Friday, March 29, 2019

OSI reference model

OSI reference lesson memoirOSI reference framework is advanced t each(prenominal)ing of net profit. As in that respect was a need of common archetype of communications protocol degrees, this concept promoted the idea and delineate ab bulge interoperability amid net devices and softw argon. net incomeing with protocol standards much(prenominal) as SNA and Decnet argon completely vendor-developed and proprietary which atomic number 18 prior to OSI concept. Industries worked out to sort out such complications, and fix introduced a juvenile concept get a lined OSI which is attempting to get ein truth iodin to insure to common ne bothrk standards to provide multi-vendor interoperability. Many devices were unable to communicate with former(a) protocols directly because of lack of common protocols. It was common for large ne bothrks to sup mien wine bigeminal vane suites. infobase design and distributed developmentbase design were the interest of throw outepas g roup in the archaeozoic and middle 70s. It was clear in the mid 70s that standard distributed communications computer architecture would be required to certification selective cultivationbase machines, distributed door, and the akin. For cultivation of such standardized selective informationbase systems around of the groups have studied the existing solutions, including IBMs system network architecture (SNA), so the work on protocols is done for ARPANET, and some concepts of demonstration work. In cattiness of these defaults which lead to the development of a seven seam architecture cognise internally as the distributed systems architecture (DSA) in 1977.Mean speckle, in 1977 International formation for Standardization has got a proposal that a standard architecture was ask to pay off the communications infrastructure for distributed offshooting by British Standards Institute. Thus, subcommittee on Open System Inter nexus was formed by ISO Technical Committee 97, Su bcommittee 16. The Ameri mint National Standard Institute (ANSI) was charged to develop proposals in advance of the first meeting of the subcommittee.INTRODUCTION-Although the runic of OSI mass seem drilling and academic, actually it is a very utile way to learn to a greater extent about networking. OSI offers a good starting point for assureing the differences among repeaters, switches, and routers, for example. The flummox similarly can support one better understand network protocols.The master(prenominal) idea in OSI is the process of communication betwixt the end points of a two telecommunication network, this can be divide into works, which can be added within its social classs of its own adapt of special, related subprograms. The OSI toughie (and networking imitates developed by new(prenominal) brass sections) attempts to define rules that cover both the generalities and specifics of networks. OSI amaze was non a network standard, but it was utilise as g uidelines for development of network standards. It was become so important that al virtually all study networks standards in use today conform entirely to its seven levels.The family relationship surrounded by OSI model and internet protocol upsurge, as it is known that the new technologies and developments argon emerged based on networks. These networks comprise of protocols and the entire protocol stack. net income protocol stack is based on OSI model. 1OSI MODEL-The modern day networking process is understand by working. OSI model consists of seven levels. They be1. screening level (7th Layer)2. Presentation Layer (6th Layer)3. Session Layer (5th Layer)4. conveyance of title Layer (4th Layer)5. net Layer (3rd Layer)6. data- affiliation Layer (2nd Layer)7. Physical Layer (1st Layer) 2The OSI model defines internetworking in terms of a vertical stack of seven seams. Among, these mould, there are two parts division one is pep pill level and the other is lower form. Upper seam consist of layer 7, 6 and 5 and the lower layer consist of 4, 3, 2 and 1. Among these two layer upper layer loves with the application issues which are generally are tooled hardly in software. The software that implements network serve exchangeable encryption and friendship management. When we consider deals with the info transport issues and the implement much primitive, hardware functions like routing, addressing and flow authority. 3Upper layer ( occupation layer, Presentation layer, Session layer)OSI designates the application, presentation, and session stages of the stack as the upper layers. Software in these layers performs application-specific functions like data formatting, encryption, and connection management. For example -HTTP, SSL and NFSLower layer (Transport layer, Network layer, Physical layer.)Lower layers of the OSI model provide more(prenominal) primitive network-specific functions like routing, addressing, and flow control. For example - transmission control protocol, IP, and EthernetApplication Layer Describes how real work actually gets done. Ex this layer would implement file system operations. And also it defines embrasure to user processes for communication and data transfer in network. It provides standardized function such as realistic terminal, file and job transfer and operations. provides service directly to the user application. Because of the potentially wide variety of application, this layer provide a wealth of services. Among these services are establishing privacy mechanism, au whereforeticating the intended communication partners, and determining if adequate resources are present. 