What is the OSI Model? | 7Layers of OSI Model.

Blog

    

The Open Systems Interconnection Model (OSI Model) is a conceptual framework that explains the functions of a networking system. It is used to transport data across a network as it goes through different tiers.



What is the OSI Model?



The open systems interconnection (OSI) model is a conceptual paradigm developed by the  International Organization for Standardization that allows disparate communication systems to communicate In layman's terms, the OSI establishes a standard for various computer systems to interact with one another.

The OSI Model may be thought of as a universal computer networking language. It is built on the idea of dividing a communication system into seven abstract levels, each one layered on top of the previous.




Each layer of the OSI Model is responsible for a certain function and communicates with the layers above and below it. DDoS attacks target certain network levels; application layer attacks target layer 7, while protocol layer attacks target layers 3 and 4.


Why is the OSI model important?


Although the contemporary Internet does not fully adhere to the OSI Model (rather, it adheres to the simplified Internet protocol suite), the OSI Model is nevertheless extremely useful for debugging network issues. Whether it’s one person who can’t get their laptop on the Internet, or a web site being down for thousands of users, the OSI Model can help to break down the problem and isolate the source of the trouble.A lot of unneeded work may be avoided if the problem can be focused down to one single layer of the model.


What are the OSI Model's seven layers?


From top to bottom, the OSI model's seven abstraction levels are as follows:




7. Application layer


This is the sole layer that directly interacts with user data. Software applications like web browsers and email clients rely on the application layer to initiate communications. However, it should be noted that client software programmes are not part of the application layer; rather, the application layer is in charge of the protocols and data processing on which the software relies to deliver relevant data to the user. HTTP and SMTP are examples of application layer protocols (Simple Mail Transfer Protocol is one of the protocols that enables email communications).




6. The presentation layer


This layer is largely responsible for preparing data for usage by the application layer; in other words, layer 6 makes data presentable for apps to consume. The presentation layer is responsible for translation, encryption, and compression of data.


Two gadgets that communicate Because several encoding methods may be used while communicating, layer 6 is responsible for transforming incoming data into a syntax that


If the devices are interacting via an encrypted connection, layer 6 is in charge of applying encryption on the sender's end and decoding encryption on the receiver's end so that the application layer may receive unencrypted, readable data.


Finally, the presentation layer is in charge of compressing data received from the application layer before passing it on to layer 5. By reducing the quantity of data exchanged, this improves the speed and efficiency of communication.





5. The session layer

This layer is in charge of starting and shutting communication between the two devices. The session is the period of time between when the communication is initiated and concluded. The session layer guarantees that the session remains open long enough to transfer all of the data being transferred, and then swiftly ends the session to prevent.



Data transport is also synchronised with checkpoints by the session layer. If a 100 megabyte file is being transmitted, for example, the session layer may establish a checkpoint every 5 megabytes. In the case of a disconnect or a crash after 52 megabytes have been transmitted, the session might be continued from the last checkpoint, meaning just 50 more megabytes of data need to be transferred. Without the checkpoints, the entire transfer would have to start over.




4. The transport layer


Layer 4 is in charge of the two devices' end-to-end communication. This comprises transferring data from the session layer and segmenting it before sending it to layer 3. The receiving device's transport layer is in charge of reassembling the segments into data that the session layer can ingest.

The transport layer is also in charge of flow control and fault handling. Flow control establishes an ideal transmission speed to guarantee that a sender with a fast connection does not overwhelm a receiver with a sluggish connection. On the receiving end, the transport layer handles error control by checking that the data received is full and requesting retransmission if it isn't.


3. Network layer

The network layer is responsible for facilitating data transfer between two different networks. If the two communicating devices are on the same network, the network layer is unneeded. On the sender's device, the network layer divides segments from the transport layer into smaller pieces called packets, which are then reassembled on the receiving device. Routing is the process by which the network layer determines the optimum physical path for data to take to reach its destination.





2. The second layer is the data link layer.


The data connection layer is similar to the network layer in that it permits data flow between two devices on the SAME network. The data link layer divides packets from the network layer into smaller pieces known as frames. The data link layer, like the network layer, is in charge of flow control and error control in intra-network communication (The transport layer only does flow control and error control for inter-network communications).






1. The first is the physical layer.


This layer comprises the physical data transport equipment, such as cables and switches. This layer also converts the data into a bit stream, which is a string of 1s and 0s. Both devices' physical layers must also agree on a signal protocol so that the 1s and 0s on both devices may be recognised.


The movement of data across the OSI Model

Human-readable data must go down the seven levels of the OSI Model on the sending device and then up the seven layers on the receiving end in order to be exchanged over a network from one device to another.

For example, Mr. Taylor wishes to send an email to Ms. Parker, Mr. Taylor composes his message in an email application on his laptop and then pushes ‘send’. His email application will send his email message to the application layer, which will select a protocol (SMTP) and forward the data to the presentation layer. The presentation layer will then compress the data before passing it on to the session layer, which will begin the communication session.


The data will then be segmented at the sender's transportation layer before being broken down into packets at the network layer, which will be broken down even further into frames at the data link layer.

When Ms. Parker's computer gets the bit stream over a physical channel (such as her wifi), the data flows through the same set of layers, but in the reverse order. The physical layer will first transform the bitstream from 1s and 0s to frames, which will then be transmitted to the data link layer. The frames will then be reassembled by the data link layer into packets for the network layer. The network layer will next separate the packets into segments for the transport layer, which will reassemble the segments into a single piece of data.

The data will next flow onto the receiver's session layer, which will send it on to the presentation layer before terminating the communication session. The presentation layer will then decompress the data and transfer it up to the application layer. Ms. Parker's email programme will then get the human-readable data from the application layer, allowing her to view Mr. Taylor's email on her laptop screen.

Ask any Doubt related to this site...

إرسال تعليق

Ask any Doubt related to this site...

Post a Comment (0)

أحدث أقدم