Skip to main content

OSI MODAL (Network communication and security)

                  Open Systems Interconnection (OSI) Model

Image result for osi model

in this modal we learn about 7 layer:-
  1.  APPLICATION LAYER 
  2. PRESENTATION  LAYER 
  3. SESSION LAYER
  4. TRANSPORT LAYER
  5. NETWORK LAYER 
  6. DATA LINK LAYER 
  7. PHYSICAL LAYER
Some people says that 1 to 7 and some are says 7 to 1 ,i means that application layer to physical layer and physical layer to application layer .We are describe physical layer to application layer   but before this we defined osi modal.

what is osi modal ?

The Open System Interconnection model is a seven-layer structure which outlines how communications should happen between computers with both the generalities (language and medium) and specifics of networks. This model was defined by the International Organization for Standardization and is officially referred as ISO OSI.
The OSI model is also called as Reference model because it relates to connecting systems that are open for communication with other systems. It ensures compatibility with different network technologies with the help of the descriptive network scheme and has become the widely accepted model for understanding network communication. Let’s get to know in detail about the OSI model. 
1. The Physical Layer: This layer is responsible for transmitting and receiving the raw data through a physical medium. It provides the capability of data encoding that modifies the simple digital signal pattern to better accommodate the characteristics of the physical medium. This layer helps in finding out the transmission technique. Which determines whether the encoded bits will be transmitted by baseband or broadband signalling. This layer transmits bits as electrical or optical signals through physical transmission medium and find out which physical medium can be used and how much volt needs to be provided.

Components of the physical layer include:

 • Cabling system components 
• Adapters that connect media to physical interfaces 
• Connector design and pin assignments 
• Hub, repeater, and patch panel specifications
 • Wireless system components
 • Parallel SCSI (Small Computer System Interface) 
• Network Interface Card (NIC)

2. The Data Link Layer: This layer is responsible for error free transmission of data frames from one node to another over the physical layer.

Layer 2 of the OSI model provides the following functions: 

 • Allows a device to access the network to send and receive messages
 • Offers a physical address so a device’s data can be sent on the network
 • Works with a device’s networking software when sending and receiving messages 
 • Provides error-detection capability

 Common networking components that function at layer 2 include:

• Network interface cards 
• Ethernet and Token Ring switches 
• Bridges

3. The Network Layer: This layer is responsible for controlling the operation on the sub-net. While deciding which medium and path to be chosen by the data based on network conditions.
Layer 3, the network layer of the OSI model, provides an end-to-end logical addressing system so that a packet of data can be routed across several layer 2 networks (Ethernet, Token Ring, Frame Relay, etc.). Note that network layer addresses can also be referred to as logical addresses. Initially, software manufacturers, such as Novell, developed proprietary layer 3 addressing. However, the networking industry has evolved to the point that it requires a common layer 3 addressing system. The Internet Protocol (IP) addresses make networks easier to both set up and connect with one another. The Internet uses IP addressing to provide connectivity to millions of networks around the world. To make it easier to manage the network and control the flow of packets, many organizations separate their network layer addressing into smaller parts known as subnets. Routers use the network or subnet portion of the IP addressing to route traffic between different networks. Each router must be configured specifically for the networks or subnets that will be connected to its interfaces. Routers communicate with one another using routing protocols, such as Routing Information Protocol (RIP) and Open version of Shortest Path First (OSPF), to learn of other networks that are present and to calculate the best way to reach each network based on a variety of criteria (such as the path with the fewest routers). Routers and other networked systems make these routing decisions at the network layer. When passing packets between different networks, it may become necessary to adjust their outbound size to one that is compatible with the layer 2 protocol that is being used. The network layer accomplishes this via a process known as fragmentation. A router’s network layer is usually responsible for doing the fragmentation. All reassembly of fragmented packets happens at the network layer of the final destination system.
Two of the additional functions of the network layer are diagnostics and the reporting of logical variations in normal network operation. While the network layer diagnostics may be initiated by any networked system, the system discovering the variation reports it to the original sender of the packet that is found to be outside normal network operation. The variation reporting exception is content validation calculations. If the calculation done by the receiving system does not match the value sent by the originating system, the receiver discards the related packet with no report to the sender. Retransmission is left to a higher layer’s protocol.

4. The transport Layer: This layer is responsible for ensuring the error-free message delivery. It also takes care that no loss of data while transmitting and all the data sent should be in sequence. From this level the higher layer protocol is revealed. The type of service from the network layer decides the size and complexity of the transport protocol.

