The 7 Layers of the OSI Layer 7 Application ( Data ) It is the layer that actually interfaces with applications on your computer that desire to communicate. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services like HTTP, Telnet, File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP), Pop3 and many others. We talk about these protocols as being in the application layer, but in reality, most of these protocols actually extend down through the session layer. In reality, most services or protocols can span multiple layers, but we talk about these as being application layer protocols because that is the highest layer that these protocols function at.
Layer 6 Presentation ( Data ) The presentation layer presents the session layer data to the application, it is a formatting layer. It deals with things such as syntax, encryption and compression. For example, when we visit a web page using the HTTP protocol, if we want to use encrypted connection, the presentation layer will perform that encryption. In this case HTTP uses another protocol, referred to as SSL, to provide that encryption. Other presentation layer CTA5: Robert Duben 2013 Page 2 of 4 implementations are encryption (like IPSec), Wep, WPA, Kerberos, ASCII, MIDI, JPEG and MPEG. It is sometimes called the syntax layer. Layer 5 Session ( Data ) This layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end.. Each client connection is referred to as a session. For example, each client that connects to some server is identified as a session. It is also possible for that user to create multiple sessions on the same server, for instance, if the user opens a web page from different browsers. The session layer uses a session ID to identify each unique session which keeps the data stream from different clients separate. The session layer is responsible for setting up these communication sessions and terminating them. Termination happens when a session is idle for some period of time.
Layer 4 TransPort ( Segments ) TCP and UDP work at the transport layer. TCP provides the reliable, in-order delivery of your data, as well as error correction, sequencing, and windowing (flow control). The transport layer is responsible for segmentation of that data. With segmentation, larger pieces of data are divided into smaller blocks. Each block is identified with a sequence number. As these blocks are sent through the network, the sequence number helps the receiving device reassemble those blocks into the correct order. It also helps the receiving device realize when one of those segments is missing. Those units of data that are created at the transport layer are called segments. Flow control means that if the sending device is sending data quickly, the receiving device may not be able to keep up, in which case it can send a message back to the sending device to slow down or to speed up. TCP and UDP Two specific protocols that are used at the transport layer are TCP and UDP. TCP is referred to as a connection oriented protocol, because it takes advantage of sequencing, error correction and flow control to ensure that data sent from upper layers is received at the receiving device. UDP is referred to as a connectionless protocol, because it is more concerned with moving data through the network, without necessarily ensuring that everything arrives at the destination device. When using UDP, error correction can be preformed somewhere in the upper layers. Port Numbers Another thing that happens at the transport layer is the assignment of port numbers. A port is a number which identifies an upper layer service running on a server. For example, our server can be a web server, an email server, a DNS server or it can run any other supported service at the same time. In this case, information received from lower levels, up to the transport layer, needs to be routed to the appropriate service running on the server. This is done by the port number. Each service is associated with a unique port number such as 80 for web server, or 53 for DNS. By using port numbers the transport layer can identify the upper layer protocol that is used and then send that data to the correct protocol.
Layer 3 Network ( Packets ) The network layer is responsible for moving data between systems throughout the internetwork. Any data at layer 3 is called a packet. CTA5: Robert Duben 2013 Page 3 of 4 The network layer is where the IP part of TCP/IP happens. Because IP works at layer 3, you could also say that routing and routers work at layer 3 using switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing takes a message sent from an end device to a router or through many connected routers, to the final destination device. One of the important things in this layer is the assignment of the IP address. The IP address is often referred to as a network layer address, or a layer three address. It's also referred to as a logical address. Layer 3 ( IP based ) switches, routers and bridges are found at this layer. All the routing protocols IPv4, IPv6, OSPF, ICMP, IGMP and ARP are here.
Layer 2 Data Link ( Frames ) This is where interesting things start to happen. The data link layer involves frames and uses the burned in MAC addresses that NIC cards and router interfaces have. It's also referred to as a physical address. Ethernet only knows about MAC addresses, when an IP packet is destined for a host on an Ethernet network, it must have the IP address translated to a MAC address so Ethernet can deliver it. Layer 2 ( MAC based ) switches route these Ethernet packets to the proper switched port. To do this, they keep a MAC address table which maps the MAC address port on the switch. Layer 2 ( MAC based ) switches live on this layer. You also find 802.11, WiFi, ATM, PPTP, L2TP and ISDN here.
Layer 1 Physical ( Bits ) The physical layer provides the actual connection between devices. Ethernet cables, fiber optic cables and even WiFi signals work at layer 1. The data that comes down to the physical layer is just a series of bits. Those bits become electrical impulses, light pulses, sound (in the case of a modem), or some kind of a radio signal with wireless devices. The physical layer is where cables and patch panels, RJ-45 connectors as well as hubs and repeaters live. * We have seen drag and drop questions in the booth, where the right side of your screen has the 7 layers all mixed up and you must drag and drop them over to the left side of the screen in the proper order. You number them like floors in an elevator 1 st at the bottom and 7 th at the top. Robert
The OSI model compared to the TCP/IP or DOD model.
* There is only one layer that is identical in both models, the Transport layerit is a test question. -Robert CTA5: Robert Duben 2013 Page 4 of 4
The OSI from the perspective of 007
7. Bond receives a message from No. 1
6. Message translated, compressed & encrypted
5. Security checks for message completeness
4. Message broken into smaller packages, combined with others
3. Bond advised on fastest route
2. Messages placed in special pouch
1. Bond gets into his Aston Martin to deliver
How does the OSI model help you on a practical basis? While most of us know the OSI model, I believe that most of us do not make the very helpful connection between the OSI model and the daily, real-world tasks and troubleshooting that a network admin must perform. Most of us think of the OSI model as some kind of arcane textbook concept that must be learned for the exam and can then be forgotten. On the contrary, I believe it can be extremely helpful to network admins on a day-to-day basis. Understanding the network big picture There are many new network admins out there who may understand how to unlock a switch port or how to configure IP addressing, but they dont see, really, how the network functions. By understanding the OSI model, you can see the big picture of how the network really works. You can understand how bits are sent as electrical signals across copper wires; how those are reassembled into frames by Ethernet in layer 2; how the frames are switched to the right destination; how that PC disassembles the frame and packet to verify that it is the right destination IP; how it breaks up the segment at the transport layer, responds with an acknowledgement (ACK), and sends the data up to the session, presentation, and application layers; and how every tiny communication requires this whole process to happen many times per second. It is an amazing processwhen it works