Sie sind auf Seite 1von 23

OSI model

From Wikipedia, the free encyclopedia

OSI model
7. Application layer

NNTP SIP SSI DNS FTP Gopher HTTP NFS NT P SMPP SMTP SNMP Telnet DHCP Netconf RTP SPDY (more)

6. Presentation layer

MIME XDR TLS SSL

5. Session layer

Named pipe NetBIOS SAP L2TP PPTP SOCKS

4. Transport layer

TCP UDP SCTP DCCP SPX

3. Network layer

IP (IPv4, IPv6) ICMP IPsec IGMP IPX AppleTalk

2. Data link layer

ATM SDLC HDLC ARP CSLIP SLIP GFP PLIP IEEE 802.3 Frame Relay ITU-T G.hn DLL PPP X.25 N etwork switch

1. Physical layer

EIA/TIA-232 EIA/TIA-449 ITU-T V-Series I.430 I.431 POTS PDH SONET/SDH PON OTN DSL IEEE 802. 3 IEEE 802.11 IEEE 802.15 IEEE 802.16 IEEE 1394 IT U-T G.hn PHY USB Bluetooth Hubs

This box: view talk edit

The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization. It is a prescription of characterizing and standardizing the functions of a communications system in terms of abstraction layers. Similar communication functions are grouped into logical layers. An instance of a layer provides services to its upper layer instances while receiving services from the layer below. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that make up the contents of that path. Two instances at one layer are connected by a horizontal connection on that layer.

Communication in the OSI-Model (example with layers 3 to 5)

Contents
[hide]

1 History 2 Description of OSI layers

2.1 Layer 1: physical layer 2.2 Layer 2: data link layer

2.2.1 WAN protocol architecture

2.2.2 IEEE 802 LAN architecture

2.3 Layer 3: network layer 2.4 Layer 4: transport layer 2.5 Layer 5: session layer 2.6 Layer 6: presentation layer 2.7 Layer 7: application layer

3 Cross-layer functions 4 Interfaces 5 Examples 6 Comparison with TCP/IP 7 See also 8 References 9 External links

[edit]History
Work on a layered model of network architecture was started and the International Organization for Standardization (ISO) began to develop its OSI framework architecture. OSI had two major components: an abstract model of networking, called the Basic Reference Model or seven-layer model, and a set of specific protocols. The concept of a seven-layer model was provided by the work of Charles Bachman, Honeywell Information Services. Various aspects of OSI design evolved from experiences with the ARPANET, the fledgling Internet, NPLNET, EIN, CYCLADES network and the work in IFIP WG6.1. The new design was documented in ISO 7498 and its various addenda. In this model, a networking system was divided into layers. Within each layer, one or more entities implement its functionality. Each entity interacted directly only with the layer immediately beneath it, and provided facilities for use by the layer above it.

Protocols enabled an entity in one host to interact with a corresponding entity at the same layer in another host. Service definitions abstractly described the functionality provided to an (N)-layer by an (N-1) layer, where N was one of the seven layers of protocols operating in the local host. The OSI standards documents are available from the ITU-T as the X.200-series of recommendations.[1] Some of the protocol specifications were also available as part of the ITU-T X series. The equivalent ISO and ISO/IEC standards for the OSI model were available from ISO, but only some of them without fees.[2]

[edit]Description

of OSI layers

According to recommendation X.200, there are seven layers, each generically known as an N layer. An N+1 entity requests services from the layer-N entity. At each level, two entities (N-entity peers) interact by means of the N protocol by transmitting protocol data units (PDU). A Service Data Unit (SDU) is a specific unit of data that has been passed down from an OSI layer to a lower layer, and which the lower layer has not yet encapsulated into a protocol data unit (PDU). An SDU is a set of data that is sent by a user of the services of a given layer, and is transmitted semantically unchanged to a peer service user. The PDU at any given layer, layer N, is the SDU of the layer below, layer N-1. In effect the SDU is the 'payload' of a given PDU. That is, the process of changing a SDU to a PDU, consists of an encapsulation process, performed by the lower layer. All the data contained in the SDU becomes encapsulated within the PDU. The layer N-1 adds headers or footers, or both, to the SDU, transforming it into a PDU of layer N-1. The added headers or footers are part of the process used to make it possible to get data from a source to a destination.

