two sub layers; the logical link control (LLC) and the media access control (MAC), which provide reliable communications by ensuring the data link is not broken and also by examining packet address information. A bridge is an example of a device that works at this layer. A bridge learns, forwards and filters traffic by examining the layer 2 MAC address. This helps segment network traffic. More recently, bridges have been replaced by switches, which performs the same functions as a bridge, but can do so on each port. To find out more about switches, visit the Products link on the left. Network Layer Moving up to the next layer in the stack we come to the network layer. This layer actually routes packets of data, finding a path (both physical and logical) to the receiving or destination computer. It provides a unique address for each node through address resolution. One of the most common protocols for routing information at this layer is the Internet Protocol (IP). An example of hardware that can operate at this layer is a router. Although routers are often used to allow a LAN to access a WAN, layer 3 switches can also provide routing capabilities, but often at full wire-speed. Transport Layer The transport layer makes sure that the data arrives without errors, in the proper sequence and in a reliable condition. It uses flow control to make sure that information is sent at the proper speed for the receiving device to be able to handle it, and it repackages large data into smaller messages and then back again at the receiving node. An example protocol at this layer is the Transmission Control Protocol (TCP). Layer 4 switches can use the port information found in the TCP header to provide QoS (Quality of Service) and load balancing. To learn more about multi-layer switches, visit the Products link. Session Layer The session layer establishes the link between two nodes and ensures that the link is maintained and then disconnected. This is referred to as the session. It also makes sure the session is orderly, establishing which node transmits first, how long it can transmit, and what to do in case of an error. It also handles the security of the session. Presentation Layer The presentation layer deals with the actual formatting of the data. It handles compression, encryption, as well as translation to make sure differences in formatting can be read by the receiving node. For example, data might be converted from EBCDIC to ASCII formatting so that the receiving node can understand it. Application Layer This brings us to the seventh and final layer, the application layer. It allows applications access to network services, such as file and printer sharing, as well as file transfer and management services. This would be the layer that a programmer uses to allow his application to access a network service, such as linking into a database. Although this explains the flow of data and what processes are performed by each layer starting with the physical layer and working to the top, or application, layer, the process would be the same, only reversed, for data flowing from the application layer and down to the bottom, or the physical layer. Conclusion By adhering to this standard model of communications, modern networks, including the Internet, have come into existence. For anyone interested in implementing and supporting today's modern networks, an understanding of the OSI model and its various layers is crucial. Indeed, this standard of communications lays the foundation for all of todays modern network hardware and software. Kashif Raza http://www.networkingtutorials.net
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
Microsoft Great Plains Beverage Production & Distribution - Implementation & Customization Highlight Microsoft Business Solutions Great Plains has many years of successful implementation in multiple horizontal markets. In today's small article we'll share our experience of implementing and customizing Microsoft Great Plains, formerly Great Plains eEnterprise/Dynamics in beverage production and distribution industries. Internet Relay Chat - A Basic Introduction What is IRC?IRC is Internet Relay Chat. It is a group of networked server computers that let clients (or users) connect and passes their message among the networked servers in almost real time. Groupware as a Document Manager: Collaboration Series #3 This article is the third of a series of articles exploring specific aspects of groupware. The brief informational articles in this series discuss some of the technologies associated with groupware, as well as some of the characteristics of groupware. Microsoft Great Plains: Manufacturing or Bill of Materials - Overview for IT Specialist Microsoft Great Plains is main Microsoft Business Solutions product, targeted to mid-size companies. Currently Microsoft is in progress of transforming several ERP products it has: Microsoft Great Plains, Solomon and Navision into several business suites - Microsoft Financial, Microsoft HR, Microsoft