SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Tutorial:Overview




                 Understanding The
                 OSI 7-Layer Model
            The OSI model is a way of describing how different applications and protocols interact
                 on network-aware devices. We explain the role of each layer and of the stack.

                                                                                                                       By Neil Briscoe




     I    f you spend much time in the com-
          pany of network technicians you
          will eventually hear them say
     something like “That’s Layer 2 only”
                                                 on a slightly modified layer system.
                                                 TCP/IP, for example, uses a 6- rather
                                                 than a 7-layer model. Nevertheless, in
                                                 order to ease the exchange of ideas,
                                                                                             governed by a device’s MAC address,
                                                                                             the six-byte number that is unique to
                                                                                             each NIC. Devices which depend on
                                                                                             this level include bridges and
     or “That’s our new Layer 4 switch”.         even those who only ever use TCP/IP         switches, which learn which segment’s
     The technicians are referring to the OSI    will refer to the 7-layer model when        devices are on by learning the MAC
     (Open System Interconnection) Refer-        discussing networking principles with       addresses of devices attached to vari-
     ence Model.                                 peers from a different networking           ous ports.
         This model defines seven Layers         background.                                    This is how bridges are eventually
     that describe how applications run-            Confusingly, the OSI was a work-         able to segment off a large network,
     ning upon network-aware devices             ing group within the ISO (Interna-          only forwarding packets between
     may communicate with each other.            tional Standards Organisation) and,         ports if two devices on separate seg-
     The model is generic and applies to all     therefore, many people refer to the         ments need to communicate. Switches
     network types, not just TCP/IP, and         model as the ISO 7-layer model. They        quickly learn a topology map of the
     all media types, not just Ethernet. It is   are referring to the same thing.            network, and can thus switch packets
     for this reason that any network tech-         Traditionally, layer diagrams are        between communicating devices very
     nician will glibly throw around the         drawn with Layer 1 at the bottom and        quickly. It is for this reason that mi-
     term “Layer 4” and expect to be under-      Layer 7 at the top. The remainder of        grating a device between different
     stood.                                      this article describes each layer, start-   switch ports can cause the device to
         It should be noted, however, that       ing from the bottom, and explains           lose network connectivity for a while,
     most protocols in day-to-day use work       some of the devices and protocols you       until the switch, or bridge, re-ARPs
                                                 might expect to find in your data cen-      (see box on ARP).
                                                 tre operating at this layer.
                                                                                             Layer 3
                                                 Layer 1
                                                                                                 Layer 3 is the Network Layer, pro-
                                                     Layer 1 is the Physical Layer and,      viding a means for communicating
                                                 under the OSI Model, defines the            open systems to establish, maintain
                                                 physical and electrical characteristics     and terminate network connections.
                                                 of the network. The NIC cards in your       The IP protocol lives at this layer, and
                                                 PC and the interfaces on your routers       so do some routing protocols. All the
                                                 all run at this level since, eventually,    routers in your network are operating
                                                 they have to pass strings of ones and       at this layer.
                                                 zeros down the wire.
                                                                                             Layer 4
                                                 Layer 2
                                                                                                Layer 4 is the Transport Layer, and
                                                    Layer 2 is known as the Data Link        is where TCP lives. The standard says
                                                 Layer. It defines the access strategy for   that “The Transport Layer relieves the
                                                 sharing the physical medium, includ-        Session Layer [see Layer 5] of the bur-
                                                 ing data link and media access issues.      den of ensuring data reliability and
                                                 Protocols such as PPP, SLIP and HDLC        integrity”. It is for this reason that peo-
            Figure 1 - The 7 layers of           live here.                                  ple are becoming very excited about
                 the OSI model.                     On an Ethernet, of course, access is     the new Layer 4 switching technology.