3Presentation layer Describes the syntax of data world transferred. Ex this layer describes how floating point numbers can be interchange mingled with hosts with unalike math formats. Mask the difference of data formats amidst miscellaneous systems. Specifies architecture independent data transfer format. It en codes data like encrypts and decrypts data, compresses and decompresses data. performs data transformation to provide a common port for user application, including services such as reformatting data compression, and encryption.3Session layer In general, describes the organization of data sequences larger than the parcels handled by lower layers. Ex this layer describes how pick up and result shares are paired in a remote map call. It mange user session and dialogues. And also controls establishment and exhalation of logic amongst users. Reports upper layer errors. establishes, manages and end user connection and manages the interaction between end systems. Services includes such thing as establishing communication as full or half duplex and grouping data3Transport Layer-In general, describes the quality and nature of the data talking to. Ex this layer defines if and how retransmissions go forth be use to ensure data delivery. Manage lengthways message delivery in network . Provides unquestionable and sequential packet delivery through error recovery and flow control mechanisms. Provides connectionless oriented packet delivery insulates the three upper layer, 5 through 7, from having deal with the complexities of layer 1 through 3by providing the function necessary to as authoritative a reliable network link. Among other function, this layer provides error recovery and flow control between the two end points of the network connections.3Network layer -In general, describes how a series of exchanges over assorted data links can deliver data between any two nodes in a network. Ex this layer defines the addressing and routing structure of the mesh. Network layer function determines how data are transferred between network devices. Routes packets according to unique network device addresses. It provides flow and congestion control to prevent network resource depletion. Establishes, maintains and terminates network connection . Among other functions, s tandard define how data routing and relaying are handled3Data link layer In general, describes the logical organization of data bits transmit on a particular ordinary. Ex this layer defines the framing, addressing and check summing of Ethernet packets. Defines procedures for run the communication links and frames packets. And also detects and refuses packets transmit errors. ensures the reliability of the bodily link established at layer 1 . standard defines how data frames are recognized and provide necessary flow control and error handling at the frame level.3Physical layer In general, describes the physical properties of the various communications media, as well as the electrical properties and interpretation of the exchanged signals. Ex this layer defines the size of Ethernet coaxial cable, the type of BNC connector used, and the termination method. Physical later defines physical means of sending data network devices and defines optical, electrical and mechanical charac teristics and interfaces between network medium and devices. controls transmission of the barren bit stream over transmission medium. Standard for this layer define such parameter as the sum of signal voltage swings, the continuance of voltage and so on.3INFLUENCEThe protocol stack or mesh protocol stack also show enamour of the OSI model most of the lyric is same, and most of the books present an mesh protocol stack that uses OSI terminology and that includes physical and data link layer. save in 1981 denomination by john postal, Carl Sunshine and Danny Cohen there is a diagram showing the internet protocol functioning on top of one of the several(prenominal) Network protocol and it describe such network protocol as being the packet transmission protocol in each individual network. In a article 1983 by Vinton Cerf- often referred to as one of the design father of the internet and Edward Cain that the layer that IP function is called networkwork layer and the layer un der that is Network layer. We can universally that the layer at which IP function is called the Network Layer and the important layer was called Network layer is usually omitted. 