Overview of the OSI Model


TCP/IP, like most protocols, is a suite of protocols rather than being a single monolithic protocol. The Open Systems Interconnection (OSI) model describes how suites of protocols work together and it establishes an industry standard for network communication. The OSI model is a conceptual theory that describes how protocols should work. TCP/IP does not exactly map to the OSI model on a one-to-one basis, but it maps closely enough to offer insights into how the protocol functions in general.

The OSI model is made up of seven layers, with each layer performing a different function to enable network communication. Each of the protocols within the TCP/IP protocol suite operate at one of the OSI layers.

The seven layers of the OSI model include the following:

  • Application Layer 7 is the top layer of the OSI model. This layer defines how network applications gain access to the network.

    Applications and software do not actually reside inside of the Application layer; instead layer 7 serves as an API or interface between client/server software and the network protocol.

  • Presentation Layer 6 outlines how data is formatted, presented, and converted. Protocols working at this layer are responsible for encrypting and converting data.

  • Session Layer 5 defines communication sessions between two TCP/IP hosts. Protocols operating at this layer establish, maintain, and terminate communication sessions.

  • Transport Layer 4 provides flow control and error-checking to ensure packet delivery.

  • Network Layer 3 is responsible for addressing and routing packets.

  • Data Link Layer 2 provides error-free delivery of frames between two hosts over the network.

  • Physical Layer 1 defines the physical characteristics of the network.

Note: The physical elements of the network actually reside in the physical layer. This includes the NIC and the appropriate communication medium, whether copper cabling, fiber optic cabling, radio transmitter/receiver (for wireless), IR transmitter/receiver, and so on.

As data moves down the OSI model, each layer adds its own information. This process is known as encapsulation. On the receiving end, the information is stripped off as the data flows up the layers. This process is known as de-encapsulation.

The Department of Defense (DoD) Model

TCP/IP maps to another conceptual model known as the Department of Defense (DoD) model or DARPA (Defense Advanced Research Projects Agency) model. It also describes how two hosts running TCP/IP communicate on a network. This model consists of four layers, each of which can be mapped to one or more of the seven layers of the OSI model. The TCP/IP/DOD/DARPA model more effectively and accurately describes the functions of the TCP/IP protocol.

As already mentioned, TCP/IP is made up a suite of protocols. These protocols are organized into four layers. The four layers of the DoD model include the following:

  • Application This layer defines how applications gain access to the network. Protocols operating at this layer include HTTP, FTP, SMTP, DNS, POP3, and SNMP.

  • Transport This layer defines communication sessions between two TCP/IP hosts. The two protocols working at this level are TCP and UDP.

  • Internet This layer is responsible for addressing and routing. Protocols at this level include IP, ARP, ICMP, and IGMP.

  • Network This layer is responsible for sending and receiving information over the physical network.


Connection-Based and Connectionless Protocols

Some protocols are connection-based while others are connectionless. The orientation of a protocol will define the relationship between two hosts when transmitting data.

A protocol that is connection-based will require a formal relationship to be established between the transmission end-points before data is transferred. A connectionless protocol, on the other hand, requires no formal relationship to be established.

The Transmission Control Protocol (TCP) is a connection-based protocol, meaning before data can be sent between two hosts, a session must first be established. TCP offers reliable delivery of data through sequencing, error checking, and flow control.

TCP establishes a session through a process known as a three-way handshake. After a session is established, information can be reliably sent. Each datagram that is sent is assigned a sequence number. The sequence numbers ensure that the destination computer can reassemble the data in the proper order as it is received. The destination computer will send acknowledgments for segments that are received. If the source computer does not receive an acknowledgement within a certain amount of time, the segment will be retransmitted, thus ensuring delivery of information.

Note

FTP and Telnet are examples of programs that use TCP to transfer data between two TCP/IP hosts.


Unlike TCP, UDP is a connectionless protocol. This means that UDP does not establish a session before sending data nor does it provide for reliable delivery. When information is sent, acknowledgements are not returned so it is just assumed that it has been received. UDP is more often used in one-to-many situations where information is sent using a broadcast or for multicasting (TCP is used for one-to-one communication). If reliable delivery and sequencing of datagrams is required, it is the responsibility of the application or a higher level protocol to provide these services. For example, UDP is often used by videoconferencing and streaming media applications because they require fast delivery of data. The Session Information Protocol (SIP) used for streaming media relies on UDP but also uses its own retransmission mechanisms because UDP does not offer reliable delivery of data.



Exam Cram(c) 70-291 Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure
Exam Cram(c) 70-291 Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure
ISBN: 131516345
EAN: N/A
Year: 2006
Pages: 126

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net