Issue 120 (July 2000) Page 13                    PC Network Advisor                                                            File: T04124.1
                                                       www.itp-journals.com
Tutorial:Overview




                                                                                               B, the packets have to descend and
                                                                                               then re-ascend the layers (the stack).
          “They are called stacks because, in                                                      Consider the following example.
                                                                                               An application forms a packet of data
        order to get a packet from an application                                              to be sent; this takes place at Layer 7.
                                                                                               As the packet descends the stack, it is
         running on device A to an application                                                 wrapped in headers and trailers, as
                                                                                               required by the various protocols, un-
           running on device B, the packets                                                    til, having reached Layer 1, it is trans-
                                                                                               mitted as a frame across the medium
          have to descend and then re-ascend                                                   in use. Upon reaching device B, it re-
                                                                                               ascends the stack, as the device strips
                 the layers (the stack).”                                                      off the appropriate headers and trail-
                                                                                               ers, delivering just the application data
                                                                                               to the application.
                                                                                                   The OSI tried to keep to as few lay-
     Before these devices became available,        software to look further up the layer       ers as possible for the sake of simplic-
     only software operated at this layer.         model. They are required to under-          ity. The fact that the 7-Layer model is
         Hopefully, you will now also un-          stand when a session is taking place,       universally used to describe where a
     derstand why TCP/IP is uttered in one         and not to interfere with it.               device or protocol sits in the scheme of
     breath. TCP over IP, since Layer 4 is                                                     things shows that the designers did an
     above (over) Layer 3. It is at this layer     Layer 6                                     excellent job of achieving their aims.
     that, should a packet fail to arrive (per-
     haps due to misrouting, or because it            Layer 6 is the Presentation Layer.
     was dropped by a busy router), it will        This is where application data is either
     be re-transmitted, when the sending           packed or unpacked, ready for use by                Further Reading
     party fails to receive an acknow-             the running application. Protocol con-
                                                                                                 www.whatis.com
     ledgement from the device with which          versions, encryption/decryption and
                                                                                                 This impressive site hosts infor-
     it is communicating.                          graphics expansion all takes place
                                                                                                 mation on a wide range of sub-
         The more powerful routing proto-          here.
                                                                                                 jects, a lot of it network-related,
     cols also operate here. OSPF and BGP,
                                                                                                 including a more in-depth discus-
     for example, are implemented as pro-          Layer 7                                       sion of the OSI. Visit the site, click
     tocols directly over IP.
                                                                                                 on the letter O at the top, and then
                                                      Finally, Layer 7 is the Application
                                                                                                 scroll down the list of topics until
     Layer 5                                       Layer. This is where you find your
                                                                                                 you find OSI.
                                                   end-user and end-application proto-
        Layer 5 is the Session Layer. It pro-      cols, such as telnet, ftp, and mail (pop3
     vides for two communicating presen-           and smtp).
     tation entities to exchange data with
     each other. The Session Layer is very         The Stack
     important in the E-commerce field
     since, once a user starts buying items           Our imaginary listener, eavesdrop-
     and filling their “shopping basket” on        ping on the conversations of network                                       PCNA
     a Web server, it is very important that       engineers, would hear them refer to IP
     they are not load-balanced across dif-        stacks quite frequently. They are called
     ferent servers in a server pool.              stacks because, in order to get a packet
        This is why, clever as Layer 4             from an application running on device
     switching is, these devices still operate     A to an application running on device

                                                                                                                    Copyright ITP, 2000
                      Address Resolution Protocol (ARP)
           Bridges, switches, and most network devices keep a table mapping IP
        addresses to Media Access addresses. Moving a device between ports
        invalidates these tables, and hence the device’s view of the world.
        Fortunately, the devices age their table entries, typically clearing them out                    The Author
        five minutes after the last time a packet was seen from a particular entity.             Neil Briscoe is a networking con-
        This is sometimes called re-ARPing. Most bridges and switches provide                    sultant and Cisco guru and can be
        management functions to allow you to clear the ARP entry manually, should                contacted as neil.briscoe@itp-
        you have needed to move a device due to a failed port.                                   journals.com.




File: T04124.2                                    PC Network Advisor                                            Issue 120 (July 2000) Page 14
                                                         www.itp-journals.com
Additional Resources

    •   TCP/IP Tutorial

    •   Understanding IPv6

    •   Understanding NAT

    •   Understanding Frame Relay

    •   Understanding DHCP

    •   Virtual Private Networking Explained



All these articles are available free online now at
www.pcnetworkadvisor.com




                                                                            PCNA

                                                                 Copyright ITP, 2002


                                PC Network Advisor
                                      www.pcnetworkadvisor.com
New Reviews from Tech Support Alert

Anti-Trojan Software Reviews
A detailed review of six of the best anti trojan software programs. Two products
were impressive with a clear gap between these and other contenders in their
ability to detect and remove dangerous modern trojans.