4transmission control protocol/IP transmission control protocol/IP was in the first place developed as a question experiment. It has become the backbone of thr learning superhighway. It provides users with the back bone services used to carry popular services such as the World Wide Wed (www), E-Mail and other. In late 70s as a US Government Advanced question Project Agency (ARPA) research development project, the ARPANET. This has grown to provide connection to system world wide, helping bring the information age into reality.transmission control protocol/IP is not really a protocol, but a situate of protocols a protocol stack, as it is most comm simply called. Its name, for example, already refers to two different protocols, transmission control protocol (Transmission Control communications protocol) and IP (Internet communications protocol). There are several other protocols related to transmission control protocol/IP like FTP, HTTP, SMTP and UDP just to name a few.The transmission control protocol/IP suite can be understood as a stack of discrete component with a form architecture. The transport layer and below of the TCP/IP suite can be viewed in the figure. The link covers the internetwork and transport protocols. The delivery of packets between the next nodes in an internetwork id provided bye the link protocols. This link delivery only implies that delivered information is intact. Internetwork layer is responsible for addressing and routing of packets between source and destination nodes within the network. At the final the transport layer provides full service to transfer information between them.5Application layer Application layer is the communication between programs and transport protocol. Several different protocols works on the Application layer. The beaten(pr enominal) protocols HTTP, SMTP, FTP, SNMP, DNS and Telnet. Application layer commucate through Transport layer that to through a port. Ports are numbered and standard applications always use the same port. For example , SMTP protocol always use port 25, and HTTP protocol always use port 89 and FTP protocol always use ports 20 for data transmission and 21 for control.6Transport layer-The layers gets data from the Application layer and divide into several data packets. It is the most uses TCP. After receiving data TCP protocol gets the packets which sent by the Internet layer and make the in an order, because arrives at the destiny in out of order. Transport layer also check if the content of the received packet are intact and reply by giving eff signal to the transmitter , allowing it to know that the packet arrived in an order at the destiny. If there are no acknowledge signal is received it re send the lost packet.6Internet layer IP address is the unique virtual identity on TCP/IP network of each computer. It as charge of adding a point to the data packets received from the Transport layer. Where other control data will, it will add source IP address and target IP address. the physical address assigned to the network card of each computer. This address is write on the network card RO and is call MAC address. Let us suppose A computer want send a data to B computer so the A want to know the B MAC address but in small local field of force network computer can easily discover each other MAC address, this is an easy task. If there is no any virtual addressing were used we must to know the MAC address of the destination computer, which is not only a hard task but also does not help out packet routing, because it does not use a tree like structure.6Network Interface Layer-The next is the network interface layer, the datagram generated on the upper layer will be sent to the network interface layer if we are sending data, or the Network Interface layer will get d ata from the network and send it to the Internet layer, if we are receiving data. The Network Interface Layer breaks down the packets from the Internet Layer into frames and then eventually into bits for transmission crosswise the physical network medium. Signalling and network medium standards such as Ethernet, Token Ring, FDDI, X .25, Frame Relay, RS-232, and v.35 are delimit in this layer. Network Interface Controller (NIC) Cards, network hubs, repeaters, bridges, and switches operate at this level.6TCP/IP and OSI MODEL-TCP/IP is defined in term of the protocols that constitute it. Most of the critical protocols functions are their lower layer of the OSI Reference MODEL that are layer 2, 3 and 4 which harmonize to the network interface that is internet and transport layer in the TCP/IP model. Which includes all important IP at layer 3 and TCP at layer 4 which combine to give TCP/IP the name to it. TCP contains four subsections. The first description are thetwo TCP/IP protocols that reside at the network layer, layer 2 of the OSI model PPP and SLIP. And the second details a distich of special protocol that reside between layer 2 and 3 ARP and RARP. The third covers the TCP/IP internet layer (i.e) OSI network layer and layer 3 including IP and several other related and support protocol. At the final the fourth describes the TCP/IP transports layer protocols TCP and UDP.7The lower layer of the OSI model is the physical layer which responsible for the transmittance information from one place to another on a network. The layer just above the physical layer is the data link layer and in TCP/IP its call has Network interface layer. Its main job is to implement network at local level and interface between the hardware oriented physical layer, and the ore abstract, software oriented function of the network layer and the above it.8Effects of Internet-As a consequence of the development of internet, the internet protocol best effort delivery. But it is considered to be unreliable when it is talked about its service. In other network architectural language it is called as connection-less protocol. Thus it has its contrast implications to so called connecting modes of transmission. This lack of reliability causes many personal cause. The major problems raised areData corruption helpless data packetsDuplicate arrivalOut-of-order packet