1. OSI Reference Model 1. Origin of OSI OSI (Open System Interconnect), also known as the Open System Interconnection, is generally called the OSI reference model, which is a network interconnection model studied by the ISO (International Organization for Standardization) in 1985. In order to make network applications more popular, ISO introduced the OSI reference model. Its meaning is to recommend that all companies use this specification to control the network. In this way, all companies have the same specifications and can be interconnected. 2. Division of OSI seven-layer model OSI defines a seven-layer framework for network interconnection (physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer), which is the ISO open interconnection system reference model. See the figure below. Each layer implements its own functions and protocols, and completes the interface communication with the adjacent layer. The OSI service definition details the services provided by each layer. The service of a layer is a capability of the layer and the layers below it, which is provided to the higher layer through the interface. The services provided by each layer have nothing to do with how these services are implemented. 3. Definition of each layer’s functions Here we only give a general explanation of the functions of each OSI layer, without going into detail, because each layer is actually a complex layer. Let’s take a brief look at it here. We start from the top layer - the application layer. The whole process is explained using the example of a commercial quotation sent between Company A and Company B. (1) Application layer The layer closest to the user in the OSI reference model provides application interfaces for computer users and also directly provides users with various network services. Our common application layer network service protocols are: HTTP, HTTPS, FTP, POP3, SMTP, etc. In fact, the boss of Company A is the user we are talking about, and the commercial quotation he wants to send is a network service provided by the application layer. Of course, the boss can also choose other services, such as sending a commercial contract, sending an inquiry, and so on. (2) Presentation Layer The presentation layer provides various encoding and conversion functions for application layer data, ensuring that the data sent by the application layer of one system can be recognized by the application layer of another system. If necessary, this layer provides a standard representation for converting the various data formats within the computer into a standard representation used in communications. Data compression and encryption are also one of the transformation functions that the presentation layer can provide. Since Company A and Company B are from different countries, they have agreed to use English as the language of communication. Therefore, the presentation layer (the company's secretary) is responsible for translating the information transmitted by the application layer into English. At the same time, in order to prevent other companies from seeing it, people from Company A will also encrypt the quotation. This is the role of representation, converting and translating data at the application layer. (3) Session layer The session layer is responsible for establishing, managing, and terminating communication sessions between presentation layer entities. Communication at this layer consists of service requests and responses between applications in different devices. The colleagues at the session layer get the converted data from the colleagues at the presentation layer (the colleagues at the session layer are similar to the external relations department of the company). The colleagues at the session layer may have the contact information of the company and many other companies. Here, the company is the entity in the actual transmission process. They need to manage the contact sessions between the company and many external companies. After receiving the data from the presentation layer, the session layer will establish and record this session. He will first find the address information of Company B, then put the entire document into an envelope and write the address and contact information. Prepare to mail the document. Once it is confirmed that Company B has received the quotation, the conversation is over and the colleagues in the External Relations Department will terminate the conversation. (4) Transport layer The transport layer establishes an end-to-end link between hosts. The role of the transport layer is to provide end-to-end reliable and transparent data transmission services for upper-layer protocols, including handling issues such as error control and flow control. This layer shields the details of lower-layer data communications from higher layers, so that high-level users only see a host-to-host, reliable data path between two transmission entities that can be controlled and set by the user. We usually say that TCP UDP is at this layer. The port number is the "end" here. The transport layer is equivalent to the person in the company who is responsible for sending and receiving express mail, the company's own deliveryman, who is responsible for delivering the information to be sent from the upper layer to the express company or post office. (5) Network layer This layer establishes a connection between two nodes through IP addressing, selects appropriate routing and switching nodes for packets sent by the transport layer at the source end, and transmits them to the transport layer at the destination end correctly according to the address. It is commonly referred to as the IP layer. This layer is what we often call the IP protocol layer. The IP protocol is the foundation of the Internet. The network layer is equivalent to the express delivery company's