The Seven Layers of OSI the OSI Model Was Created to Impose A
Total Page:16
File Type:pdf, Size:1020Kb
The Seven Layers of OSI 1 The OSI model was created to impose a standardised from of networking, because up till the point it was introduced every computer company would have different network protocol. This meant that you couldn't buy computers from more than one company and expect them to work, because the computers wouldn't understand how each other coded and decoded the binary code that travels through the given network media. Layer 1 - Physical Layer: The physical layer encompasses all physical components and media used during data transfer in a network. This includes, but is not limited to, cables, switches, network cards and routers. Data transferred on the level of the Physical layer is in binary. Layer 2 - Data Link Layer This layer codes and decodes the bits being transferred by the physical layer. The data link layer frames the packets of data that are sent and checks for errors in the data. Layer 3 - Network Layer This layer determines the fastest route for data to travel to its destination and routes it as such. The network layer also handles a certain amount of error checking. Layer 4 - Transport Layer This layer determines the end to end transfer and it checks the data transfer was completed error free. End to end refers to the computers at each end of the cable/WI-FI. Layer 5 - Session Layer This layer establishes, manages and terminates connections between applications. The session layer also reports upper layer errors. Layer 6 - Presentation Layer This layer formats, encrypts and decrypts data to being sent and received by computers in a network. The presentation layer also serves the purpose of translating data into a format that the application layer can understand. This layer is also sometimes called the 'Syntax' layer. Layer 7 - Application Layer The application layer, as the name suggests, is the user interface side of this network model. This layer directly communicates with the applications on the computer that require network access. Network Address Translation 2 NAT or Network Address Translation is what enables a LAN to have two separate IP addresses. How this works is that devices within the LAN have the IP address assigned by the DHCP, however the entire network has just one IP address visible to people on other networks. Data sent from other networks is sent to what is called a NAT box, where it is then translated so that the NAT box can send it to its final destination. NAT allows more IP addresses on the network. For example, you a device on your network can have the same IP as one on your neighbours, however only the external iP is able to be seen by that network, as all internal IPs are hidden. This means no conflicts will occur if you have the same internal iP as someone else on a different network because the other network will see only the external IP, and not the internal. File Server 3 A file server is a server that allows you to access files in a network. It is one place where files are stored that can be accessed by any device in a network. A file server can be found in school shared documents is a file server as all files are in that one location, which can be accessed by any user on any computer in the school network. Proxy Server A proxy server is a server that involves what information that users on the network can access on the internet. It improves the speeds of loading previously viewed websites by saving recent websites and files so that they don't need to be downloaded again. This is why when you load a video on YouTube for example, it loads faster the second time you watch it compared to the first. By using a proxy server, you can also limit what information users can access. For example, at school some websites may be blocked as they may have objectionable material in them Star Connection 4 A star connection is where each device is connected to a switch or hub using a separate cable. This is useful as it means that you can disconnect one device, and the network will still function. Collisions tend to be less frequent in a star connection. Star connections are more commonly used because they are convenient with connecting and disconnecting devices to the network. Wi-Fi 5 Wi-Fi, or Wireless Fidelity, is what is used for wireless networking. Devices are connected to a wireless router which, along with the devices, is also connected to the network. It is commonly used to give internet access to any device connected to the wireless network. Wireless networking is good because you do not have to be limited by the cabling for where you can work. For example, I can still keep my internet connection on my laptop whether I'm in my room or in the lounge. It also allows the network to become quite large as you do not need to connect a lot of cables to the server to have multiple devices connected to the network. Access Control 6 Access control is when devices want to communicate with each other, however they are unsure on whether another device is currently sending data over the network. The access in controlled by a MAC protocol, specifically the CSMA/CD (Carrier Sense Multiple Access with Collision Detection) protocol. This follows half duplex data transmission, so it can only send or receive data at one time. If a device has data to send, it checks to see if any other device is currently sending data. When it is clear that the cable is free, it sends the data. This can still cause a collision if multiple devices send data across the apparently free line at the same time. When this occurs, the devices wait a random amount of time before resending the data. Usually this time is different for each device, so collisions with the same data seldom occur again. .