OSI Model Data unit Host Data layers Layer 7. Application 6. Presentation 5. Session
Network process to application

Function

Data representation, encryption and decryption, convert machine dependent data to machine independent data Interhost communication, managing sessions between applications

Segments

4. Transport

End-to-end connections, reliability and flow control

Packet/Datagram 3. Network Media Frame layers Bit 2. Data link 1. Physical

Path determination andlogical addressing

Physical addressing

Media, signal and binary transmission

Some orthogonal aspects, such as management and security, involve every layer. Security services are not related to a specific layer: they can be related by a number of layers, as defined by ITU-T X.800 Recommendation.[3] These services are aimed to improve the CIA triad(confidentiality, integrity, and availability) of transmitted data. Actually the availability of communication service is determined by network design and/or network management protocols. Appropriate choices for these are needed to protect againstdenial of service.

[edit]Layer

1: physical layer

The physical layer defines electrical and physical specifications for devices. In particular, it defines the relationship between a device and a transmission medium, such as a copper or optical cable. This includes the layout ofpins, voltages, cable specifications, hubs, repeaters, network adapters, host bus adapters (HBA used in storage area networks) and more. The major functions and services performed by the physical layer are:

Establishment and termination of a connection to acommunications medium. Participation in the process whereby the communication resources are effectively shared among multiple users. For example, contention resolution and flow control.

Modulation, or conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel. These are signals operating over the physical cabling (such as copper and optical fiber) or over a radio link.

Parallel SCSI buses operate in this layer, although it must be remembered that the logical SCSI protocol is a transport layer protocol that runs over this bus. Various physical-layer Ethernet standards are also in this layer; Ethernet incorporates both this layer and the data link layer. The same applies to other local-area networks, such as token ring, FDDI, ITU-T G.hn and IEEE 802.11, as well as personal area networks such as Bluetooth and IEEE 802.15.4.

[edit]Layer

2: data link layer

The data link layer provides the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the physical layer. Originally, this layer was intended for point-to-point and point-to-multipoint media, characteristic of wide area media in the telephone system. Local area network architecture, which included broadcast-capable multiaccess media, was developed independently of the ISO work in IEEE Project 802. IEEE work assumed sublayering and management functions not required for WAN use. In modern practice, only error detection, not flow control using sliding window, is present in data link protocols such as Point-to-Point Protocol (PPP), and, on local area networks, the IEEE 802.2 LLC layer is not used for most protocols on the Ethernet, and on other local area networks, its flow control and acknowledgment mechanisms are rarely used. Sliding window flow control and acknowledgment is used at the transport layer by protocols such as TCP, but is still used in niches where X.25 offers performance advantages. The ITU-T G.hn standard, which provides high-speed local area networking over existing wires (power lines, phone lines and coaxial cables), includes a complete data link layer which provides both error correction and flow control by means of a selective repeat Sliding Window Protocol. Both WAN and LAN service arrange bits, from the physical layer, into logical sequences called frames. Not all physical layer bits necessarily go into frames, as some of these bits are purely intended for physical layer functions. For example, every fifth bit of the FDDI bit stream is not used by the layer.

[edit]WAN protocol architecture


Connection-oriented WAN data link protocols, in addition to framing, detect and may correct errors. They are also capable of controlling the rate of transmission. A WAN data link layer might implement a sliding window flow control and acknowledgment mechanism to provide reliable delivery of frames; that is the case for Synchronous Data Link Control (SDLC) and HDLC, and derivatives of HDLC such as LAPB and LAPD.