Inkjet Printer Cartridge Suppliers
Everyone gets inundated by hundreds of ads for inkjet printer cartridges, all
claiming to be the cheapest or best. But which vendor do you believe? Our
editors decided to put them to the test by anonymously buying printer cartridges
and testing them in our office inkjet printers. Many suppliers disappointed but we
came up with several web sites that offer good quality cheap inkjet cartridges
with impressive customer service.

Windows Backup Software
In this review we looked at 18 different backup software products for home or
SOHO use. In the end we could only recommend six though only two were good
enough to get our “Editor’s Choice” award

The 46 Best Freeware Programs
There are many free utilities that perform as well or better than expensive
commercial products. Our Editor Ian Richards picks out his selection of the very
best freeware programs and he comes up with some real gems.




                              Tech Support Alert
                           http://www.techsupportalert.com

Contenu connexe

Tendances

Chapter 2 network models -computer_network
Chapter 2   network models -computer_networkChapter 2   network models -computer_network
Chapter 2 network models -computer_networkDhairya Joshi
 
TransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinksTransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinksSwapnil Raut
 
Computer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabusComputer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabusNANDINI SHARMA
 
Important questions in optical communication and networking ec2402 ec 2402 su...
Important questions in optical communication and networking ec2402 ec 2402 su...Important questions in optical communication and networking ec2402 ec 2402 su...
Important questions in optical communication and networking ec2402 ec 2402 su...kalathi
 
IEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer ProtocolIEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer ProtocolSajith Ekanayaka
 
Wireless network basics
Wireless network basicsWireless network basics
Wireless network basicsKumar
 
A Methodology for the Emulation of Boolean Logic that Paved the Way for the S...
A Methodology for the Emulation of Boolean Logic that Paved the Way for the S...A Methodology for the Emulation of Boolean Logic that Paved the Way for the S...
A Methodology for the Emulation of Boolean Logic that Paved the Way for the S...ricky_pi_tercios
 
Chapter 10.slides
Chapter 10.slidesChapter 10.slides
Chapter 10.slideslara_ays
 
640 802-study-guide-sample
640 802-study-guide-sample640 802-study-guide-sample
640 802-study-guide-samplerickybcool
 
Solution manual for_data_communications
Solution manual for_data_communicationsSolution manual for_data_communications
Solution manual for_data_communicationsHarishKumar2054
 

Tendances (20)

Ch02
Ch02Ch02
Ch02
 
Chapter 2: Network Models
Chapter 2: Network ModelsChapter 2: Network Models
Chapter 2: Network Models
 
Iso layers
Iso layersIso layers
Iso layers
 
Chapter 2 network models -computer_network
Chapter 2   network models -computer_networkChapter 2   network models -computer_network
Chapter 2 network models -computer_network
 
TransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinksTransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinks
 
Chapter 9 v6.0
Chapter 9 v6.0Chapter 9 v6.0
Chapter 9 v6.0
 
ONOS Deployment Brigade
ONOS Deployment BrigadeONOS Deployment Brigade
ONOS Deployment Brigade
 
Computer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabusComputer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabus
 
Important questions in optical communication and networking ec2402 ec 2402 su...
Important questions in optical communication and networking ec2402 ec 2402 su...Important questions in optical communication and networking ec2402 ec 2402 su...
Important questions in optical communication and networking ec2402 ec 2402 su...
 
Chapter 4 v6.11
Chapter 4 v6.11Chapter 4 v6.11
Chapter 4 v6.11
 
IEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer ProtocolIEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer Protocol
 
Wireless network basics
Wireless network basicsWireless network basics
Wireless network basics
 
OSI Pankaj yadav
OSI  Pankaj yadavOSI  Pankaj yadav
OSI Pankaj yadav
 
A Methodology for the Emulation of Boolean Logic that Paved the Way for the S...
A Methodology for the Emulation of Boolean Logic that Paved the Way for the S...A Methodology for the Emulation of Boolean Logic that Paved the Way for the S...
A Methodology for the Emulation of Boolean Logic that Paved the Way for the S...
 
