Webspace Sponsored by:

Version 0.0.0 @ 03:55/08.07.2000

ISO OSI 7 Layer Model forced with TCP/IP

The ISO (International Standards Organization) is a collection of people that are technicians, politicians, lawyers, and members of corporations representing the political / economical / strategic / technical needs of their represented unit. They get together and hammer out standards (not to be confused with protocols) for consistent, international work.

One of their web pages (http://www.iso.ch/iso/en/aboutiso/introduction/index.html)) describes them as:

The theory and idea behind having standards accepted, ratified, and agreed upon by nations around the world, is to ensure that the system from Country A will be easily integrated with the system from Country B with little effort. It also helps to make specification for industries to create goods and services that conform to the standard and by providing competition to the same product, decrease prices for products that must match the minimum standards. Comparisons are made easier in this way for products made by competing groups that must meet or exceed the minimum accepted specified standards.

A protocol is more like a language that can be shared by many people. A protocol may become a standard, if all of the players in the game that would like to use that protocol all politically agree that it shall be the protocol of choice for use in, and between nations. When the protocol is ratified by the governing bodies as the shared and agreed upon system, it becomes an official standard.

A protocol may also become a de-facto standard or an informal standard if all players in a game use it without all members officially ratifying the protocol.

Often, a standard attempts to divest itself of being labeled as a protocol and tries to use language to describe how a protocol may be created to conform to the standard, as in the case of the ISO OSI 7 Layer model.

When two or more parties share a protocol, they have rules that conduct their communications to allow them to share and exchange ideas. For a rough example, we can examine English (the language) and see that two people speaking English with each other must share certain rules. They must have an agreed syntax, speed of speech, and accepted definitions for conveyed words to understand meanings of words stated within their context. Often languages also include systems to recover in the case of errors, and many languages like English also are capable of including rules for correcting for errors. A person may say, "what?" or "could you repeat that?" or even, "do you mean this when you say that?" for some examples.

In this way, you can see that a protocol is merely an agreed upon "language" with agreed upon syntaxes, and definitions used by two or more parties to communicate data or information. When a system or protocol is shared by everyone (or enough of the people that have power, and wield it effective enough to squash or squelch any opposition) then it may also become a standard.

The ISO looked to create a simple model for networking. They took the approach of defining layers that rest in a stack formation, one layer upon the other. Each layer would have a specific function, and deal with a specific task. Much time was spent in creating their model called "The ISO OSI Seven Layer Model for Networking". In this model, they have 7 layers, and each layer has a special and specific function.

ISO OSI Seven Layer Model
7.) Application-
6.) Presentation
5.) --Session---
4.) -Transport--
3.) --Network---
2.) -Data Link--
1.) --Physical--

Described:

Quick review of similarities between layers:
Layers of the 7.L.M.
7
6
5
4
3
2
1
Described Item
*1
+
+
+
+
+
+
Service For Higher Layer
+
+
+
+
+
+
-
Data and Signals for Lower Layer
-
-
-
+
+
+
-
Prevent Fast Sender from Overrunning a slow receiver
*1
+
+
+
+
+
+
Take data handed from the higher layers, and package it as the payload of this layer for data running down from the Application layer towards the Physical Layer
*1
+
+
+
+
+
-
Take data handed from the lower layers, and strip off this layers header information and perform any necessary analysis of the payload integrity if necessary and then hand the payload up to the next higher layer assuming data flows from the Physical Layer up towards the Application Layer.
+/-
-
-
+/-
-
+
-
Offer error detection for transmitted data (Not to be confused with error correction.)
+/-
-
-
+/-
-
+
-
Offers Error Correction (not just error detection)
+
+
+
+
-
-
-
End to End layer: Conversation take place between peer level services on remote stacks
-
-
-
-
+
+
+
Chained: which means they may need to communicate through other stacks' peer layers in a chained sequence before their conversation may eventually be passed to the remote stack's peer layer protocol. *2
-
-
+
-
-
+
+
Protocol may deal with arbitrating signaling when using a Half Duplex system to signal turns for "speaking"
+
-
-
-
-
-
-
Deals with application issues like screen formatting and displaying content visible tot he user.
-
+
-
-
-
-
-
Deals with issues of translation that may take place at the character level, or even be at a higher level of abstraction like floating point numbers, long ints, strings, and possibly arrays. Common forms of translation include compression, encryption and character set conversions like Unicode/ASCII/EBCIDIC conversion as well.
-
-
+
-
-
-
-
This layer provides synchronization of transferred data so as to make effects of transmission interruptions less significant by allowing only unsuccessfully transmitted data to be transmitted. Also deal with Session creation, data transmission over session, and session tear down.
-
-
-
+
-
-
-
Responsible for multiplexing, de-multiplexing, inverse multiplexing of connections. If types of service are to be made available for layers above, then here is where they are specified. Two common types of connections include, unreliable connection-oriented, and reliable connection oriented. Also, this layer may be required to never re-order payload data for higher layers: Say remote Point A first transmits a 1, then a 2 and finally a 3, it may be possible for these transmitted values to arrive out of order. If the protocol dictates the data should only be passed in order of transmission but not receipt, then numbers should only be passed in increasing value over these three values. If the connection is reliable all numbers will be sent eventually. If unreliable is used, then a value may be lost, but never re-sequenced. Lastly, this layer should insulate all higher layers from changes made to hardware and hardware drivers.
-
-
-
-
+
-
-
Deals with routing of packets from source to destination, packet size negotiation or fragmentation/de-fragmentation, accounting, flow-control to prevent unfilled large pipe senders from over-running filled, or small pipe receivers.
-
-
-
-
-
+
-
Creates a channel free from detected errors, deals with duplicate packets/frames/etc and contention for a shared media with other nodes in the case of a broadcast network.
-
-
-
-
-
-
+
Sets information on signaling: how both systems should agree on what a "bit" looks like to them; voltage, duration, frequency, amplitude, amperage, and line resistance etc. Uses the above to send and receive raw bits from source to destination over a shared media (wore, or wireless or?). Also specifies how media may be used: Full Duplex, Half Duplex, or Simplex.
7
6
5
4
3
2
1
Described Item
Layers of the 7.L.M.
Key
+
This layer is specified to have this
-
This layer is not specified to have this.
+/-
Even though this layer does not explicitly allow for this to take place, it often does even if the standard does not require it.
*1
Since there are no layers above the application layer within the 7-layer model standard, there technically are no layers above it. However, the user's actions and users themselves could be viewed as and unofficial layer. In this way, we do not officially state these items as a "+" but instead offer this explanation.
*2
See the End-to-end vs. Chained table diagram to better understand this.

ISO OSI 7 Layer Reference Model: End-to-end vs. Chained Communications
7 Application- < -------End--------to--------End------- > Application-
6 Presentation < -------End--------to--------End------- > Presentation
5 --Session--- < -------End--------to--------End------- > --Session---
4 -Transport-- < -------End--------to--------End------- > -Transport--
3 --Network--- < - > --Network-- < -- > --Network-- < - > --Network---
2 -Data Link-- < - > DL < - > DL < -- > DL < - > DL < - > -Data Link--
1 --Physical-- < = > PH < - > PH < == > PH < - > PH < = > --Physical--
L Stack Num 1  Link  Stack Num 2  Link  Stack Num 3 Link  Stack Num 4
Key:
< == > This is a physical wire or media connecting devices
< -- > This is a virtual path for peer level, layered protocol communications. Follow the GREEN colored layers, up and down any touching green stacks, and across physical links.
---- Where two or more "-" characters exist in a string, alone in a cell special meaning is implied. This is meant to show that data does not physically pass within the stack shown across this path, even though the data "virtually" passes through this point when viewing the peer layer stacks from an "End-to-end" vs. "chained" perspective.
DL Another way for referring to the Data Link layer.
PH Another way for referring to the PHysical Layer
GREEN or follow the ajacent cells with "links" This identifies the path that data actually flows, in a trip down the layers, across the physical layers, up to the RED colored layer where it is analyzed and sent on down to another physical layer, and over through the same layers, and is passed on down again, and across a third physical link to the destination, and up its layers.
R E D Shows the numbered layers where a chained communications for peer level protocols on original source to final destination take place. (By chained communication, you see that peer layer protocols must communicate through partial stacks for network devices before getting to final destination.)