[edit]IEEE 802 LAN architecture

Practical, connectionless LANs began with the pre-IEEE Ethernet specification, which is the ancestor of IEEE 802.3. This layer manages the interaction of devices with a shared medium, which is the function of a media access control (MAC) sublayer. Above this MAC sublayer is the media-independent IEEE 802.2 Logical Link Control (LLC) sublayer, which deals with addressing and multiplexing on multiaccess media. While IEEE 802.3 is the dominant wired LAN protocol and IEEE 802.11 the wireless LAN protocol, obsolescent MAC layers include Token Ring and FDDI. The MAC sublayer detects but does not correct errors.

[edit]Layer

3: network layer

The network layer provides the functional and procedural means of transferring variable length data sequences from a source host on one network to a destination host on a different network, while maintaining the quality of service requested by the transport layer (in contrast to the data link layer which connects hosts within the same network). The network layer performs network routingfunctions, and might also perform fragmentation and reassembly, and report delivery errors. Routers operate at this layer, sending data throughout the extended network and making the Internet possible. This is a logical addressing scheme values are chosen by the network engineer. The addressing scheme is not hierarchical. The network layer may be divided into three sublayers:

1. Subnetwork access that considers protocols that deal with the interface to networks, such as X.25; 2. Subnetwork-dependent convergence when it is necessary to bring the level of a transit network up to the level of networks on either side 3. Subnetwork-independent convergence handles transfer across multiple networks.
An example of this latter case is CLNP, or IPv7 ISO 8473. It manages the connectionless transfer of data one hop at a time, from end system to ingress router, router to router, and from egress routerto destination end system. It is not responsible for reliable delivery to a next hop, but only for the detection of erroneous packets so they may be discarded. In this scheme, IPv4 and IPv6 would have to be classed with X.25 as subnet access protocols because they carry interface addresses rather than node addresses. A number of layer-management protocols, a function defined in the Management Annex, ISO 7498/4, belong to the network layer. These include routing protocols, multicast group management, network-layer information and error, and network-layer address assignment. It is the function of the payload that makes these belong to the network layer, not the protocol that carries them.

[edit]Layer

4: transport layer

The transport layer provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. The transport layer controls the reliability of a given link through flow control, segmentation/desegmentation, and error control. Some protocols are state- and connection-oriented. This means that the transport layer can keep track of the segments and retransmit those that fail. The transport layer also provides the acknowledgement of the successful data transmission and sends the next data if no errors occurred. OSI defines five classes of connection-mode transport protocols ranging from class 0 (which is also known as TP0 and provides the least features) to class 4 (TP4, designed for less reliable networks, similar to the Internet). Class 0 contains no error recovery, and was designed for use on network layers that provide error-free connections. Class 4 is closest to TCP, although TCP contains functions, such as the graceful close, which OSI assigns to the session layer. Also, all OSI TP connection-mode protocol classes provide expedited data and preservation of record boundaries. Detailed characteristics of TP0-4 classes are shown in the following table:[4]

Feature Name

TP0 TP1 TP2 TP3 TP4

Connection oriented network

Yes Yes Yes Yes Yes

Connectionless network

No

No

No

No Yes

Concatenation and separation

No Yes Yes Yes Yes

Segmentation and reassembly

Yes Yes Yes Yes Yes

Error Recovery

No Yes Yes Yes Yes

Reinitiate connection (if an excessive number of PDUs are unacknowledged)

No Yes No Yes No

Multiplexing and demultiplexing over a single virtual circuit

No

No Yes Yes Yes

Explicit flow control

No

No Yes Yes Yes

Retransmission on timeout

No

No

No

No Yes

Reliable Transport Service

No Yes No Yes Yes

Perhaps an easy way to visualize the transport layer is to compare it with a Post Office, which deals with the dispatch and classification of mail and parcels sent. Do remember, however, that a post office manages the outer envelope of mail. Higher layers may have the equivalent of double envelopes, such as cryptographic presentation services that can be read by the addressee only. Roughly speaking, tunneling protocols operate at the transport layer, such as carrying non-IP protocols such as IBM's SNA or Novell's IPX over an IP network, or end-to-end encryption with IPsec. While Generic Routing Encapsulation (GRE) might seem to be a network-layer protocol, if the encapsulation of the payload takes place only at endpoint, GRE becomes closer to a transport protocol that uses IP headers but contains complete frames or packets to deliver to an endpoint. L2TP carries PPP frames inside transport packet. Although not developed under the OSI Reference Model and not strictly conforming to the OSI definition of the transport layer, the Transmission Control Protocol (TCP) and the User Datagram Protocol(UDP) of the Internet Protocol Suite are commonly categorized as layer-4 protocols within OSI.