Chapter 10.slides
Chapter 10.slidesChapter 10.slides
Chapter 10.slides
 
640 802-study-guide-sample
640 802-study-guide-sample640 802-study-guide-sample
640 802-study-guide-sample
 
Chap2
Chap2Chap2
Chap2
 
Chapter 5 v6.01
Chapter 5 v6.01Chapter 5 v6.01
Chapter 5 v6.01
 
Solution manual for_data_communications
Solution manual for_data_communicationsSolution manual for_data_communications
Solution manual for_data_communications
 
Chapter 3 v6.01
Chapter 3 v6.01Chapter 3 v6.01
Chapter 3 v6.01
 

En vedette (8)

International Movement of Labor
International Movement of LaborInternational Movement of Labor
International Movement of Labor
 
Century of phil. labor movement
Century of phil. labor movementCentury of phil. labor movement
Century of phil. labor movement
 
U.S. Labor Movement
U.S. Labor MovementU.S. Labor Movement
U.S. Labor Movement
 
Imf and world bank
Imf and world bankImf and world bank
Imf and world bank
 
Unit 1 powerpoint #7 (the gilded age the rise of unions)
Unit 1 powerpoint #7 (the gilded age   the rise of unions)Unit 1 powerpoint #7 (the gilded age   the rise of unions)
Unit 1 powerpoint #7 (the gilded age the rise of unions)
 
role of imf and world bank
role of imf and world bankrole of imf and world bank
role of imf and world bank
 
Imf & world bank
Imf & world bankImf & world bank
Imf & world bank
 
World Bank Ppt
World Bank PptWorld Bank Ppt
World Bank Ppt
 

Similaire à T04124

1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf
1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf
1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdfanandatalapatra
 
1. Summarize and describe the basic functions in the IEEE 802.11 Phy.pdf
1. Summarize and describe the basic functions in the IEEE 802.11 Phy.pdf1. Summarize and describe the basic functions in the IEEE 802.11 Phy.pdf
1. Summarize and describe the basic functions in the IEEE 802.11 Phy.pdfFashionBoutiquedelhi
 
The Solaris Network Environment (Presentation
The Solaris Network Environment (PresentationThe Solaris Network Environment (Presentation
The Solaris Network Environment (Presentationmayur6789
 
Understanding tcp=ip
Understanding tcp=ipUnderstanding tcp=ip
Understanding tcp=ipIlaya Raja
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1ahmady
 
Introduction to TCP / IP model
Introduction to TCP / IP modelIntroduction to TCP / IP model
Introduction to TCP / IP modelssuserb4996d
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3Raghu nath
 
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdfNguynTy5
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IPMannu Khani
 
Practical Wireless, Ethernet and TCP/IP Networking
Practical Wireless, Ethernet and TCP/IP NetworkingPractical Wireless, Ethernet and TCP/IP Networking
Practical Wireless, Ethernet and TCP/IP NetworkingLiving Online
 
The osi layers and ethernet protocols
The osi layers and ethernet protocolsThe osi layers and ethernet protocols
The osi layers and ethernet protocolsHassan Raza
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerNetwax Lab
 
7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.Kanishk Raj
 

Similaire à T04124 (20)

1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf
1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf
1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf
 
1. Summarize and describe the basic functions in the IEEE 802.11 Phy.pdf
1. Summarize and describe the basic functions in the IEEE 802.11 Phy.pdf1. Summarize and describe the basic functions in the IEEE 802.11 Phy.pdf
1. Summarize and describe the basic functions in the IEEE 802.11 Phy.pdf
 
The Solaris Network Environment (Presentation
The Solaris Network Environment (PresentationThe Solaris Network Environment (Presentation
The Solaris Network Environment (Presentation
 
Understanding tcp=ip
Understanding tcp=ipUnderstanding tcp=ip
Understanding tcp=ip
 
639588.pptx
639588.pptx639588.pptx
639588.pptx
 
OsI reference model
OsI reference modelOsI reference model
OsI reference model
 
Osi model
Osi modelOsi model
Osi model
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
 
Wp simoneau osi_model
Wp simoneau osi_modelWp simoneau osi_model
Wp simoneau osi_model
 
Osi model
Osi modelOsi model
Osi model
 
Introduction to TCP / IP model
Introduction to TCP / IP modelIntroduction to TCP / IP model
Introduction to TCP / IP model
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3
 
