Skip to main content

OSI Refrance Model


OSI MODEL

1. THE OSI MODEL WAS DEVELOPED BY THE INTERNATIONAL ORGANIZATION FOR STANDARDIZATION (ISO) IN THE LATE 1970S. THE MAIN ARCHITECT OF THE OSI MODEL WAS HUBERT ZIMMERMANN, A FRENCH SOFTWARE ENGINEER.

2.  ISO REPRESENT A 1947 MORE THAN WORK AND AGAIN REPRESENTS A ISO IN 1977 AND MORE THAN WORK AN REPRESENT  IN 1983 A OSI REDFRENCE MODEL.

2. HIS MODEL REPRESENT A 7 LAYER

3. OSI MEANS  (OPEN SYSTEMS INTERCOMMUNICATIO).

1. APPLICATION LAYER

1. THE APPLICATION LAYER IS USED BY END-USER SOFTWARE SUCH AS WEB BROWSERS AND EMAIL CLIENTS. 

IT PROVIDES PROTOCOLS THAT ALLOW SOFTWARE TO SEND AND RECEIVE INFORMATION AND PRESENT MEANINGFUL DATA TO USERS.

2. IT SENDS ITS DATA TO THE FORM OF THE PDU.



PROTOCLS  AND DEVICES USED IN LAYER

THERE ARE SOME PROTOCOLS THAT WORK AT THE BACKEND OF THE APPLICATION LAYER.

WHICH IN TURN WORKS AT THE APPLICATION LAYER.MANY DEVICES USE IT AT THE APPLICATION LAYER.

PROTOCOLS

FTP  (FILE TRANSOFER PROTOCOL)

DNS (DOMAIN NAME SYSTEM)

HTTP (HYPER TEXT TRANSFOR PROTOCOL)

DEVICES

ALL END DEVICES USED IN LAYER.

___________

2. PRESENTATION LAYER

1. THE PRESENTATION LAYER RECEIVED  THE DATA FROM APPLICATION LAYER AND PROCESSES THE RAW DATA AND THEN COMPRESSES THE DATA AND ENCODE THE DATA SO SESSION LAYER EASILY RECIEVE THE DATA.

2. PRESENTATION LATER SENDS ITS DATA IN PDU FORMAT. 


THERE ARE SOME PROTOCOLS THAT WORK AT THE BACKEND OF THE PRESENTATION LAYER.

WHICH IN TURN WORKS AT THE PRESENTATION LAYER.MANY DEVICES USE IT AT THE APPLICATION LAYER.

PROTOCOLS

NCP  (NETWARE CORE PROTOCOL)

LPP (LINEAR PROGRAMMING PROBLEM)

DEVICES

GATEWAY OR FIREWALL OR PC.

______________

3. SESSION LAYER

1. IT IS USED TO MANAGE USER CONNECTIONS SESSION LAYER CONTROLS THE CONNECTION BETWEEN COMPUTERS.

2. IT ESTABLISHES, MANAGES AND TERMINATES CONNECTIONS BETWEEN USERS OR REMOTE APPLICATIONS.

3. IT TRANSMITS ITS DATA IN PDU FORM.



PROTOCLS  AND DEVICES USED IN LAYER

THERE ARE SOME PROTOCOLS THAT WORK AT THE BACKEND OF THE SESSION LAYER.

WHICH IN TURN WORKS AT THE SESSION LAYER.MANY DEVICES USE IT AT THE APPLICATION LAYER.

PROTOCOLS

  PPTP (POINT-TO-POINT TUNNLING PROTOCOL)

  RPC (REMOTE PROCRDURE CAL PROTOCOL)

  SCP (SESSION CONTROLL PROTOCOL)


DEVICES

GATEWAY OR FIREWALL OR PC.

___________

4. TRANSPORT LAYER

1. WHEN OUR DATA MOVES FROM ONE PLACE TO ANOTHER, CONTROLS THE DATA FLOW. 

2. IF ANY PROBLEM OCCURS DURING DATA TRANSFER, IT RESOLVES IT. 

3. IF THE DATA IS MORE, IT CONVERTS AND TRANSFERS THIS DATA IN SEGMENTS SO THAT THERE IS NO PROBLEM IN THE DATA AND YOUR DATA IS EASILY TRANSFERRED.