[edit]Layer

5: session layer

The session layer controls the dialogues (connections) between computers. It establishes, manages and terminates the connections between the local and remote application. It provides for full-duplex,half-duplex, or simplex operation, and establishes checkpointing, adjournment, termination, and restart

procedures. The OSI model made this layer responsible for graceful close of sessions, which is a property of the Transmission Control Protocol, and also for session checkpointing and recovery, which is not usually used in the Internet Protocol Suite. The session layer is commonly implemented explicitly in application environments that use remote procedure calls.

[edit]Layer

6: presentation layer

The presentation layer establishes context between application-layer entities, in which the higher-layer entities may use different syntax and semantics if the presentation service provides a mapping between them. If a mapping is available, presentation service data units are encapsulated into session protocol data units, and passed down the stack. This layer provides independence from data representation (e.g., encryption) by translating between application and network formats. The presentation layer transforms data into the form that the application accepts. This layer formats and encrypts data to be sent across a network. It is sometimes called the syntax layer.[5] The original presentation structure used the basic encoding rules of Abstract Syntax Notation One (ASN.1), with capabilities such as converting an EBCDIC-coded text file to an ASCII-coded file, orserialization of objects and other data structures from and to XML.

[edit]Layer

7: application layer

The application layer is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application. This layer interacts with software applications that implement a communicating component. Such application programs fall outside the scope of the OSI model. Application-layer functions typically include identifying communication partners, determining resource availability, and synchronizing communication. When identifying communication partners, the application layer determines the identity and availability of communication partners for an application with data to transmit. When determining resource availability, the application layer must decide whether sufficient network or the requested communication exist. In synchronizing communication, all communication between applications requires cooperation that is managed by the application layer. Some examples of application-layer implementations also include: On OSI stack:

FTAM File Transfer and Access Management Protocol X.400 Mail

Common management information protocol (CMIP)

On TCP/IP stack:

Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP) Simple Network Management Protocol (SNMP).

[edit]Cross-layer

functions

There are some functions or services that are not tied to a given layer, but they can affect more than one layer. Examples are

security service (telecommunication)[3] as defined by ITU-T X.800 Recommendation. management functions, i.e. functions that permit to configure, instantiate, monitor, terminate the communications of two or more entities: there is a specific application layer protocol, common management information protocol (CMIP) and its corresponding service, common management information service (CMIS), they need to interact with every layer in order to deal with their instances.

MPLS operates at an OSI-model layer that is generally considered to lie between traditional definitions of layer 2 (data link layer) and layer 3 (network layer), and thus is often referred to as a "layer-2.5" protocol. It was designed to provide a unified data-carrying service for both circuit-based clients and packet-switching clients which provide a datagram service model. It can be used to carry many different kinds of traffic, including IP packets, as well as native ATM, SONET, and Ethernet frames.

ARP is used to translate IPv4 addresses (OSI layer 3) into Ethernet MAC addresses (OSI layer 2).

[edit]Interfaces
Neither the OSI Reference Model nor OSI protocols specify any programming interfaces, other than as deliberately abstract service specifications. Protocol specifications precisely define the interfaces between different computers, but the software interfaces inside computers are implementationspecific.

For example Microsoft Windows' Winsock, and Unix's Berkeley sockets and System V Transport Layer Interface, are interfaces between applications (layer 5 and above) and the transport (layer 4).NDIS and ODI are interfaces between the media (layer 2) and the network protocol (layer 3). Interface standards, except for the physical layer to media, are approximate implementations of OSI service specifications.