deliveryComing to the effects based on IPv4 and IPv6, they are as follows.IETF declared that IPv4 will not be able to accommodate the need for ever increasing amount of IP addresses in the next few years. The increase and expansion of IP addresses are essential to accommodate following. They are used for pro life storyration of internet devices such as personal computers, personal digital assistants (PDAs), wireless devices, and new Internet appliances the expansion of internet through the world the increasing applications of internet access requirements of emerging internet applications. Thus decrease in usage of IPv4 effects all the above mentioned utilizes. The solution for this problem is found from development of IPv6 which enables a mass market and the increased adoption of the internet.IPv4 was in existence and effectively working from almost 20 years. But now all of its near four billion of address seems to be getting finished. Because with the tremendous egression of the internet devices and blocks of the ip addresses assigned to various organizations and countries. This fast growth in the number of devices e.g. Mobiles, computers, music players, etc. it looked as if IPv4 addresses would be exhausted in near future. In order to overcome this problem and increasing life for IPv4 certain measures have been taken e.g. network address translation (NAT), classless inter-domain routing (CIDR) and PPP/DHCP. But all of these solutions are temporary and they made networks more complex and difficult for one to understand and implement.Internet push-down list feignThe Internet mob Mo del employs a Internet Protocol Stack or Suite both these words are used interchangeably. This can be defined as the set of communications protocols used for the Internet and other similar networks. As discussed earlier Protocol is a set of rules in a network. The names of the two protocols which employed the Internet Stack Model are Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were also the first two networking protocols defined in this standard. A protocol stack (sometimes communications stack) is a particular software implementation of a computer networking protocol suit. In practical implementation, protocol stacks are often divided into three major sections media, transport, and applications. A particular run system or platform will often have two well-defined software interfaces one between the media and transport layers, and one between the transport layers and applications.Upper layers are logically closer to the user and deal with more abstract data, relying on lower layer protocols to translate data into forms that can eventually be physically transmitted.1Difference between OSI and TCP/IP-OSI model is the standard reference model that describes how the protocols should interact with one another. This was invented by the Department of Defense.TCP/IP does map clearly into OSI model, but is so convenient to think in terms of the OSI model when explaining protocols.The major differences are-The application layer in TCP/IP handles the responsibilities of layers 5, 6 and 7 in the OSI model.The transport layer in TCP/IP does not always guarantee reliable delivery of packets at the transport layer, while the OSI model does. TCP/IP also offers an option called UDP that does not guarantee reliable packet delivery. 9TCP/IP appears to be a more simpler model and this is mainly due to the situation that it has fewer layersTCP/IP is considered to be a more credible model- This is mainly due to the fact because TCP/IP protocols are t he standards around which the internet was developed and then it mainly gains creditability due to this reason. Where as in contrast networks are not usually built around the OSI model as it is merely used as a guidance toolThe OSI model consists of 7 architectural layers whereas the TCP/IP only has 4 layers.Disadvantages of OSI modelMajor harms of OSI model are unforesightfully timing disadvantageously technologyBad implementationsBad Timing Presently it appears that standard OSI protocols got crushed. It was completed too late, TCP/IP had already taken hold and become the familiar standard for research universities by the time the OSI Model was readyBad Technology- some(prenominal) the models and protocols are flawed. As mentioned about the layers, cause major disadvantage of this model. operative on OSI model which is associated with several definitions and protocols is extraordinarily complex. The reappearance of functions in each layer also cause problem. nearly of those f unctions are addressing, flow control, and error control. Certain important features are placed in every layer. Some times the decisions taken for placing these features are not obvious. In the past the presentation layer had virtual terminal handling which is presently used in application layer. Data security, encryption and network management were also omitted. The literary criticism given by world is that communication mentality is increasing rapidly.Bad Implementations Initial implementations made by people were huge ,unwieldy and slow Because of the complexness of the model, the initial implementations were huge, unwieldy, and slow. As time is passing the product got betterments, but notional image stuck. 