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
 
Osi model
Osi modelOsi model
Osi model
 
Practical Wireless, Ethernet and TCP/IP Networking
Practical Wireless, Ethernet and TCP/IP NetworkingPractical Wireless, Ethernet and TCP/IP Networking
Practical Wireless, Ethernet and TCP/IP Networking
 
OSI model (Tamil)
OSI model (Tamil)OSI model (Tamil)
OSI model (Tamil)
 
The osi layers and ethernet protocols
The osi layers and ethernet protocolsThe osi layers and ethernet protocols
The osi layers and ethernet protocols
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP Layer
 
7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.
 

Dernier

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Dernier (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

T04124

  • 1. Tutorial:Overview Understanding The OSI 7-Layer Model The OSI model is a way of describing how different applications and protocols interact on network-aware devices. We explain the role of each layer and of the stack. By Neil Briscoe I f you spend much time in the com- pany of network technicians you will eventually hear them say something like “That’s Layer 2 only” on a slightly modified layer system. TCP/IP, for example, uses a 6- rather than a 7-layer model. Nevertheless, in order to ease the exchange of ideas, governed by a device’s MAC address, the six-byte number that is unique to each NIC. Devices which depend on this level include bridges and or “That’s our new Layer 4 switch”. even those who only ever use TCP/IP switches, which learn which segment’s The technicians are referring to the OSI will refer to the 7-layer model when devices are on by learning the MAC (Open System Interconnection) Refer- discussing networking principles with addresses of devices attached to vari- ence Model. peers from a different networking ous ports. This model defines seven Layers background. This is how bridges are eventually that describe how applications run- Confusingly, the OSI was a work- able to segment off a large network, ning upon network-aware devices ing group within the ISO (Interna- only forwarding packets between may communicate with each other. tional Standards Organisation) and, ports if two devices on separate seg- The model is generic and applies to all therefore, many people refer to the ments need to communicate. Switches network types, not just TCP/IP, and model as the ISO 7-layer model. They quickly learn a topology map of the all media types, not just Ethernet. It is are referring to the same thing. network, and can thus switch packets for this reason that any network tech- Traditionally, layer diagrams are between communicating devices very nician will glibly throw around the drawn with Layer 1 at the bottom and quickly. It is for this reason that mi- term “Layer 4” and expect to be under- Layer 7 at the top. The remainder of grating a device between different stood. this article describes each layer, start- switch ports can cause the device to It should be noted, however, that ing from the bottom, and explains lose network connectivity for a while, most protocols in day-to-day use work some of the devices and protocols you until the switch, or bridge, re-ARPs might expect to find in your data cen- (see box on ARP). tre operating at this layer. Layer 3 Layer 1 Layer 3 is the Network Layer, pro- Layer 1 is the Physical Layer and, viding a means for communicating under the OSI Model, defines the open systems to establish, maintain physical and electrical characteristics and terminate network connections. of the network. The NIC cards in your The IP protocol lives at this layer, and PC and the interfaces on your routers so do some routing protocols. All the all run at this level since, eventually, routers in your network are operating they have to pass strings of ones and at this layer. zeros down the wire. Layer 4 Layer 2 Layer 4 is the Transport Layer, and Layer 2 is known as the Data Link is where TCP lives. The standard says Layer. It defines the access strategy for that “The Transport Layer relieves the sharing the physical medium, includ- Session Layer [see Layer 5] of the bur- ing data link and media access issues. den of ensuring data reliability and Protocols such as PPP, SLIP and HDLC integrity”. It is for this reason that peo- Figure 1 - The 7 layers of live here. ple are becoming very excited about the OSI model. On an Ethernet, of course, access is the new Layer 4 switching technology. Issue 120 (July 2000) Page 13 PC Network Advisor File: T04124.1 www.itp-journals.com
