Sie sind auf Seite 1von 9

How OSI 7 Layer Model Works?

Understanding OSI Layers


How OSI 7 Layer Model Works? Understanding OSI Layers by Anuj Tyagi
This article aims to study the 7 layers of OSI model used by Computer system, when communicating with any other system in same/ different network. Note: This article is not about understanding OSI layers. It is a practical approach for how OSI layers works & used by our computer system.

Application Layer: Application Layer provides user interface i.e. user directly interacts with this layer. The most common examples of applications which enable us to communicate through different protocols are : FTP (Eg. Filezilla Server Application) http/https (Eg. Firefox or any other Web-browser) SMTP ( via any email client like IBM LOTUS or Microsoft Outlook or WebBrowser) Telnet ( shell interpretaors like Command Prompt in windows/ terminal in linux distro)

As all of these applications accessed through computer . Presentation Layer: This layer gets name from its purpose . This layer responsibility includes : Presents data to application layer and responsible for data translation and formatting. Eg. Translation of data we enter into browser to be converted into web language codes with

different tags . Also it takes care of data which has been sent should be understood by browser to present it on user-interface . Compression and encryption of data .

I tried to capture a packet for PING REQUEST to www.google.com and on capturing packets got this in packets. For compression, take an example of browser which uses HTTP Compression to save transfer data volume and speeds ups Web page load time. Firefox uses Gzip encoding to send data . We proved that presentation layer also used by & within computer system .

Session Layer : Session layer establish, maintain and terminates sessions between end devices. We can check current sessions in the system using netstat command and output will look like this :

This command is common for windows/Linux OS. Transport Layer : This layer is concerned with reliability of data transfer . It is of two types : 1. Connection Oriented (TCP) 2. Connectionless (UDP) It is easy to find if connection is establish is in TCP/UDP state. Look at the above figure in which first column defines whether connection is established as TCP/UDP. This process is Protocol dependent . It also take care of other responsibilities like : Flow Control (windows) : Which find how much data should be send in one packet during transfer to minimize the data loss due to buffer overflow. It doesnt send data but Segment into smaller pieces and size of which is defined through windowing feature. To show this in practical manner, I started to upload a file on mediafire.com .

By ping , we got ip address of mediafire.com .its 205.196.120.8 . And Now I started to sniff the packets using wireshark on my pc. So, its easy to confirm that below captured packets are those during transfer from mediafire. .

So, what do we learn from above image ? Source address: 205.196.120.8 Destination address: 192.168.1.3 Protocol type: TCP (connection oriented )

Win (window size ): 66240 bytes = 65 KB approx .


Source address is mediafire server as we are uploading data. So, what conclusion it makes ? Data is being split up into 66240 bytes each and after reaching destination it being re-ordered. The segments which are delivered are acknowledged back to the sender upon their reception. Network Layer: Network layer works on Logical address which is IP addresses. A computer system understand IP addresses and communication and identification also takes place in computer system.

Any device which use ip-address for communication Data Link Layer : The main focus of data link layer on use of MAC address. Whenever data flows through the LAN , communication takes place through MAC address . So, to find if MAC address is being used during data transfer in lan or not ? I start capturing again using wireshark .

Which shows Destination MAC address : 00:26:5e:ff:c5:fc for 192.168.1.3 Source MAC address: 00:26:5e:fc:10:Se for 192.168.1.2 .

Physical Layer : This layer conveys the bit stream through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier. The Physical Layer defines electrical and physical specifications for devices. In particular, it defines the relationship between a device and a transmission medium, such as a copper or optical cable.

The major functions and services performed by the Physical Layer are: Establishment and termination of a connection to a communications medium. Participation in the process whereby the communication resources are effectively shared among multiple users. For example, contention resolution and flow control. Modulation, or conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel.

In short, Computer translates the signal and instructions into Binary language (0 or 1). Hardware devices understand Binary language (including computer device components , connecting cables)

So, during transfer of data, various instructions and signals executed whichch converted into binary language . Similarly, when we transfer data from our system to any other then transfer takes place through various components and leave through cable.

Related Posts : General Awareness,


General Discussion,

Network and LAN Hacking

Cyber Crime: Things You should know How OSI 7 Layer Model Works? Understanding OSI Layers I support Anna Hazare & Lokpal Bill Proposed by civil society. DO YOU ?? What is CEF- Cisco Express Forwarding: Load-Balancing with Static Routing How Routing will be done in between RIPv1 & RIPv2 Routing Protocols How LSA Works with/without OSPF AREA 0 | Running OSPF without AREA 0 By Anuj

Tyagi: Case Study

OSPF LSA: OSPF LSA Types | Link-State Advertisement Basics What is OSPF Routing Protocol? OSPF Hidden FACTS Revealed How to configure Static VRRP over Cisco router Configure OSPF without AREA 0: CCNP OSPF Case Study

Static Routing when point to point interfaces are on different subnet: Case Study What is SSL VPN Technology & How it Works: Basics of UTM & Corporate Security What is Hacker Emblem? A Universal Hacker Emblem: The Glider Emblem Want More Blog Traffic! Submit Your New Blog Here For Free Top Indian Hackers List: Indian Hackers Facts | Real Truth Revealed Website Defacement Proves You are Impotent Beware, Cyber Frauds are On Rise: How to Report & File a Complaint Against Hacker for

Online Fraud & Scams

Protect Your Mail from Spammers: How Spammers Get Your Email Address? What is Cloud Computing: Cloud Computing Basics Information

Related Posts Widget[?]

Das könnte Ihnen auch gefallen