The OSI Model: A Framework for Data Transmission#

The electronic transfer of information (audio, video, or data) over vast distances between electronic equipment is known as telecommunication. Data can be transmitted using either wired (coaxial, ethernet, or fiber optic connections) or wireless techniques. Telecommunication and networking employ a variety of processes, devices, software, and protocols. Over time, different models have evolved to better describe data flow between devices utilizing various protocols. A protocol is a set of instructions or rules that govern data transmission between electronic devices. Most operating systems and protocols adhere to the OSI model as an abstract framework. The purpose of this article is to explore this model and how it may be used to visualize the process of data transmission over a network.

What is the OSI Model?#

In the early 1980s, ISO (International Standards Organization) established the OSI (Open Systems Interconnection) model. The ISO-7498 standard was created as a conceptual framework for standardizing information transmission between various systems.

The networking duties, protocols, and services are divided into seven different layers in this model. Each layer is responsible for the information flow between two interacting nodes in its own way. Vendors can utilize this model as a starting point for developing their own networking architecture and reducing interoperability issues between different devices.

The TCP/IP model is used in the majority of modern internet implementations. However, understanding the functionalities that occur at each tier of the OSI model, as well as the accompanying protocols, can help you truly comprehend the overall network communication process.

How the OSI model can help achieve your security goals?#

As described above, the OSI model is used to break down network communication into seven layers. This model can assist security professionals in understanding the types of attacks that can occur at each layer, as well as the appropriate security measures that can be used to assure network security.

Layers of the OSI model:#

Let’s take a closer look at each of the OSI model’s seven layers now that we’ve covered the basics. We will review these layers using the top-down approach.

OSI Model

Application Layer:#

The application layer is the 7th layer of the OSI model and is closest to the end-user. The application layer is the interface between the application and the network. This layer is used by the end-user application/software for functions including message exchange, file transmission, and much more.

This layer’s job is to collect data from the application that needs to be delivered to the destination and send it along to the supporting protocol. An example will help you grasp this concept.

Let’s suppose you are using your Outlook email account to send an important business email to a client. As a result, Outlook is the program that you use to deliver the data, which is the information contained in the email. The application layer’s task now is to take this email and transfer it to a suitable protocol, such as SMTP (Simple Mail Transfer Protocol). Thus SMTP is the supporting protocol that will be used for the transmission of the data.

The application layer takes the data from the corresponding application, adds the necessary information for its communication, and passes it onto the layer directly underneath it. This process is repeated for each layer until it reaches the destination computer. Some of the protocols that are supported at this layer are:

1. HTTP(Hypertext Transfer Protocol): HTTP is an application layer protocol used for transporting data (text, audio, video, etc.) across the internet.

2. FTP(File Transfer Protocol): FTP is an application layer protocol used for file transfer between two nodes over a computer network.

3. SMTP(Simple Mail Transfer Protocol): SMTP is an standard protocol for email transmission.

4. DNS(Domain Name System): DNS protocol is used to resolve the Domain Name of a system to its IP address.

Presentation Layer:#

This is the 6th layer of the OSI model. This layer receives the data from the application layer. The presentation layer is not concerned with the data itself but with the syntax and format of the data. The purpose of this layer is to attach necessary format information with the data so that it can be easily viewed at the destination computer. This can be understood with the example of image files.

Every day, we send and receive several images via the internet. PNG (Portable Network Graphics), JPEG (Joint Photographic Experts Group), TIFF (Tagged Picture File Format), or GIF (Graphics Interchange Format) are all examples of image formats. Each image file type has its own format. The presentation layer adds special format information to an image file transferred from the source computer to the destination computer, telling the destination computer how to process and present the image. The presentation layer ensures that file format information is transformed into a standard format that can be easily interpreted regardless of the program used at the destination.

Data compression and encryption are also handled by the presentation layer. If the sender’s application requires that the data be encrypted or compressed before being sent over the network, the presentation layer delivers the necessary information, such as encryption algorithms and compression techniques. The application on the destination computer will use this information to determine which program/techniques should be used for decryption or decompression. The following protocols are used at this layer:

1. MIME(Multipurpose Internet Mail Extension): MIME is an extension of the SMTP protocol and is used to exchange different types of files (audio, video, text, or image) over email.

2. AFP(Apple Filling Protocol): AFP is a proprietary network protocol developed by Apple and is used to transfer files over a network.

3. LPP(Light-Weight Presentation Protocol): LPP protocol is used to provide ISO presentation services for the data transported over the network.

4. NDR(Network Data Representation): NDR is an implementation of the presentation layer. NDR is used with Distributed Computing Environment and Remote procedure calls on the internet.

Session Layer:#

The Session Layer is the 5th layer of the OSI model. The connection between the two programs is established, maintained, and terminated using this layer. This layer gets data from the presentation layer and is in charge of transferring it to end-user applications.