10everyone who tried to implement it got burned, giving OSI a reputation for poor qualityDisadvantages of TCP/IP modelWhen TCP/IP is compared with IPX there are few drawbacks.IPX is faster compared to TCP/IP.TCP/IP is multiform to set up and manage.The overhead of TCP/IP is higher than that of IPX.The process involved in TCP/IP is long. The entire process is, port numbers are assigned by the Internet Assigned numbers Authority (IANA), and they identify the process to which a particular packet is committed to. Port numbers are found in the packet header. 11. a few(prenominal) more disadvantages of this model are software used for strict layering is very inefficient. When buffers are provided they leave space for headers which are added by lower layer protocols. 12Security-Internet has become a phenomenon. Sharing Files, transferring Files all across the network has caused the users to think about some serious problems that are being raised due to the phenomenon of Internet. Security is another issue that sits at the top of the level as designers and developers both struggle to give out the correct form of measures to be taken to deal with the issue of Network Security. Since the Protocol Stack has got just one layer to really check the authenticity of the packets that pass through the layers and the network. It has allowed the network to become more susceptible to international threats. Since, reckoners that are connected to each other create a network. These networks are often configured with open Internet Protocol (IP) addresses that is, the devices on the network are visible to devices outside the network. Networks can also be configured as esoteric meaning that devices outside the network cannot see or communicate directly to them.Computers on a public network have the advantage (and disadvantage) that they are completely visible to the Internet. As such, they have no boundaries between themselves and the rest of the Internet community. This advantage oftentimes becomes a diaphanous disadvantage since this visibility can lead to a computer pic exploit -e.g. Hacking if the devices on the public network are not by rights secured.To plainly counter this strategy the, we employ a private local area network and make the network a private network then the disadvantage of a private network would be that it entails more configuration and judiciary to maintain usability. At times, not being fully visible on the Internet can cause some difficulty in connecting to certain services, such as streaming audio/video, chat/instant electronic messaging programs, or some secure Web sites.Maintaining most computers on a private network, with only an IDP/IDS and/or Firewall visible to the public Internet helps maintain a highly secure environment for the computers on the private network, while at the same time keeping them connected to the public Internet.13Benefits of OSI model-The OSI Model is a standard and a very useful tool to deal with the problems of networking. The OSI model is also a standard model for networking protocols and distributed application. In the OSI model there are a total of 7 network layers. The layers of OSI provide the levels of abstraction. Each layer performs a different set of funct ions and the intent was to make each layer as independent as possible from all the others. This guarantees the security to each packet that passes through these layers also, it gelds the complexness of packet routing through each layer thus reducing the threat of congestion in the network.Each layer uses the information from the below layer and provides a service to the layer above in the OSI Model. 14Conclusion plain though OSI model has a few limitations it cannot be said that the model is not suitable anymore because talking about the time and the influence of the OSI model on the networking as whole has had a lot of positive degree causes. Even if we have many new models coming up with different improvements the base model is always the OSI model. What we can take out of the OSI model are mainly the benefits of the OSI model and which even are the major characteristics needed for creating a good model. The OSI Model is perhaps the most imp lest and astray used through the wor ld. Owing to the advantages of this network we are able to reduce the complexity and save time when passing data on a network.Reference-1) John Larmouth (1996) Understanding OSI International Thomson Computer Press, Michigan. USA2) Computer networks 3rd edition by ANDREW S. TANENBAUM3) Standard network layer architecture, By Bradley Mitchell http//compnetworking.about.com/cs/designosimodel/a/osimodel.htm4)http//www2.rad.com/networks/introductory/layers/main.htm5) By Douglas Comers http//www.cellsoft.de/telecom/tcpip.htm6) Author Gabriel Torres http//www.hardwaresecrets.com/article/433/1,2,3,4,5,67) Charles M. Kozierok.http//www.tcpipguide.com/free/t_TCPIPLowerLayerInterfaceInternetandTransportProtoc.htm8) Charles M. Kozierokhttp//www.tcpipguide.com/free/t_DataLinkLayerTechnologiesandProtocols.htmhttp//itprofesionals.blogspot.com/2009/01/what-is-difference-between-osi-model.html10) Computer Networks Fourth Edition by Andrew S. Tanenbaum11)www.tech-faq.com/understanding-the-osi-model. shtmlwww.bookrags.com/wiki/OSI_model13) Behrouz A. Forouzan, Sophia Chung Fegan (2004). Data Communications and Networking, McGraw-Hill Professional, USA.14) http//compnetworking.about.com/cs/designosimodel/a/osimodel.htm

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.