4.  IT SENDS ITS DATA IN THE FORM OF SEGMENTS.

PROTOCLS  AND DEVICES USED IN LAYER

THERE ARE SOME PROTOCOLS THAT WORK AT THE BACKEND OF THE TRANSPORT LAYER.

WHICH IN TURN WORKS AT THE TRANSPORT LAYER.MANY DEVICES USE IT AT THE APPLICATION LAYER.

PROTOCOLS

  TCP (TRANSMISSION CONTROLL PROTOCL)

  UDP (USER DATAGROUND PROTOCOL)


DEVICES

GATEWAY OR FIREWALL PC.

_________________

5. NETWORK LAYER

1. THE NETWORK LAYER CHOSES BEST PATH YOUR PACKET  AND THEN FORWARDS IT FORWARD SO THAT THERE IS NO PROBLEM IN FORWARDING THE PACKET

2. NETWORK LAYER ALLOWS THE TRANSFER OF DATA PACKET OF CONNECTIONS BETWEEN NETWORKS.

3. IT SENDS ITS DATA IN THE FORM OF PACKET

PROTOCLS  AND DEVICES USED IN LAYER

THERE ARE SOME PROTOCOLS THAT WORK AT THE BACKEND OF THE NETWORK LAYER.

WHICH IN TURN WORKS AT THE NETWORK LAYER.MANY DEVICES USE IT AT THE APPLICATION LAYER.

PROTOCOLS

  IPV4 (INTERNET PROTOCOL VERSION 4)

    IPV6 (INTERNET PROTOCOL VERSION 6)

ICMP (INTENET CONTROLLL MESSAGE PRTOCOL)


DEVICES

ROUTER.

MULTY LAYER SWITCH.

_________________

6. DATA LINK LAYER 

THE DATA LINK LAYER BREAKS DATA UP INTO SMALLER UNITS CALLED FRAMES.

IT ADDS ERROR-CHECKING INFORMATION TO EACH FRAME.

IT TRANSMITS THE FRAMES ACROSS THE PHYSICAL LAYER.

IT HANDLES FLOW CONTROL, WHICH ENSURES THAT THE SENDER DOES NOT SEND DATA FASTER THAN THE RECEIVER CAN RECEIVE IT.

IN OTHER WORDS, THE DATA LINK LAYER IS RESPONSIBLE FOR ENSURING THE RELIABLE DELIVERY OF DATA BETWEEN TWO NODES ON A NETWORK. IT DOES THIS BY ADDING ERROR-CHECKING INFORMATION TO EACH FRAME, AND BY RETRANSMITTING FRAMES THAT ARE CORRUPTED OR LOST. THE DATA LINK LAYER ALSO HANDLES FLOW CONTROL, WHICH ENSURES THAT THE SENDER DOES NOT OVERWHELM THE RECEIVER.




PROTOCLS  AND DEVICES USED IN LAYER

THERE ARE SOME PROTOCOLS THAT WORK AT THE BACKEND OF THE DATA LINK LAYER.

WHICH IN TURN WORKS AT THE DATA LINK LAYER .MANY DEVICES USE IT AT THE APPLICATION LAYER.

PROTOCOLS

(PPP)  Point To Point Protocol.

(LCP)  Link Control Protocol 

(LAP)   Link Access Procedure.

(NCP ) Network Control Protocol .


DEVICES

NIC

WIRELESS ACCESS POINT

ETHERNET SWITCH.

________________

7.PHYSICAL LAYER


THE PHYSICAL LAYER TRANSMITS AND RECEIVES DATA BITS OVER A COMMUNICATION CHANNEL.

IT DOES THIS BY ENCODING THE DATA BITS INTO A PHYSICAL SIGNAL, SUCH AS A VOLTAGE LEVEL OR LIGHT PULSE.

IT ALSO ENSURES THAT THE DATA BITS ARE TRANSMITTED AND RECEIVED IN A SYNCHRONIZED MANNER.

THE PHYSICAL LAYER MAY ALSO BE RESPONSIBLE FOR DETECTING AND CORRECTING ERRORS IN THE DATA BITS THAT ARE TRANSMITTED.

IN OTHER WORDS, THE PHYSICAL LAYER IS RESPONSIBLE FOR THE PHYSICAL ASPECTS OF DATA TRANSMISSION, SUCH AS THE TYPE OF SIGNAL USED, THE SPEED OF TRANSMISSION, AND THE ERROR DETECTION AND CORRECTION MECHANISMS.