Before going on, it should be noted that data actually flows in two logical locations. The first locations include interfaces between different layers. The second locations include the physical links between peer Physical Layer nodes that are connected over a wire or other media.

A user makes a request that needs to go out the network. Their request enters into the Application Layer from just above the Application Layer. The application layer encodes it in such a way that its peer layer protocol on the far right hand stack can understand it. Then the Application Layer on the left-hand stack passes it down to the Presentation Layer. The Presentation Layer then follows suit with the data handed to it from the layer above, and packages it in such a way that the peer layer protocol on the far right stack will understand it and also know what to do with it. This process of re-encapsulation of higher level data continues all of the way down the left-hand stack until it gets to the physical layer.

At the Physical Layer the data is passed on a media like a wire, or over a wireless medium to another device. If this device was a router, then that router accepts the data at the physical layer, brings it up the Data Link Layer verifying the bits being received are the transmitted bits from the far left machine by examining the checksums. Then the Data Link Layer passes its payload up to the Network Layer. The Network Layer examines the header information of the packet it received from the Data Link Layer and determines what to do with it based on the destination address and other header information. In this case, it decides to pass it onto another router to its right. Before it sends it on, the packet must now travel back down this router's stack to the physical layer so the next router can also use the same procedure. After the packet makes its way down the first router's stack, and across the physical layer wire to the next router, up its stack, and back down again to the far right stack, then it is ready to be processed by the destination host. The destination host takes the incoming bits, and packets them into a packet or frame or cell to examine the packet. If the packet is ok, then the payload is passed up to the Network Layer. The Network layer examines the header added by the original far left stack, and determines that the packet is fine to be passed on up. After this process repeats with each layer stripping off the header information letting that respective layer know how to deal with its payload. Eventually, the original request made by the user at the top of the Application Layer of the left hand stack makes its way to the top Application Layer of the remote machine. At this layer, either a remote user, or remote program acts upon the incoming data and may respond. If a response is sent the procedure happens once again, but this time starts from the right hand side, and the response makes its way back to the left hand stack's Application Layer and in the end, its user.

Here you can see boxes colored in RED that show at what layer a router operates.

ISO OSI Seven Layer Model: Routed/Filtered Transmissions
7
Application-
< -------End--------to--------End------- >
Application-
6
Presentation
< -------End--------to--------End------- >
Presentation
5
--Session---
< -------End--------to--------End------- >
--Session---
4
-Transport--
< -------End--------to--------End------- >
-Transport--
3
--Network---
< ## >
--Network---
< ## >
--Network---
< ## >
--Network---
2
-Data Link--
< -- >
-DLL-
--
-DLL-
< -- >
-DLL-
--
-DLL-
< -- >
-Data Link--
1
--Physical--
< == >
-PHY-
--
-PHY-
< == >
-PHY-
--
-PHY-
< == >
--Physical--
L
Stack Num 1
Link
Stack Num 2
Link
Stack Num 3
Link
Stack Num 4
Key:
< == >
This is a physical wire or media connecting devices.
----
Where two or more "-" characters exist in a string, alone in a cell special meaning is implied. This is meant to show that data does not physically pass within the stack shown across this path, even though the data "virtually" passes through this point when viewing the peer layer stacks from an "End-to-end" vs. "chained" perspective.
-DLL-
Another way for referring to the Data Link Layer .
-PHY-
Another way for referring to the PHYsical Layer
< -- >
This is a virtual path for peer level, layered protocol communications. Follow the GREEN colored layers, up and down any touching green stacks, and across physical links.
< ## >
This is the layer were the peer level devices are communicating for the operation being discussed.
GREEN
This identifies the path that data actually flows, in a trip down the layers, across the physical layers, up to the RED colored layer where it is analyzed and sent on down to another physical layer, and over through the same layers, and is passed on down again, and across a third physical link to the destination, and up its layers.
R E D
This identifies the layer at which the operation discussed is taking place.

