Wednesday 8 November 2017

Network Reference Models

A computer network connects two or more devices together to share information and services. Multiple networks connected together form an internetwork.


Internetworking present challenges - interoperating between products from different manufacturers requires consistent standards.

Network reference models were developed to address these challenges. A network reference model serves as a blueprint, detailing how communication between network devices should occur.

The two most recognized network reference models are:

1.     The Open Systems Interconnection (OSI)

2.     The Department of Defense (DoD) 

Without the framework that network models provide, all network hardware and software would have been proprietary. Organizations would have been locked into a single vendor’s equipment, and global networks like the Internet would have been impractical, if not impossible.

Network models are organized into layers, with each layer representing a specific networking function. These functions are controlled by protocols, which are rules that govern end-to-end communication between devices.

Protocols on one layer will interact with protocols on the layer above and below it, forming a protocol suite or stack. The TCP/IP suite is the most prevalent protocol suite, and is the foundation of the Internet.

A network model is not a physical entity – there is no OSI deviceManufacturers do not always strictly adhere to a reference model’s blueprint, and thus not every protocol fits perfectly within a single layer. Some protocols can function across multiple layers.

OSI Reference Model :- 

The Open Systems Interconnection (OSI) model was developed by the

International Organization for Standardization (ISO), and formalized in

1984. It provided the first framework governing how information should be sent across a network.

The OSI model consists of seven layers, each corresponding to a specific network function:


7
Application layer
6
Presentation layer
5
Session layer
4
Transport layer
3
Network layer
2
Data link layer
1
Physical layer


Note that the bottom layer is Layer 1. Various mnemonics make it easier to remember the order of the OSI model’s layers:

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data-link

1 Physical 

ISO further developed an entire protocol suite based on the OSI model; however, the OSI protocol suite was never widely implemented.

The OSI model itself is now somewhat deprecated – modern protocol suites, such as the TCP/IP suite, are difficult to fit cleanly within the OSI model’s seven layers. This is especially true of the upper three layers.

The bottom (or lower) four layers are more clearly defined, and terminology from those layers is still prevalently used. Many protocols and devices are described by which lower layer they operate at.

OSI Model - The Upper Layers 

The top three layers of the OSI model are often referred to as the upper layers:

Layer-7 - Application layer

Layer-6 - Presentation layer

Layer-5 - Session layer

Protocols that operate at these layers manage application-level functionsand are generally implemented in software.

The function of the upper layers of the OSI model can be difficult to visualize. Upper layer protocols do not always fit perfectly within a layer, and often function across multiple layers.

The Application Layer :-

The Application layer (Layer-7) provides the interface between the user application and the network. A web browser and an email client are  examples of user applications.

The user application itself does not reside at the Application layer - the protocol does. The user interacts with the application, which in turn interacts with the application protocol.

Examples of Application layer protocols include:

·        FTP, via an FTP client

·        HTTP, via a web browser

The Application layer provides a variety of functions:

·        Identifies communication partners

·        Determines resource availability

·        Synchronizes communication

The Application layer interacts with the Presentation layer below it. As it is the top-most layer, it does not interact with any layers above it.

The Presentation Layer

The Presentation layer (Layer-6) controls the formatting and syntax of user data for the application layer. This ensures that data from the sending  application can be understood by the receiving application.

Standards have been developed for the formatting of data types, such as text, images, audio, and video. Examples of Presentation layer formats include: 

Text - ASCII

Images - GIF

Audio - MIDI

Movies - MPEG

If two devices do not support the same format or syntax, the Presentation layer can provide conversion or translation services to facilitate communication. 

Additionally, the Presentation layer can perform encryption and compression of data, as required. However, these functions can also be performed at lower layers as well.


The Session Layer

The Session layer (Layer-5) is responsible for establishing, maintaining, and ultimately terminating sessions between devices. If a session is broken, this layer can attempt to recover the session.

Sessions communication falls under one of three categories:

1.     Full-Duplex – simultaneous two-way communication

2.     Half-Duplex – two-way communication, but not simultaneous

3.     Simplex – one-way communication

Many modern protocol suites, such as TCP/IP, do not implement Session  layer protocols. Connection management is often controlled by lower layers, such as the Transport layer. 

The lack of true Session layer protocols can present challenges for high availability and failover. Reliance on lower-layer protocols for session management offers less flexibility than a strict adherence to the OSI model. 


No comments:

Post a Comment