  • 2. Tutorial:Overview B, the packets have to descend and then re-ascend the layers (the stack). “They are called stacks because, in Consider the following example. An application forms a packet of data order to get a packet from an application to be sent; this takes place at Layer 7. As the packet descends the stack, it is running on device A to an application wrapped in headers and trailers, as required by the various protocols, un- running on device B, the packets til, having reached Layer 1, it is trans- mitted as a frame across the medium have to descend and then re-ascend in use. Upon reaching device B, it re- ascends the stack, as the device strips the layers (the stack).” off the appropriate headers and trail- ers, delivering just the application data to the application. The OSI tried to keep to as few lay- Before these devices became available, software to look further up the layer ers as possible for the sake of simplic- only software operated at this layer. model. They are required to under- ity. The fact that the 7-Layer model is Hopefully, you will now also un- stand when a session is taking place, universally used to describe where a derstand why TCP/IP is uttered in one and not to interfere with it. device or protocol sits in the scheme of breath. TCP over IP, since Layer 4 is things shows that the designers did an above (over) Layer 3. It is at this layer Layer 6 excellent job of achieving their aims. that, should a packet fail to arrive (per- haps due to misrouting, or because it Layer 6 is the Presentation Layer. was dropped by a busy router), it will This is where application data is either be re-transmitted, when the sending packed or unpacked, ready for use by Further Reading party fails to receive an acknow- the running application. Protocol con- www.whatis.com ledgement from the device with which versions, encryption/decryption and This impressive site hosts infor- it is communicating. graphics expansion all takes place mation on a wide range of sub- The more powerful routing proto- here. jects, a lot of it network-related, cols also operate here. OSPF and BGP, including a more in-depth discus- for example, are implemented as pro- Layer 7 sion of the OSI. Visit the site, click tocols directly over IP. on the letter O at the top, and then Finally, Layer 7 is the Application scroll down the list of topics until Layer 5 Layer. This is where you find your you find OSI. end-user and end-application proto- Layer 5 is the Session Layer. It pro- cols, such as telnet, ftp, and mail (pop3 vides for two communicating presen- and smtp). tation entities to exchange data with each other. The Session Layer is very The Stack important in the E-commerce field since, once a user starts buying items Our imaginary listener, eavesdrop- and filling their “shopping basket” on ping on the conversations of network PCNA a Web server, it is very important that engineers, would hear them refer to IP they are not load-balanced across dif- stacks quite frequently. They are called ferent servers in a server pool. stacks because, in order to get a packet This is why, clever as Layer 4 from an application running on device switching is, these devices still operate A to an application running on device Copyright ITP, 2000 Address Resolution Protocol (ARP) Bridges, switches, and most network devices keep a table mapping IP addresses to Media Access addresses. Moving a device between ports invalidates these tables, and hence the device’s view of the world. Fortunately, the devices age their table entries, typically clearing them out The Author five minutes after the last time a packet was seen from a particular entity. Neil Briscoe is a networking con- This is sometimes called re-ARPing. Most bridges and switches provide sultant and Cisco guru and can be management functions to allow you to clear the ARP entry manually, should contacted as neil.briscoe@itp- you have needed to move a device due to a failed port. journals.com. File: T04124.2 PC Network Advisor Issue 120 (July 2000) Page 14 www.itp-journals.com
  • 3. Additional Resources • TCP/IP Tutorial • Understanding IPv6 • Understanding NAT • Understanding Frame Relay • Understanding DHCP • Virtual Private Networking Explained All these articles are available free online now at www.pcnetworkadvisor.com PCNA Copyright ITP, 2002 PC Network Advisor www.pcnetworkadvisor.com
  • 4. New Reviews from Tech Support Alert Anti-Trojan Software Reviews A detailed review of six of the best anti trojan software programs. Two products were impressive with a clear gap between these and other contenders in their ability to detect and remove dangerous modern trojans. Inkjet Printer Cartridge Suppliers Everyone gets inundated by hundreds of ads for inkjet printer cartridges, all claiming to be the cheapest or best. But which vendor do you believe? Our editors decided to put them to the test by anonymously buying printer cartridges and testing them in our office inkjet printers. Many suppliers disappointed but we came up with several web sites that offer good quality cheap inkjet cartridges with impressive customer service. Windows Backup Software In this review we looked at 18 different backup software products for home or SOHO use. In the end we could only recommend six though only two were good enough to get our “Editor’s Choice” award The 46 Best Freeware Programs There are many free utilities that perform as well or better than expensive commercial products. Our Editor Ian Richards picks out his selection of the very best freeware programs and he comes up with some real gems. Tech Support Alert http://www.techsupportalert.com