[edit]Examples Layer OSI protocols # Nam e TCP/IP protocols Signaling System 7[6] AppleTalk IPX SN A UMTS Misc. examples

Appl FTAM, X.400, X.500,D NNTP, SIP, SSI, DNS,FTP, Gopher, HTTP INAP,MAP, AFP, ZIP,R RIP, SA AP 7 icati AP, ROSE, RTSE,ACSE , NFS,NTP, DHCP, SMPP,SMTP, SNMP, TCAP,ISUP TMP,NBP P PC [7] on CMIP[8] Telnet, RIP,BGP ,TUP

HL7, Modbus

Pres ISO/IEC 8823, X.226, 6 entat ISO/IEC 9576-1, X.236 ion

MIME, SSL, TLS, XDR

AFP

TDI, ASCII, EBCDIC, MIDI, MPEG

Sessi ISO/IEC 8327, X.225, 5 on ISO/IEC 9548-1, X.235

Sockets. Session establishment in TCP, RTP

D ASP,ADSP, NWLink LC PAP ?

Named pipes, NetBIOS, SAP, h alf duplex, full duplex,simplex, RPC

ISO/IEC 8073, TP0, Tran TP1, TP2, TP3, TP4 4 sport (X.224), ISO/IEC 8602, X.234

TCP, UDP, SCTP, DCCP

DDP,SP X

NBF

ISO/IEC 8208, X.25(PL Net P), ISO/IEC 8878,X.223, 3 IP, IPsec, ICMP, IGMP,OSPF work ISO/IEC 8473-1, CLNP X.233.

ATP(Token SCCP,MTP TalkorEther IPX Talk)

RRC (Radio Resource Control) Pac ket Data Convergenc e NBF, Q.931, IS-IS Protocol(PD CP) and BMC(B roadcast/Mu lticast Control)

ISO/IEC 7666, X.25(LA Data PB), Token Bus, X.222, 2 PPP, SBTV SLIP, PPTP Link ISO/IEC 8802-2 LLC Ty [9] pe 1 and 2

802.3 (Ethernet), 802.11a/b/g/ n MAC/LLC, 802.1Q (VLAN),ATM, HDP, F DDI, Fibre Channel, Frame LLC (Logic Relay, HDLC,ISL, PPP IEEE LocalTalk, al Link , Q.921, Token 802.3fra AppleTalk SD Control),M Ring, CDP, NDP ARP ( MTP,Q.710 ming,Eth Remote LC AC (Media maps layer 3 to layer 2 ernet II Access,PPP Access address), ITU-T G.hn framing Control) DLL CRC, Bit stuffing, ARQ, Data Over Cable Service Interface Specification (DOCSIS), interface bonding

1 Phys X.25 (X.21bis,EIA/TIAical 232, EIA/TIA-449, EIA530,G.703)[9]

MTP,Q.710 RS-232,RS422,STP,Ph oneNet

T UMTS wi Physical na layer or L1 x

RS-232, Full duplex, RJ45, V.35, V. 34, I.430, I.431, T1,E1, 10BASE-T, 100BASETX, POTS, SONET, S

DH, DSL,802.11a/b/g/n PHY, ITU-T G.hn PHY, Controller Area Network, Data Over Cable Service Interface Specification (DOCSIS) [edit]Comparison