huge express delivery network, with different distribution centers across the country. For example, SF Express from Shenzhen to Beijing (for land transportation, it seems that air transportation can fly directly to Beijing) must first go to SF Express's Shenzhen distribution center, then be sent from the Shenzhen distribution center to the Wuhan distribution center, and then from the Wuhan distribution center to the Beijing Shunyi distribution center. Each distribution center is equivalent to an IP node in the network. (6) Data Link Layer It combines bits into bytes, and bytes into frames, uses link layer addresses (Ethernet uses MAC addresses) to access the medium, and performs error detection. The data link layer is divided into two sublayers: logical link control sublayer (LLC) and media access control sublayer (MAC). The MAC sublayer handles the CSMA/CD algorithm, data error checking, framing, etc.; the LLC sublayer defines some fields that enable the previous protocol to share the data link layer. In actual use, the LLC sublayer is not necessary. (7) Physical layer The actual transmission of the final signal is achieved through the physical layer. Transmits a bit stream over a physical medium. Specifies voltage levels, speeds, and cable pinouts. Commonly used equipment includes (various physical devices) hubs, repeaters, modems, network cables, twisted pair cables, and coaxial cables. These are the transmission media at the physical layer. The means of transportation used in the express delivery process are equivalent to our physical layer, such as cars, trains, planes, and ships. 4. Communication characteristics: peer-to-peer communication Peer-to-peer communication: In order for data packets to be transmitted from the source to the destination, each layer of the OSI model at the source end must communicate with the peer layer at the destination end. This type of communication is called peer-to-peer communication. During the communication process at each layer, the layer's own protocol is used for communication. 2. TCP/IP five-layer model The correspondence between the TCP/IP five-layer protocol and the OSI seven-layer protocol is as follows: Different devices work at each layer. For example, the switches we commonly use work at the data link layer, and general routers work at the network layer. The protocols implemented at each layer are also different, that is, the services at each layer are also different. The following figure lists the main protocols at each layer. 1. Application layer The application layer provides services to applications. These services are grouped according to the characteristics they provide to applications and are called service elements. Some are used by multiple applications, while others are used by a smaller class of applications. The application layer is the highest layer and directly provides services for the application process. Its function is to complete a series of services required for business processing while enabling multiple system application processes to communicate with each other. Its service elements are divided into two categories: common application service elements CASE and specific application service elements SASE. CASE provides the most basic services. It becomes the user of any user and any service element in the application layer, and mainly provides basic control mechanisms for application process communication and distributed system implementation. Specific service SASE needs to meet some specific services, such as document transmission, access management, job transmission, banking transactions, order entry, etc. These will involve virtual terminals, job transfer and operation, file transfer and access management, remote database access, graphics core systems, open systems interconnection management, etc. The application layer standards include DP8649 "Common Application Service Elements", DP8650 "Common Application Service Elements Protocol", file transfer, access and management services and protocols. 2. Transport layer The transport layer is the first end-to-end layer when two computers communicate data over a network and has a buffering effect. When the network layer service quality cannot meet the requirements, it will improve the service to meet the requirements of the higher layer; when the network layer service quality is good, it only needs to do very little work. The transport layer can also perform multiplexing, which is to create multiple logical connections on one network connection. The transport layer, also known as the transport layer, is a very important layer. Because it is the last layer that controls data transmission from source to destination from low to high. It is an established fact that there are great differences in performance among various communication subnets in the world. For example, telephone switching networks, packet switching networks, public data switching networks, local area networks and other communication subnets can be interconnected, but the throughput, transmission rate, data delay and communication costs they provide are different. For the session layer, an interface with constant performance is required. The transport layer takes on this function. It uses splitting/merging, multiplexing/demultiplexing technology to adjust the differences of the above communication subnets so that the session layer cannot feel it. In addition, the transport layer must also have functions such as error recovery and flow control to shield the session layer from the details and differences of the communication subnets in these aspects. The data objects faced by the transport layer are no longer network addresses and host addresses, but interface ports with the session layer. The ultimate goal of the above functions is to provide reliable and error-free data transmission for the session. The service of the transport layer generally goes through three stages: transport connection establishment stage, data transmission stage, and transport connection release stage to complete a complete service process. The data transmission stage is divided into general data transmission and accelerated data transmission. 