The processes occurring at the session layer are collectively called dialog management. Dialog management begins with connection establishment. In connection establishment, the requirements of communication transfer are imposed. After this phase, data transfer is initiated. Finally, after all the data is transferred the connection is released. The data transfer in the session layer can take place in one of the three modes:

1. Simplex mode: In simplex mode the information transfer is unidirectional.

2. Half Duplex mode: The information flow is bidirectional in half duplex mode, but only one entity can transfer data at a time.

3. Full Duplex mode: The information flow is bidirectional in full duplex mode, with both entities able to send and receive data at the same time.

The information transfer occurring at the session layer takes place through RPC(Remote Procedure Calls). RPC occurs when an application on one computer end calls another application located on another computer without having to know the details of the application on the receiving system. In the entire communication process, the session layer protocols operate as a bridge between two separate applications.

Session layer protocols must provide authentication capabilities to ensure the security of the communication session. Network security administrators should configure the firewalls to only allow the connections that are from within the network. Some of the protocols that are used at this layer are:

1. PAP(Password Authentication Protocol): PAP is used to authenticate users using passwords in a point-to-point connection.

2. PPTP(Point-to-point Tunneling Protocol): PPTP is a secure communication protocol that is used to establish a VPN connection between two end points.

3. NetBIOS(Network Basic Input Output System): NetBIOS protocol enables applications on different computers to communicate with each other and access shared resources over LAN(Local Area Network)

4. RPC(Remote Procedure Call): RPC protocol allows an application on one computer to call a procedure on another application without having to know the application details on the receiving end.

Transport Layer:#

The transport layer is the 4th layer of the OSI model. This layer is responsible for end-to-end communication between two computers. The main difference between session layer and transport layer communication is that session layer communication occurs between two applications, whereas transport layer communication occurs between two computers, independent of the applications running on both computers

The transport layer receives data from multiple applications and assembles it into a stream of packets before sending it across the network. On the receiving end, these packets are reassembled in the correct sequence using a numbering mechanism. Data transfer reliability, error detection and repair, data recovery, and flow control management are also handled by this layer. There are two main protocols used at the transport layer:

1. TCP(Transmission Control Protocol): TCP is a connection-oriented transport layer protocol that ensures packets arrive at their intended destination. During transmission, the TCP protocol can detect lost or damaged packets. Thus it signals the source to resend packets that are missing or damaged. This protocol also has the capacity to detect packet congestion and adjust the packet flow accordingly.

Before establishing a connection between two computers, TCP performs a three-way handshake. The amount of data that will be shared between the two nodes, data integrity verification, and data loss discovery techniques are all negotiated via a TCP three-way handshake.

2. UDP(User Datagram Protocol): The UDP protocol is a connectionless transport layer protocol, which means it does not ensure packet delivery to the intended destination. It also lacks advanced features like packet sequencing and flow management. In comparison to TCP, UDP is a faster transport layer protocol.

Network Layer:#

The 3rd OSI layer is the network layer. This layer receives packets from the transport layer and is in charge of routing them to their intended destinations. The delivery of network datagrams to the destination is not guaranteed by the network layer. This is the responsibility of the transport layer.

To generate a map of the network, the protocols at the network layer create, use, and update routing tables. The best path for delivering datagrams to their destination is then determined using these tables. The most often used protocol at this layer is IP (Internet protocol). The Internet Protocol is in charge of sending and receiving datagrams across the internet. Some other protocols at this layer are:

1. RIP(Routing Information Protocol): The RIP protocol is an outdated protocol that employs the distance-vector routing approach. The shortest distance between the sender and receiving computer is calculated using hop count.

2. OSPF(Open Shortest Path First): The OSPF protocol calculates the shortest path from the sender to the recipient computer using the link-state algorithm. This protocol enables the routing database to be updated frequently in order to determine end-to-end pathways.

3. BGP(Border Gateway Protocol): The BGP is an exterior gateway protocol that enables the global routing of information between edge routers.

4. ICMP(Internet Control Message Protocol): The ICMP protocol is used to exchange network-related errors and operational messages between different devices.

Physical Layer:#

The Physical Layer is the 1st layer of the OSI model. This layer deals with the physical medium connecting the computing devices. The frames from the data link layer are converted into data bits by network interface cards or drivers at the physical layer. After that, the data bits are transformed into electrical voltage signals that may be conveyed through physical media.

Physical features of transmission, including synchronization, data speeds, line noise, and transmission mechanisms, are controlled by protocols at this layer. The transmission medium can be guided, such as coaxial cables, twisted pair cables, fiber optic cables, and so on, or it can be an unguided wireless medium, such as air. Some of the protocols used at this layer are:

1. DSL(Digital Subscriber Line) DSL is a communication technology that is used for data transmission over telephone lines. 2. ISDN(Integrated Services Digital Network) ISDN is a set of communication protocols for sending voice, data, and other types of traffic over the public switched telephone network circuits in a digital format. 3. SONET(Synchronous Optical Networking) SONET is a telecommunication standard for data transmission over fiber-optic cables

See also

Do you want to get practical skills to work in cybersecurity or advance your career? Enrol in MCSI Bootcamps