0% found this document useful (0 votes)
21 views4 pages

OSI Models

The document provides an introduction to networking and the OSI model, emphasizing the importance of mastering networking fundamentals for effective troubleshooting. It outlines the seven layers of the OSI model, detailing the functions of each layer from the Application Layer to the Physical Layer. Additionally, it discusses the significance of internetworking and the role of various protocols in facilitating communication between networks.

Uploaded by

tokam127
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views4 pages

OSI Models

The document provides an introduction to networking and the OSI model, emphasizing the importance of mastering networking fundamentals for effective troubleshooting. It outlines the seven layers of the OSI model, detailing the functions of each layer from the Application Layer to the Physical Layer. Additionally, it discusses the significance of internetworking and the role of various protocols in facilitating communication between networks.

Uploaded by

tokam127
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

CCENT 640-822 ICND 1 By Chris Bryant

Introduction to Networking & the Network Models

Networking is getting data from one point to another in the most effective manner possible.
Know and understand the fundamentals
Learning the fundamentals of networking are what this course is all about. The key to mastering
intermediate and advance networking is to master the fundamental because if you understand how
networks operate you can fix them.

Que.CCNA 2nd Edition Jeremy Cioara, David Minutella, Heather Stevenson

An internetwork is the connection of more than one network. These networks are linked together by
an internetworking device to provide communication between the networks. Internetworks may also
be referred to as internet.
The term internetworking signifies the industry, products, and processes that are required to handle
the challenges of network interoperability. Such issues can be quite complex because o the
existence of multiple vendors and protocols.

The OSI (Open System Interconnection)


The OSI model is something that any network expert will use through his/her network career. I
have personally found networking models to be helpful in developing effective troubleshooting
process. I freely admit that OSI models are tough because it is usually the first material presented
to networking student, and to be frank, it is not exciting as configuring routers and switches.

Application Layer (Layer 7)


This layer is where the end-user themselves interact with the network. Authentication services also
run at layer 7, but the encryption runs at the next layer down.

The application layer ensures that the remote communication partner is available, that the needed
communication resources exist (a modem for example) and both ends of communication agree on
procedures involving data integrity, privacy and error recovery.
Protocols and services that run at this layer include:

 Email protocols SMTP and POP3 When trying to decide if a protocol is an


 Telnet application layer protocol, just remember
 HTTP that protocols that require the end user
to
 FTP enter a request are application layer
 SNMP protocols.
 Firewalls

Firewalls are devices intended to keep network intruders out, it also operate at this layer.

Presentation Layer (Layer 6)


This layer presents data to the application layer and deals how data is presented, encryption also
occurs on this layer.
Any file type that deals with how data is presented is being used in the presentation layer JPEG,
GIF, ASCII, TIFF, MIDI, MPEG are all examples of this layer and responsible for data translation
and code formatting.

Session Layer (Layer 5)


This layer is the manager of the two way communication between two remote hosts. This is the
layer that handles the creation maintenance, and teardown of communications between those two
hosts. The overall communication is also referred to as a session.
Some sessions last just long enough to send a unidirectional message where other sessions will
be of longer duration.

The session layer defines how to start, control, and end conversations (called sessions). This
includes the control and management of multiple bidirectional messages so that the application can
be notified if only some of series messages are completed. This allows the presentation layer to
have seamless view of an incoming stream of data

Transport Layer (Layer 4)


The transport layer’s purpose is to establish a logical end to end connection between two systems

Network Layer (Layer 3)


The network layer defines three main features: logical addressing, routing (forwarding), and path
determination. The routing concepts define how devices (typically routers) forward packets to their
final destination. Logical addressing defines how each device can have an address that can be
used by the routing process. Path determination refers to the work done by routing protocols by
which all possible routers are learned, but the best route is chosen for use.

Data-link Layer (Layer 2)


The Data-link layer defines the rules (protocols) that determine when a device can send data over
a particular medium. Data-link protocols also define the format of a header and trailer that allows
devices attached to the medium to send and receive data successfully. The data link trailer, which
follows the encapsulated data, typically defines Frame Check Sequence (FCS) field, which allows
the receiving device to detect transmission errors.

Physical Layer (Layer 1)


This layer typically refers to standards from other organizations. These standards deal with the
physical characteristics of transmission medium, including connectors, pins, use of pins, electrical
currents, encoding, light modulation, and the rules for how to activate and deactivate the use of the
physical medium.
Que.CCNA 2nd Edition Jeremy Cioara, David Minutella, Heather Stevenson

By now you understand the concept of internetwork. Now the OSI model will help you see just how
an internetwork operates by using layered architecture.
The International Organization for Standardization (ISO) created the OSI model as the first major
attempt to internetwork various vendor-specific networks, the ultimate goal being that these
different vendor networks could work together in harmony. This model consists of seven layers.
Although it is not widely used today, the terminology is prevalent in the networking community.
The OSI model may also be helpful when troubleshooting a network issue.

7. Application In general, each layer communicates with the adjacent layers on


6. Presentation the OSI model and other corresponding layer on other system.
5. Session For example, the presentation layer communicates with the
4. Transport application layer, the session layer, and also with the presentation
3. Network layer of another connected system.
2. Data Link
1. Physical

Upper Layers
It is also important to know that the layers may also be referred to as upper and lower layers.
Primarily, the upper layers of the OSI model define communications that reside on end – user
stations. This is generally related to software communication.
The upper layers in the OSI model are:
7. Application
6. Presentation
5. Session

Application Layer
Layer 7 provides an interface between a host’s communication software and any necessary
external applications (such as email, file transfers, and terminal emulation). This layer can also
evaluate what resources are necessary to communicate between two devices and determine their
availability.
Layer 7 also provides the following functionality:
 Synchronization of client/server applications
 Error control and data integrity between applications
 System-independent processes to a host
Other protocols supported by the application layer include:
 Hypertext Transfer Protocol (HTTP): Enables web browsing with the transmission of
Hypertext Markup Language (HTML) documents on the internet
 Telnet: A TCP/IP protocol that provides terminal emulation to a remote host by creating a
virtual terminal. Secure CRT in one program that can be installed on a user computer to
create telnet sessions. This protocol requires authentication via username and password
 Secure HTTP (HTTPS): Enables secure web browsing. A secure connection is indicated
when the URL begins with https:// or when there is lock symbol at the lower right corner of
the web page that is being viewed

You might also like