3. Network layer The emergence of the network layer is also the result of network development. In the context of online systems and circuit switching, the functions of the network layer do not make much sense. As the number of data terminals increases, they are connected by relay devices. At this time, there will be a situation where a terminal requires to communicate not only with a single terminal but with multiple terminals. This is where the problem of linking the data of any two data terminal devices arises, which is routing or path finding. In addition, after a physical channel is established and used by a pair of users, a lot of idle time is often wasted. People naturally want to let multiple pairs of users share one link. To solve this problem, logical channel technology and virtual circuit technology emerged. In order to establish network connections and provide services to upper layers, the network layer should have the following main functions:
4. Data Link Layer A data link can be roughly understood as a data channel. The physical layer provides transmission media and connections for data communication between terminal devices. Media is long-lived and connections have a lifespan. During the lifetime of a connection, the sending and receiving ends can perform data communication one or more times. Each communication must go through two processes: establishing communication contact and dismantling communication contact. This established data sending and receiving relationship is called a data link. However, data transmitted on physical media is inevitably affected by various unreliable factors and may cause errors. In order to make up for the deficiencies in the physical layer and provide error-free data transmission for the upper layer, it is necessary to be able to detect and correct errors in the data. The establishment and dismantling of data links, as well as error detection and correction of data are the basic tasks of the data link layer. The main function of the link layer: The link layer provides data transmission services for the network layer, and this service depends on the functions of this layer.
There are also link identification, flow control, etc. Error detection often uses square code check and cyclic code check to detect bit errors in data on the channel, while frame loss and other conditions are detected using sequence number detection. Recovery from various errors is often accomplished through feedback retransmission technology. 5. Physical layer Although the physical layer is at the bottom layer, it is the foundation of the entire computer network. The physical layer provides transmission media and interconnection equipment for data communication between devices, and provides a reliable environment for data transmission. The media of the physical layer include overhead wires, balanced cables, optical fibers, wireless channels, etc. The interconnection equipment used for communication refers to the interconnection equipment between DTE and DCE. DTE stands for data terminal equipment, also known as physical equipment, including computers, terminals, etc. DCE is data communication equipment or circuit connection equipment, such as a modem. Data transmission usually goes through the path of DTE-DCE and then DCE-DTE. Interconnection equipment refers to the devices that connect DTE and DCE, such as various plugs and sockets. Various thick and thin coaxial cables, T-connectors, plugs, receivers, transmitters, repeaters, etc. in the LAN are all media and connectors at the physical layer. The main functions of the physical layer are: (1) Provide a data transmission path for data terminal devices. The data path can be a single physical medium or a connection of multiple physical media. A complete data transmission includes activating the physical connection, transmitting data, and terminating the physical connection. Activation means that no matter how many physical media are involved, they must be connected between the two communicating data terminal devices to form a channel. (2) To transmit data, the physical layer must form an entity suitable for data transmission needs and serve data transmission. The first is to ensure that data can pass through it correctly, and the second is to provide sufficient bandwidth (bandwidth refers to the number of bits that can pass through per second) to reduce congestion on the channel. The data transmission method can meet the needs of point-to-point, point-to-multipoint, serial or parallel, half-duplex or full-duplex, synchronous or asynchronous transmission. |
<<: Intent-based networking: Closing the network complexity gap
>>: eSIM card, where is the future?
[[265869]] The Trump administration has tried eve...
Preface Speaking of network communication protoco...
On April 23, the Federal Communications Commissio...
Since the beginning of 2018, the new number segme...
[51CTO.com original article] Recently, at the Hua...
[[311668]] [51CTO.com original article] Huawei Cl...
In recent years, with the rapid development of mo...
It’s the age of digital business. Two-thirds of c...
Recently, the three operators have successively i...
Everyone dreams of becoming rich overnight, but w...
ZJI was founded in 2011 as Weixiang Host, a well-...
Four out of five users experience challenges when...
[[177681]] On November 28, the Ministry of Indust...
Digitalization and the provision of digital servi...
[[319142]] Recently, in order to accelerate the i...