with TCP/IP

In the TCP/IP model of the Internet, protocols are deliberately not as rigidly designed into strict layers as in the OSI model.[10] RFC 3439 contains a section entitled "Layering considered harmful." However, TCP/IP does recognize four broad layers of functionality which are derived from the operating scope of their contained protocols, namely the scope of the software application, the end-to-end transport connection, the internetworking range, and lastly the scope of the direct links to other nodes on the local network. Even though the concept is different from the OSI model, these layers are nevertheless often compared with the OSI layering scheme in the following way: The Internet application layer includes the OSI application layer, presentation layer, and most of the session layer. Its end-to-end transport layer includes the graceful close function of the OSI session layer as well as the OSI transport layer. The internetworking layer (Internet layer) is a subset of the OSI network layer (see above), while the link layer includes the OSI data link and physical layers, as well as parts of OSI's network layer. These comparisons are based on the original seven-layer protocol model as defined in ISO 7498, rather than refinements in such things as the internal organization of the network layer document. The presumably strict peer layering of the OSI model as it is usually described does not present contradictions in TCP/IP, as it is permissible that protocol usage does not follow the hierarchy implied in a layered model. Such examples exist in some routing protocols (e.g., OSPF), or in the description of tunneling protocols, which provide a link layer for an application, although the tunnel host protocol may well be a transport or even an application layer protocol in its own right.

OSI Seven-Layer Model In the 1980s, the European-dominated International Standards Organization (ISO), began to develop its Open Systems Interconnection (OSI) networking suite. OSI has two major components: an abstract model of networking (the Basic Reference Model, or seven-layer model), and a set of concrete protocols. The standard documents that describe OSI are for sale and not currently available online. Parts of OSI have influenced Internet protocol development, but none more than the abstract model itself, documented in OSI 7498 and its various addenda. In this model, a networking system is divided into layers. Within each layer, one or more entities implement its functionality. Each entity interacts directly only with the layer immediately beneath it, and provides facilities for use by the layer above it. Protocols enable an entity in one host to interact with a corresponding entity at the same layer in a remote host.

The seven layers of the OSI Basic Reference Model are (from bottom to top): 1. The Physical Layer describes the physical properties of the various communications media, as well as the electrical properties and interpretation of the exchanged signals. Ex: this layer defines the size of Ethernet coaxial cable, the type of BNC connector used, and the termination method. 2. The Data Link Layer describes the logical organization of data bits transmitted on a particular medium. Ex: this layer defines the framing, addressing and checksumming of Ethernet packets. 3. The Network Layer describes how a series of exchanges over various data links can deliver data between any two nodes in a network. Ex: this layer defines the addressing and routing structure of the Internet.

The Transport Layer describes the quality and nature of the data delivery. Ex: this layer defines if and how retransmissions will be used to ensure data delivery. 5. The Session Layer describes the organization of data sequences larger than the packets handled by lower layers. Ex: this layer describes how request and reply packets are paired in a remote procedure call. 6. The Presentation Layer describes the syntax of data being transferred. Ex: this layer describes how floating point numbers can be exchanged between hosts with different math formats. 7. The Application Layer describes how real work actually gets done. Ex: this layer would implement file system operations. The original Internet protocol specifications defined a four-level model, and protocols designed around it (like TCP) have difficulty fitting neatly into the seven-layer model. Most newer designs use the seven-layer model.
4.
\begin{soapbox}

The OSI Basic Reference Model has enjoyed a far greater acceptance than the OSI protocols themselves. There are several reasons for this. OSI's committee-based design process bred overgrown, unimaginative protocols that nobody ever accused of efficiency. Heavy European dominance helped protect their investments in X.25 (CONS is basically X.25 for datagram networks). Perhaps most importantly, X.25 data networks never caught people's imagination like the Internet, which, with a strong history of free, downloadable protocol specifications, has been loath to embrace yet another networking scheme where you have to pay to figure how things work. And why should we? OSI's biggest problem is that doesn't really offer anything new. The strongest case for its implementation comes from its status as an "international standard", but we already have a de facto international standard - the Internet. OSI protocols will be around, but its most significant contribution is the philosophy of networking represented by its layered model. If the Internet community has to worry about anything, it's the danger of IETF turning into another ISO - a big, overgrown standards organization run by committees, churning out thousands of pages of rubbish, and dominated by big business players more interested in preserving investments than advancing the state of the art.
\end{soapbox}