Manufacturing, Microsoft Logistics. Linux - Keyboard Or Mouse Just stress testing one of the latest Linux distributions. Been testing it for about two months. Microsoft Great Plains Oil & Gas - Implementation & Customization Highlights Microsoft Great Plains serves the wide spectrum of horizontal markets. Great Plains could be considered as ERP platform, which you could expand with third party modules or advance with your own in-house custom functionality. Selecting Corporate ERP: Microsoft Business Solutions Great Plains - Estimation Parameters As we could imagine, if you are reading this article - you are in the decision making mode, probably replacing legacy system with the new one or abandoning either Unix/Mainframe or Apple direction for your corporation. In any case, nobody should make an outside influence on your decision - you should be maximally objective. MultiNational Corporation ERP Implementation - Microsoft Business Solutions Great Plains If you look back to the history, you will see that ERP for large publicly traded company had to be built upon very reliable hardware (more likely non-Intel hardware: mainframe, Sun sparc, etc.), powerful database platform: Oracle, DB2, Ingress, Sybase and reliable OS: UNIX. Photoshop Files and Formats People often ask me: What image file formats will Photoshop open or save in? What are the advantages/disadvantages?Photoshop has the capability to open and save many different graphic files. Here are some of the most popular ones. The End of Spyware? The US House of Representatives has recently passed the "Spy Act" - or to give it its full title - the Securely Protect Yourself Against Cyber Trespass Act. This aims to prevent software companies from installing spyware on users PCs without their knowledge, and anyone found guilty of breaching the act faces a fine of up to $3 million. Spyware, Adware, etc. -- Terms and Common Sense When reading an article where some term is used often, it is useful to make sure the author of the article and you mean the same. Not surprisingly for those who still remember English lessons at school, every noun ending with "ware" is a mixture of objects having something in common--usually used for similar purposes. Pros and Cons of Using FREE Software in Your Business Itâ??s easy to understand why you might be drawn to the allure of free software. After all, it is free and free is always a good price to pay. Microsoft Great Plains - Typical Problems And Fixes - Overview For IT Administrators How to delete the user? This is the first problem you encounter - when user shuts down the computer - Great Plains doesn't have the command to log off the user and when user tries to login the next day - she gets error message that user is already logged on. The fix:Microsoft SQL Server - open SQL Query Analyzer, switch to DYNAMICS database and run the following script: DELETE ACTIVITY WHERE USERID='KATHY'. Tripwire for Linux File Integrity What is Tripwire?Tripwire is a form intrusion detection system (IDS) that helps you keep tabs on the integrity of the files on your computer. Quite simply it will help identify files or modifications made to your system in the event someone compromised your system. Fleet Maintenance Software Reviews Innovative Maintenance Systems (IMS) is one company that offers solutions for companies in need of fleet maintenance software. One of their most popular products is Fleet Maintenance Pro®. Examining the Substance of Studio MX To all web designers out there, this article is for you! I guess you already heard about Studio MX (I think so!) - the ideal bundle for professional web designers, bringing together Dreamweaver MX for page design, Flash MX for animation and interactivity, and Fireworks MX for editing and optimizing graphics. With all these components, it certainly provides professional functionality for every aspect of web development. Antivirus Software - Get The Bugs Before They Get You! You turn on your computer, and it doesn't look quite right. Maybe your icons have changed, or the background picture is wrong. Is Your Computer Sick? Viruses and spyware usually show up on your computer one of two ways.Either they invade your system with a frontal assault like the Huns attacking the Romans, or they sneak in a back door like a cat burglar. Microsoft Business Solutions Products Selection: ERP, CRM, Retail Management Let's first look at your ERP system selection (without Retail Solution). Your options are:Microsoft Great Plains. Microsoft CRM Implementation & Remote Support We would like to give you pluses and minuses of Microsoft CRM.Web and MS Outlook based client - this means that you don't need additional installations or training - everyone is using Outlook if you are on Windows XP/2000/2003SQL Server database - just to mentionIntegration with Microsoft Exchange 2003/2000 - this means that replies to CRM originated emails will be captured and store in CRM as activities for the Contact, Account or Lead. |
home | site map | contact us |