Open System Interconnection - OSI
The OSI Model is a reference model used to standardize the communication processes of computer networks.
With the emergence of the concept of networking, many protocols were developed, but these protocols were developed by each manufacturer according to their own products, rather than adhering to a specific standard. This eventually led to communication issues between hardware produced by different manufacturers.
For instance, in the 1970s, IBM developed protocols called System Network Architecture (SNA) for its own hardware.
Similarly, Digital Equipment Corporation also created protocols named DECNet for its own products.
However, the lack of a common point of reference due to different protocols posed a significant problem for communication between different hardware during that time.
In order to address this issue, the OSI reference model was introduced by ISO (International Organization for Standardization) in 1984, which provided a standardized framework for communication independent of hardware and underlying network infrastructure.
When data is being transmitted between two network devices based on the OSI reference model, it starts from the top layer and progresses downwards through the lower layers. At each layer, specific information pertaining to that layer is added. This process is called Encapsulation. When the data reaches the physical layer, it gains access to the physical layer of the other device. At this point, the reverse process occurs, where the information added at each layer is extracted as the data progresses from the lowest layer to the top layer. This process is called De-encapsulation.
The OSI model divides the data communication processes of computer networks into 7 layers:
1- Physical Layer :
The Physical Layer enables direct transmission of data bits (1s and 0s) between devices in physical form, such as electrical signals, radio waves, and optical signals. It also detects and corrects transmission errors at the Physical Layer.
For example, in electrical medium, signals are expressed in voltage levels. The Physical Layer performs Line Coding process to convert data bits into appropriate voltage levels, generating the signal.
Similarly, in optical transmission media, signals are represented by light waves. Again, Line Coding process converts data bits into appropriate light signals, generating the signal at this layer.
2- Data Link Layer:
Data packets are divided into frames by the Data Link Layer and each frame is transmitted to the destination device in the network. Frames are numbered and organized to ensure the correct sequencing of data for the receiving device. The Data Link Layer enables direct transmission between devices using the physical address (MAC address) of the destination device.
Furthermore, the Data Link Layer detects and, if necessary, corrects errors in data packets using error detection methods such as special algorithms or cyclic redundancy checks (CRC).
In summary, the Data Link Layer is responsible for ensuring the security and correct sequencing of data during transmission, making it a crucial layer for reliable data communication.
3- Network Layer:
The Network Layer determines how data packets are transmitted from source to destination. Data packets are directed by the Network Layer from the source device to the destination device. In other words, the Network Layer enables routing of data packets between multiple network segments.
This layer works with protocols such as IP (Internet Protocol) to select the path for data packets from source to destination and make routing decisions.
In summary, the Network Layer manages the routing, addressing, communication between different networks, traffic management, and accessibility of the destination device for data packets.
4- Transport Layer :
The Transport Layer, as the name implies, is responsible for the task of data transfer. This layer ensures reliable and accurate data transmission between the source application layer and the destination application layer. It manages data packets, controls data flow, and establishes and terminates communication connections.
This layer uses protocols to manage data flow and ensure reliable communication between devices in a network, from source to destination. Examples of commonly used protocols include TCP and UDP.
! Each protocol is chosen based on the requirements of the
application.
5- Session Layer:
The Session Layer provides session management between devices in a network. By establishing and terminating sessions between two devices, it regulates communication. The Session Layer ensures a reliable and consistent session during data exchange by performing tasks such as session initiation, management, and termination in the communication process.
6- Presentation Layer:
The layer where operations such as encryption and compression are performed is the Presentation Layer. The purpose of this layer, which is the 6th layer, is to convert data coming from the application layer (7th layer) into a readable format. This way, the data is transmitted in a format that the target device can understand. The operations performed in this layer also ensure data security.
7- Application Layer:
The Presentation Layer provides an interface for data communication of user applications and manages the operation of application-level protocols. Applications such as web browsers, email clients, Domain Name System (DNS), and File Transfer Protocol (FTP) operate at this layer.
Thank you for reading..
Top comments (0)