What is OSI Layer Model


OSI Layer Model is a creation defined by international organization for standards and OSIstands for Open Systems Interconnection. This method split communication system into seven different layers. A layer is an assortment of theoretically comparable functions that offer services to the layer over it and obtains services from the layer below it. OSI Layer Modelfacilitates the user a blunder free transportation transversely a network and offer the pathway required by applications. The layers throw and obtain packets that provide the path to contents. OSI Layer Model offering a framework for networking which employ protocols in seven layers. The processing control exceed from one layer to next layer and this process continue till the end .The processing start from bottom layer and then over the channel to further station and backing the hierarchy. The OSI model layer consists of seven layers and each layer interacts with each other. The layer one and two called media layer and layer 3, 4, 5, 6, and 7 called host layers. OSI layer model is classified into 7 categories discussed in detail under.

1. OSI Physical Layer 2. OSI Data Link Layer 3. OSI Network Layer 4. OSI Transport Layer 5. OSI Session Layer 6. OSI Presentation Layer 7. OSI Application Layer

OSI Physical Layer


OSI Physical Layer is responsible for media, signal and binary communications. OSI Physical Layer describes the physical and electrical stipulations for devices in depth it identify the relationship among physical medium and devices such as bus adopters, repeaters, hubs, cables, pins, voltages and network adapters etc. The functionality of OSI Physical Layer contrast with the OSI Data Link Layer as physical layer is a primarily with the communication of a particular device with a standard while data link layer deals at last two or multiple devices. OSI Physical layer contains cables, cards, and various physical features for data carrier such as protocol, ATM, RS232, and Ethernet. OSI Physical layer perform following functions or services. Physical layer is responsible to set up and terminate a link to a communication medium. Physical layer play a part where the communication resources are efficiently shared between manifold users. Physical layer offer

hardware resources for sending and receiving of data. It also handled the exchanging between the demonstrations of digital data and signals broadcasting over a transportation channel such as optical fiber, copper wire, and over a radio link SCSI buses also operated in this layer.

OSI Data Link Layer


OSI Data Link Layer provides Physical addressing. OSI Data Link Layer gives procedural and functional resources for broadcasting of data among networks. It also identifies errors of physical layer and tries to correct them. The main propose of OSI Data link layer propose is to handled point to multi point and point to point media. The encoded and decoded of data into bits is the main functionality of OSI Data Link Layer including frames management and flow control.OSI Data Link Layer has two sub layers Media Access Control (MAC) layer which is responsible to manage how and where computers on the network get access to the information and consent to broadcast it and OSI Logical Link Control (LLC) layer control which is responsible for frame management, error checking, and flow control of data. The HDLC, LSL, and ATM are the implemented protocols on his layer.

OSI Network Layer OSI Network Layer is used for logical addressing as virtual circuits which are used to transmit data from node to node and determination of Path. OSI Network Layer is also offering routing and switching technologies. The error handling, packet sequencing, internetworking, addressing, and congestion control are the main functionality of Network layer. It also provides best quality of service on the request of transport layer. The IPX and TCP/IP are the implemented protocols on this layer. Network Layer has three sub layers as listed below.

1. Subnetwork Access Subnetwork Access regard as protocols and responsible to deal with interface to network as X.25. 2. Subnetwork Dependent Convergence It is responsible to carry level of transportation network up to the level of network on any side. 3. Subnetwork Independent Convergence It is used to manage transformation across multiple networks.

OSI Transport Layer OSI Transport Layer provides connections from end-to-end, flow control of data, and reliability of transmit data. It is also offering error recovery. OSI Transport Layer can maintain path of the section and resend those that fail. The most common example of Transport layer is Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). The working of OSI Transport Layer is just like a post office which deals lots of mail, dispatches and sending ofparcel while in post office outer envelop of mail used but in Transport layer double envelop used as cryptographic presentation services that can be read only by addresses. The tunneling protocols operated by Transport layer. The SPX, TCP/IPs, DNS are examples of implemented protocols on this layer.

