logo

UnderstandingThe OSI7-LayerModel

The OSI model is away of describing how different applications and protocols interact on network-awaredevices. We explain the role of each layer and of the stack.
Tutorial:Overview Understanding The OSI 7-Layer Model The OSI model is a way of describing how different applications and protocols interact on network-aware devices. We explain the role of each layer and of the stack. By Neil Briscoe I f you spend much time in the com- pany of network technicians you will eventually hear them say something like “That’s Layer 2 only” on a slightly modified layer system. TCP/IP, for example, uses a 6- rather than a 7-layer model. Nevertheless, in order to ease the exchange of ideas, governed by a device’s MAC address, the six-byte number that is unique to each NIC. Devices which depend on this level include bridges and or “That’s our new Layer 4 switch”. even those who only ever use TCP/IP switches, which learn which segment’s The technicians are referring to the OSI will refer to the 7-layer model when devices are on by learning the MAC (Open System Interconnection) Refer- discussing networking principles with addresses of devices attached to vari- ence Model. peers from a different networking ous ports. This model defines seven Layers background. This is how bridges are eventually that describe how applications run- Confusingly, the OSI was a work- able to segment off a large network, ning upon network-aware devices ing group within the ISO (Interna- only forwarding packets between may communicate with each other. tional Standards Organisation) and, ports if two devices on separate seg- The model is generic and applies to all therefore, many people refer to the ments need to communicate. Switches network types, not just TCP/IP, and model as the ISO 7-layer model. They quickly learn a topology map of the all media types, not just Ethernet. It is are referring to the same thing. network, and can thus switch packets for this reason that any network tech- Traditionally, layer diagrams are between communicating devices very nician will glibly throw around the drawn with Layer 1 at the bottom and quickly. It is for this reason that mi- term “Layer 4” and expect to be under- Layer 7 at the top. The remainder of grating a device between different stood. this article describes each layer, start- switch ports can cause the device to It should be noted, however, that ing from the bottom, and explains lose network connectivity for a while, most protocols in day-to-day use work some of the devices and protocols you until the switch, or bridge, re-ARPs might expect to find in your data cen- (see box on ARP). tre operating at this layer. Layer 3 Layer 1 Layer 3 is the Network Layer, pro- Layer 1 is the Physical Layer and, viding a means for communicating under the OSI Model, defines the open systems to establish, maintain physical and electrical characteristics and terminate network connections. of the network. The NIC cards in your The IP protocol lives at this layer, and PC and the interfaces on your routers so do some routing protocols. All the all run at this level since, eventually, routers in your network are operating they have to pass strings of ones and at this layer. zeros down the wire. Layer 4 Layer 2 Layer 4 is the Transport Layer, and Layer 2 is known as the Data Link is where TCP lives. The standard says Layer. It defines the access strategy for that “The Transport Layer relieves the sharing the physical medium, includ- Session Layer [see Layer 5] of the bur- ing data link and media access issues. den of ensuring data reliability and Protocols such as PPP, SLIP and HDLC integrity”. It is for this reason that peo- Figure 1 - The 7 layers of live here. ple are becoming very excited about the OSI model. On an Ethernet, of course, access is the new Layer 4 switching technology. Issue 120 (July 2000) Page 13 PC Network Advisor File: T04124.1 www.itp-journals.com Tutorial:Overview B, the packets have to descend and then re-ascend the layers (the stack). “They are called stacks because, in Consider the following example. An application forms a packet of data order to get a packet from an application to be sent; this takes place at Layer 7. As the packet descends the stack, it is running on device A to an application wrapped in headers and trailers, as required by the various protocols, un- running on device B, the packets til, having reached Layer 1, it is trans- mitted as a frame across the medium have to descend and then re-ascend in use. Upon reaching device B, it re- ascends the stack, as the device strips the layers (the stack).” off the appropriate headers and trail- ers, delivering just the application data to the application. The OSI tried to keep to as few lay- Before these devices became available, software to look further up the layer ers