Here you can see that with a Layer 2 Switch, a packet does not even get passed to the Network Layer on these intermediate partial stacks, since the switch does not have this layer. The switch only examines the Data Link Layer information to try and figure out what to do with the packet.

ISO OSI Seven Layer Model: Data Link Layer Switching
7
Application-
< -------End--------to--------End------- >
Application-
6
Presentation
< -------End--------to--------End------- >
Presentation
5
--Session---
< -------End--------to--------End------- >
--Session---
4
-Transport--
< -------End--------to--------End------- >
-Transport--
3
--Network---
< -------End--------to--------End------- >
--Network---
2
-Data Link--
< ## >
-Data Link--
< ## >
-Data Link--
< ## >
-Data Link--
1
--Physical--
< == >
-PHY-
--
-PHY-
< == >
-PHY-
--
-PHY-
< == >
--Physical--
L
Stack Num 1
Link
Stack Num 2
Link
Stack Num 3
Link
Stack Num 4
Key:
< == >
This is a physical wire or media connecting devices.
< -- >
This is a virtual path for peer level, layered protocol communications. Follow the GREEN colored layers, up and down any touching green stacks, and across physical links.
< ## >
This is the layer were the peer level devices are communicating for the operation being discussed.
----
Where two or more "-" characters exist in a string, alone in a cell special meaning is implied. This is meant to show that data does not physically pass within the stack shown across this path, even though the data "virtually" passes through this point when viewing the peer layer stacks from an "End-to-end" vs. "chained" perspective.
-DLL-
Another way for referring to the Data Link Layer .
-PHY-
Another way for referring to the PHYsical Layer
GREEN
This identifies the path that data actually flows, in a trip down the layers, across the physical layers, up to the RED colored layer where it is analyzed and sent on down to another physical layer, and over through the same layers, and is passed on down again, and across a third physical link to the destination, and up its layers.
R E D
This identifies the layer at which the operation discussed is taking place.

A simple repeater does not even examine the Data Link Layer information. All that a repeater does is read in bits, and the re-transmit the bits in the same sequence it receives them. If bad bits come in, bad bits get relayed on.

ISO OSI Seven Layer Model: Simple Repeated Bits
7
Application-
< -------End--------to--------End------- >
Application-
6
Presentation
< -------End--------to--------End------- >
Presentation
5
--Session---
< -------End--------to--------End------- >
--Session---
4
-Transport--
< -------End--------to--------End------- >
-Transport--
3
--Network---
< -------End--------to--------End------- >
--Network---
2
-Data Link--
< -------End--------to--------End------- >
-Data Link--
1
--Physical--
< ## >
--Physical--
< ## >
--Physical--
< ## >
--Physical--
L
Stack Num 1
Link
Stack Num 2
Link
Stack Num 3
Link
Stack Num 4
Key:
< == >
This is a physical wire or media connecting devices.
< -- >
This is a virtual path for peer level, layered protocol communications. Follow the GREEN colored layers, up and down any touching green stacks, and across physical links.
< ## >
This is the layer were the peer level devices are communicating for the operation being discussed.
GREEN
This identifies the path that data actually flows, in a trip down the layers, across the physical layers, up to the RED colored layer where it is analyzed and sent on down to another physical layer, and over through the same layers, and is passed on down again, and across a third physical link to the destination, and up its layers.
R E D
This identifies the layer at which the operation discussed is taking place.

It is possible for a mixture of different network devices to exist. Here we can see an example where a Data Link Layer Switch is connected to a router which operates at layer 3.

In this example, you may see that Layer 3 on the left hand side speaks virtually to Layer 3 on the intermediate partial stack. The sender speaks through this intermediate partial stack that relays on the packets to the final destination in this eaxmple. You notice that the second partial stack only goes up to Layer 2. This allows Layer 2 on the sender to speak virtually to Layer 2 on the second partial stack. Layer 2 on the second stack speaks via chained communications through the third partial stack's 2nd Layer. After being routed by the Layer 3 of the third partial stack, data comes back down to go out the same interface on a media shared by the final destination.