OSI Session Layer OSI Session Layer deals with Interhost communication. It is responsible to manage, establish and conclude the link among applications. Through OSI Session layer the setting up of new connection can be handled, if needed conversation terminated, and exchanging of dialogue between the applications at every end. OSI Session Layer also administers session and link coordination. It also offers full and half duplex including simple operation. The OSI Session Layer is generally executed explicitly in application surroundings that employ remote system calls. The SAP, and TCP/IP remote procedure call are the examples of implemented protocols.

OSI Presentation Layer OSI Presentation Layer is providing data representation, convert plain text into code as encryption and decoding of data. OSI Presentation Layer offering liberty from compatibility troubles therefore it is also called syntax layer. It also set up a perspective among application layer entities. OSI Presentation Layer decoded data demonstration from application to network format and vice versa. It has essential encoding rules of ANSI which have ability to changing an EBCDIC-coded text file to an ASCII-coded file. Data translation, Data conversion and compression are the main task of OSI Presentation Layer. The NCP and Apple talk Filing Protocol are implemented in presentation layer.

OSI Application Layer OSI Application Layer is responsible for network process to application. It supports various types of applications and end user procedures. OSI Application

Layer identifies the communication associate, Excellency of service, user verification, privacy, and restraint of data syntax. Application Layer also offering various services such as file transformation, e-mail, and network software services. It contains Telnet and FTP and also includes Tiered application architectures. The well known examples of OSI model layers are web browsing, SAP, SMTP, TCP/IP, and NFS.
Boolean algebra (or Boolean logic) is a logical calculus of truth values, developed by George Boole in the 1840s. It resembles the algebra of real numbers, but with the numeric operations of multiplication xy, addition x + y, and negation x replaced by the respective logical operations of conjunction xy, disjunction xy, and negation x. The Boolean operations are these and all other operations that can be built from these, such as x(yz). These turn out to coincide with the set of all operations on the set {0,1} that take only finitely many arguments; there are 22n such operations when there are n arguments. The laws of Boolean algebra can be defined axiomatically as certain equations called axioms together with their logical consequences called theorems, or semantically as those equations that are true for every possible assignment of 0 or 1 to their variables. The axiomatic approach is sound and complete in the sense that it proves respectively neither more nor fewer laws than the semantic approach.

In mathematics and computer science, the pigeonhole principle states that if n items are put into m pigeonholes with n > m, then at least one pigeonhole must contain more than one item. This theorem is exemplified in real-life by truisms like "there must be at least two left gloves or two right gloves in a group of three gloves". It is an example of a counting argument, and despite seeming intuitive it can be used to demonstrate possibly unexpected results; for example, that two people in London have the same number of hairs on their heads (see below). The first formalization of the idea is believed to have been made by Johann Dirichlet in 1834 under the name Schubfachprinzip ("drawer principle" or "shelf principle"). For this reason it is also commonly called Dirichlet's box principle, Dirichlet's drawer principle or simply "Dirichlet principle"a name that could also refer to the minimum principle for harmonic functions. The original "drawer" name is still in use in French ("principe des tiroirs"), Italian ("principio dei cassetti") and German ("Schubfachprinzip").

Though the most straightforward application is to finite sets (such as pigeons and boxes), it is also used with infinite sets that cannot be put into one-to-one correspondence. To do so requires the formal statement of the pigeonhole principle, which is "there does not exist an injective function on finite sets whosecodomain is smaller than its domain". Advanced mathematical proofs like Siegel's lemma build upon this more general concept. Mathematical induction is a method of mathematical proof typically used to establish that a given statement is true of all natural numbers (positiveintegers). It is done by proving that the first statement in the infinite sequence of statements is true, and then proving that if any one statement in the infinite sequence of statements is true, then so is the next one. The method can be extended to prove statements about more general well-founded structures, such as trees; this generalization, known as structural induction, is used in mathematical logic and computer science. Mathematical induction in this extended sense is closely related to recursion. Mathematical induction should not be misconstrued as a form of inductive reasoning, which is considered non-rigorous in mathematics (see Problem of induction for more information). In fact, mathematical induction is a form of rigorous deductive reasoning.[1]

Das könnte Ihnen auch gefallen