as possible for the sake of simplic- only software operated at this layer. model. They are required to under- ity. The fact that the 7-Layer model is Hopefully, you will now also un- stand when a session is taking place, universally used to describe where a derstand why TCP/IP is uttered in one and not to interfere with it. device or protocol sits in the scheme of breath. TCP over IP, since Layer 4 is things shows that the designers did an above (over) Layer 3. It is at this layer Layer 6 excellent job of achieving their aims. that, should a packet fail to arrive (per- haps due to misrouting, or because it Layer 6 is the Presentation Layer. was dropped by a busy router), it will This is where application data is either be re-transmitted, when the sending packed or unpacked, ready for use by Further Reading party fails to receive an acknow- the running application. Protocol con- www.whatis.com ledgement from the device with which versions, encryption/decryption and This impressive site hosts infor- it is communicating. graphics expansion all takes place mation on a wide range of sub- The more powerful routing proto- here. jects, a lot of it network-related, cols also operate here. OSPF and BGP, including a more in-depth discus- for example, are implemented as pro- Layer 7 sion of the OSI. Visit the site, click tocols directly over IP. on the letter O at the top, and then Finally, Layer 7 is the Application scroll down the list of topics until Layer 5 Layer. This is where you find your you find OSI. end-user and end-application proto- Layer 5 is the Session Layer. It pro- cols, such as telnet, ftp, and mail (pop3 vides for two communicating presen- and smtp). tation entities to exchange data with each other. The Session Layer is very The Stack important in the E-commerce field since, once a user starts buying items Our imaginary listener, eavesdrop- and filling their “shopping basket” on ping on the conversations of network PCNA a Web server, it is very important that engineers, would hear them refer to IP they are not load-balanced across dif- stacks quite frequently. They are called ferent servers in a server pool. stacks because, in order to get a packet This is why, clever as Layer 4 from an application running on device switching is, these devices still operate A to an application running on device Copyright ITP, 2000 Address Resolution Protocol (ARP) Bridges, switches, and most network devices keep a table mapping IP addresses to Media Access addresses. Moving a device between ports invalidates these tables, and hence the device’s view of the world. Fortunately, the devices age their table entries, typically clearing them out The Author five minutes after the last time a packet was seen from a particular entity. Neil Briscoe is a networking con- This is sometimes called re-ARPing. Most bridges and switches provide sultant and Cisco guru and can be management functions to allow you to clear the ARP entry manually, should contacted as neil.briscoe@itp- you have needed to move a device due to a failed port. journals.com. File: T04124.2 PC Network Advisor Issue 120 (July 2000) Page 14 www.itp-journals.com Additional Resources • TCP/IP Tutorial • Understanding IPv6 • Understanding NAT • Understanding Frame Relay • Understanding DHCP • Virtual Private Networking Explained All these articles are available free online now at www.pcnetworkadvisor.com PCNA Copyright ITP, 2002 PC Network Advisor www.pcnetworkadvisor.com Recent Reviews from Tech Support Alert Reviews of the Best Windows Backup Software In this detailed comparative review, we checked out eighteen backup software utilities designed for home or SOHO use. Many of the products reviewed were disappointing. However 6 products passed our tests with flying colors and 2 of these were so impressive, they were awarded our “Editor’s Choice.” Suppliers of Cheap Inkjet Printer Cartridges Reviewed and Rated With hundreds of companies all claiming to have the “cheapest and best inkjet printer cartridges,” our editors decided to put their claims to the test. Not unexpectedly, many suppliers flunked but we did manage to come up with a number of web sites that sell good quality inkjet printer cartridges at heavily discounted prices. The Best Anti Trojan Software Our editors took a close look at the 6 leading anti-trojan/trojan remover software utilities. Unfortunately, they found only 2 products that were effective in their ability to detect and remove dangerous modern polymorphic and process injecting trojans. The 46 Best Ever Freeware Utilities This is our Editor, Ian “Gizmo” Richards, personal selection of the best freeware utilities. He’s hunted down some real gems, many of which perform better than expensive commercial products. Tech Support Alert http://www.techsupportalert.com
DMCA.com Protection Status Copyright by webtailieu.net