Welcome to my blog!
PDU: Data
Layer 7: works closest to the user and provides file transmissions, message exchanges, terminal sessions, and much more. This layer does not include the actual applications, but rather the protocols that support the applications.
Protocol Function: The protocols at the application layer handle file transfer, virtual terminals, network management, and fulfilling networking requests of applications.
PDU: Data
Layer 6: receives information from the application layer protocol and puts it in a format that any process operating at the same layer on a destination computer following the OSI model can understand. This layer provides a common means of representing data in a structure that can be properly processed by the end system. The presentation layer is concerned not with the meaning of data but with the syntax and format of that data.
Presentation Layer works as a Translator
It translates the format an application is using to a standard format that can be sent over the network. It adds information to tell the destination computer the file type and how to process and present it.
L6 PROTOCOLS (no protocols, just services)
The services of the presentation layer handle translation into standard formats, data compression and decompression, and data encryption and decryption. No protocols work at this layer, just services. The following lists some of the presentation layer standards:
PDU: Data
Layer 5: is responsible for establishing a connection between the two applications, maintaining it during the transfer of data, and controlling the release of this connection. When the conversation is over, this path is broken down and all parameters are set back to their original settings. This process is known as dialog management (dialog control).
L5 PROTOCOLS
The session layer protocols set up connections between applications; maintain dialog control; and negotiate, establish, maintain, and tear down the communication channel. Some of the protocols that work at this layer include:
L5 PROTOCOL SECURITY
Session layer protocols are the least used protocols in a network environment; Many of them should be disabled on systems to decrease the chance of them being exploited. RPC, NetBIOS, and similar distributed computing calls usually only need to take place within a network; thus, firewalls should be configured so this type of traffic is not allowed into or out of a network. Firewall filtering rules should be in place to stop this type of unnecessary and dangerous traffic.
L5 MODES
The session layer protocol can enable communication between two applications to happen in three different modes:
L5 VERSUS L4
The functionality of the session and transport layers is similar insofar as they both set up some type of session or virtual connection for communication to take place. The difference is that protocols that work at the session layer set up connections between applications, whereas protocols that work at the transport layer set up connections between computer systems.
PDU: Segment
Layer 4: When two computers are going to communicate through a connection-oriented protocol, they first agree on how much information each computer will send at a time, how to verify the integrity of the data once received, and how to determine whether a packet was lost along the way. The two computers agree on these parameters through a handshaking process at the transport layer.
L4 PROTOCOLS
The protocols at the transport layer handle end-to-end transmission and segmentation of a data stream. The following protocols work at this layer:
PDU: Packet
Layer 3: The main responsibilities of layer 3, are to insert information into the packet’s header so it can be properly addressed and routed, and then to actually route the packet to its proper destination. In a network, many routes can lead to one destination. The protocols at the network layer must determine the best path for the packet to take. Routing protocols build and maintain their routing tables.
L3 PROTOCOLS
The responsibilities of the network layer protocols include internetworking service,addressing, and routing. The following lists some of the protocols that work at this layer:
PDU: Frame
Layer 2: Different networking technologies can use different protocols, network interface cards (NICs), cables, and transmission methods. Each of these components has a different header data format structure, and they interpret electromagnetic signals in different ways. The data link layer is where the network stack knows in what format the data frame must be in order to transmit it properly over Ethernet, wireless, or frame relay links.
L2 PROTOCOLS
The protocols at the data link layer convert data into LAN or WAN frames for transmission and define how a computer accesses a network. This layer is divided into the Logical Link Control (LLC) and the Media Access Control (MAC) sublayers. Some protocols that work at this layer include the following:
The data link layer can be further divided into two functional sublayers:
Logical Link Control (LLC) Sublayer
The LLC sublayer takes care of flow control and error checking. Data coming from the network layer passes down through the LLC sublayer and goes to the MAC sublayer.
Generally, LLC is implemented in software (as a device driver)
Media Access Control (MAC) Sublayer
The technology at the MAC sublayer knows if the network is Ethernet, wireless, or frame relay, so it knows how to put the last header and trailer on the packet before it “hits the wire” for transmission.
MAC is built-in firmware on a physical device
Network Interface Card (NIC)
NICs bridge the data link and physical layers. Data is passed down through the first six layers and reaches the NIC at the data link layer. Depending on the network technology being used, the NIC encodes the bits at the data link layer, which are then turned into electricity states at the physical layer and placed onto the wire for transmission.
Layer 2 Security Standards, include defending against: Packet sniffing, modifying headers, and spoof traffic.
PDU: Bits
Layer 1: converts bits into electromagnetic signals for transmission.
L1 PROTOCOLS
Network interface cards and drivers convert bits into electrical signals and control the physical aspects of data transmission, including optical, electrical, and mechanical requirements. The following are some of the standard interfaces at this layer:
CONVERTING BITS INTO ELECTRONIC SIGNALS
Signals and voltage schemes have different meanings for different LAN and WAN technologies. If a user sends data through the radio transceiver on a smartphone, the data format, electrical signals, and control functionality are much different than if that user sends data through an Ethernet NIC and onto an unshielded twisted pair (UTP) wire for LAN communication. The mechanisms that control this data going onto the radio waves, or the UTP wire, work at the physical layer.