Some of the functions offered by the transport layer include:

 • Application identification
 • Client-side entity identification
 • Confirmation that the entire message arrived intact 
 • Segmentation of data for network transport 
 • Control of data flow to prevent memory overruns
 • Establishment and maintenance of both ends of virtual circuits 
 • Transmission-error detection
 • Realignment of segmented data in the correct order on the receiving side 
• Multiplexing or sharing of multiple sessions over a single physical link

5. The Session Layer: This layer is responsible for establishing session between processes that are running on different stations.
Layer 5, the session layer, provides various services, including tracking the number of bytes that each end of the session has acknowledged receiving from the other end of the session. This session layer allows applications functioning on devices to establish, manage, and terminate a dialog through a network.

Session layer functionality includes:

 • Virtual connection between application entities
 • Synchronization of data flow
 • Creation of dialog units
 • Connection parameter negotiations
 • Partitioning of services into functional groups
 • Acknowledgements of data received during a session
 • Re-transmission of data if it is not received by a device

6. The presentation Layer: As the name indicates this layer formats the data as to be presented to the application layer.
Layer 6, the presentation layer, is responsible for how an application formats the data to be sent out onto the network. The presentation layer basically allows an application to read (or understand) the message. 
 presentation layer functionality include:
 • Encryption and decryption of a message for security
 • Compression and expansion of a message so that it travels efficiently
 • Graphics formatting
 • Content translation
 • System-specific translation
7. The Application Layer: This layer provides protocols to user window and applications processes. This also provides the application process to access network services and has many functions such as resource sharing, remote file access, printer access, and inter-process communication
Layer 7, the application layer, provides an interface for the end user operating a device connected to a network. This layer is what the user sees, in terms of loading an application (such as Web browser or e-mail); that is, this application layer is the data the user views while using these applications. application layer functionality include:
 • Support for file transfers
 • Ability to print on a network
 • Electronic mail
 • Electronic messaging
 • Browsing the World Wide Web

Comments

Popular posts from this blog

Special Permissions in linux

The setuid permission on an executable file means that the command will run as the user owning the file, not as the user that ran the command. One example is the passwd command: [student@desktopX ~]$ ls -l /usr/bin/passwd -rw s r-xr-x. 1 root root 35504 Jul 16 2010 /usr/bin/passwd In a long listing, you can spot the setuid permissions by a lowercase s where you would normally expect the x (owner execute permissions) to be. If the owner does not have execute permissions, this will be replaced by an uppercase S . The special permission setgid on a directory means that files created in the directory will inherit their group ownership from the directory, rather than inheriting it from the creating user. This is commonly used on group collaborative directories to automatically change a file from the default private group to the shared group, or if files in a directory should be

The Seven-Step Model of Migration

Irrespective of the migration approach adopted, the Seven-step Model of Cloud Migration creates a more rational point of view towards the migration process and offers the ability to imbibe several best practices throughout the journey Step 1: Assess Cloud migration assessments are conducted to understand the complexities in the migration process at the code, design and architectural levels. The investment and the recurring costs are also evaluated along with gauging the tools, test cases, functionalities and other features related to the configuration. Step 2: Isolate The applications to be migrated to the cloud from the internal data center are freed of dependencies pertaining to the environment and the existing system. This step cuts a clearer picture about the complexity of the migration process. Step 3: Map Most organisations hold a detailed mapping of their environment with all the systems and applications. This information can be used to distinguish between the

RequestsDependencyWarning: urllib3 (1.24.1) or chardet (3.0.4) doesn't match a supported version

import tweepy /usr/lib/python2.7/dist-packages/requests/__init__.py:80: RequestsDependencyWarning: urllib3 (1.24.1) or chardet (3.0.4) doesn't match a supported version!   RequestsDependencyWarning) Traceback (most recent call last):   File "<stdin>", line 1, in <module>   File "/usr/local/lib/python2.7/dist-packages/tweepy/__init__.py", line 14, in <module>     from tweepy.api import API   File "/usr/local/lib/python2.7/dist-packages/tweepy/api.py", line 12, in <module>     from tweepy.binder import bind_api   File "/usr/local/lib/python2.7/dist-packages/tweepy/binder.py", line 11, in <module>     import requests   File "/usr/lib/python2.7/dist-packages/requests/__init__.py", line 97, in <module>     from . import utils   File "/usr/lib/python2.7/dist-packages/requests/utils.py", line 26, in <module>     from ._internal_utils import to_native_string   File "/usr/lib/python2.

tag