PROTOCLS  AND DEVICES USED IN LAYER

THERE ARE SOME PROTOCOLS THAT WORK AT THE BACKEND OF THE PHYSICAL LAYER.

WHICH IN TURN WORKS AT THE DATA LINK LAYER .MANY DEVICES USE IT AT THE APPLICATION LAYER.

PROTOCOLS

1. ETHERNET

2. BLUETOOTH.

3. DSL 

4. WIFI


DEVICES

CABLE

CONNECTOR

NETWORK INTERFACE CARD

______________________



OSI Layer

PDU Name

Key Header Information

Application

Data

User data, no header added here.

Presentation

Data

Data is formatted, compressed, or encrypted.

Session

Data

Manages session state, no new header added.

Transport

Segment

Source/Destination ports, Sequence number, Acknowledgment, etc.

Network

Packet

Source/Destination IP, TTL, Protocol, Header checksum.

Data Link

Frame

MAC addresses, Type, FCS for error checking.

Physical

Bits

0s and 1s for transmission as electrical/radio/optical signals.

 




IF YOU WANT PDF IN URDU TRANSLATION OF THIS BLOG THEN CLICK ON "ABDUL MANAN JAVED"

Pop Out 

 BELOW AFTER CLICKING, A WINDOW WILL OPEN BELOW AND WHAT IS SHOWN IN THE IMAGE IS TO CLICK ON THE POP-OUT AND YOU WILL HAVE A PDF OPEN AND YOU CAN ALSO DOWNLOAD IT.


Comments

Popular posts from this blog

TCP/IP MODEL

  HISTORY OF TCP/IP MODEL THE TCP/IP MODEL WAS DEVELOPED BY VINT CERF AND BOB KAHN IN THE 1970S. THEY WERE BOTH WORKING AT THE DEFENSE ADVANCED RESEARCH PROJECTS AGENCY (DARPA) AT THE TIME. Vint Cerf And Bob Kahn CERF AND KAHN WERE TASKED WITH DEVELOPING A NEW NETWORK PROTOCOL THAT WOULD BE MORE RELIABLE AND EFFICIENT THAN THE EXISTING PROTOCOLS. THEY CAME UP WITH THE IDEA OF USING A LAYERED APPROACH, WHICH WOULD ALLOW EACH LAYER TO FOCUS ON A SPECIFIC TASK. THIS LED TO THE DEVELOPMENT OF THE TCP/IP MODEL, WHICH IS STILL THE BASIS FOR HOW DATA IS TRANSMITTED OVER THE INTERNET TODAY. CERF AND KAHN ARE OFTEN REFERRED TO AS THE "FATHERS OF THE INTERNET" FOR THEIR WORK ON THE TCP/IP MODEL. THEY WERE INDUCTED INTO THE NATIONAL INVENTORS HALL OF FAME IN 2004 FOR THEIR CONTRIBUTIONS TO THE DEVELOPMENT OF THE INTERNET. HERE ARE SOME OTHER NOTABLE PEOPLE WHO CONTRIBUTED TO THE DEVELOPMENT OF THE TCP/IP MODEL: JON POSTEL: POSTEL WAS THE FIRST CHAIRMAN OF THE INTERNET ENGINEERI...

Types Of Attack in Network

Common Network Attacks Explained. 1. Overwhelming a Network (DoS/DDoS): Imagine a restaurant that's flooded with too many customers. In a DoS/DDoS attack: A website is overwhelmed with too much traffic. 2. Eavesdropping on Conversations (MitM): Imagine someone listening in on your phone call. In a MitM attack: An attacker listens to your online conversations. 3. Tricking You (Phishing): Imagine receiving a fake email from your bank. In phishing: Attackers try to trick you into giving them your personal information. 4. Finding a Weakness in a Website (SQL Injection): Imagine finding a hole in a fence. In an SQL injection attack: An attacker finds a weakness in a website to steal or change data. 5. Planting a Hidden Camera (XSS): Imagine someone hiding a camera in a party. In an XSS attack: An attacker hides harmful code on a website to spy on you. 6. Guessing Your Password (Password Attck): Imagine trying to guess a friend's password. In a pas...