ISO OSI Seven Layer Model: Mixed (Router + Data Link Switch)
7
Application-
< -------End--------to--------End------- >
Application-
6
Presentation
< -------End--------to--------End------- >
Presentation
5
--Session---
< -------End--------to--------End------- >
--Session---
4
-Transport--
< -------End--------to--------End------- >
-Transport--
3
--Network---
< #####Chained##### >
--Network---
< ## >
--Network---
2
-Data Link--
< ## >
-Data Link--
< ## >
-DLL-
--
-DLL-
< -- >
-Data Link--
1
--Physical--
< == >
-PHY-
--
-PHY-
< == >
-PHY-
--
-PHY-
< == >
--Physical--
L
Stack Num 1
Link
Stack Num 2
Link
Stack Num 3
Link
Stack Num 4
Key:
< == >
This is a physical wire or media connecting devices.
< -- >
This is a virtual path for peer level, layered protocol communications. Follow the GREEN colored layers, up and down any touching green stacks, and across physical links.
< ## >
This is the layer were the peer level devices are communicating for the operation being discussed.
----
Where two or more "-" characters exist in a string, alone in a cell special meaning is implied. This is meant to show that data does not physically pass within the stack shown across this path, even though the data "virtually" passes through this point when viewing the peer layer stacks from an "End-to-end" vs. "chained" perspective.
-DLL-
Another way for referring to the Data Link Layer.
-PHY-
Another way for referring to the PHYsical Layer
GREEN
This identifies the path that data actually flows, in a trip down the layers, across the physical layers, up to the RED colored layer where it is analyzed and sent on down to another physical layer, and over through the same layers, and is passed on down again, and across a third physical link to the destination, and up its layers.
R E D
This identifies the layer at which the operation discussed is taking place.

To be continued... (Still expanding upon the ISO OSI 7 Layer Model. This section may be broken up into multiple sections since this monolithic review is a bit too large for a single page for most people.)

Comments and/or suggestions for this?: Email me at: dugan@passwall.com
Attempts have been made to make the tables appear as they should for LYNX users by forcing a common field width for fields being used by padding them with other printable characters. This is meant to allow for LYNX users to see the tables much like the Netscape and other web browser worlds might show them. However, from personal experience, some versions of LYNX still manage to munge the tables, making them use up several pages. It seems to be a problem with how earlier versions of LYNX dealt with tables, but the problem has not been entirely isolated.
Some have asked why this collection of on-line documents is so lacking of graphic content. To them I answer: faster downloads. Many of these pages are smaller than some pictures on many commercial web sites. You do not come here to look at my pictures. You come here to read content. Also, LYNX users benefit from this, and by using ALL text, people with ADA issues are able to use speech recognition software on the text to hear the words.
Copyright (C) 1999, 2000, 2001, 2002 by Michael Egan: All rights reserved.
A Special License: No part of this document may be used for profit without the consent of the author Michael Egan in writing. Content may be duplicated for retransmission for non-profit purposes as long as the copyright and license remain included in their entirety. The content is provided "as-is" and I take no responsibility on the content's truthfulness or consistency. Errors may exist in these documents, but acting upon these errors is left up to the reader to verify by a third party that will take responsibility for fact verification. When notified of errors or inconsistencies, attempts will be made to rectify the errors.
In plan English this is meant to do many things: This copyright is meant to exist so that others may not profit from this work as published in paper form, or by duplicating the content to place advertisements over it and generate income. It is also meant to exist to prevent people from publishing this work as their own and receiving profit from this process on research they did not perform. It is not meant to stop a professor from running off copies to use in their classes for their students. It is also not meant to stop the student from printing up copies for their own education. How depressing it would be to find your work published in book form without your permission, or compensation. Another reason for this Copyright is to limit the effect of the mistakes I have made within this document before I was able to complete it. It would be even sadder to notice my mistakes in print and criticized before I could resolve them. Eventually, after I finish this work, I may retain copyright, but eliminate the license.