The seven layers
Dear LQ,
I wasn't satisfied with the search results about real protocols for each layer. For example, some sources claim that JPEG and GIF are network protocols? Anyway, here's what I gathered so far: 1. Physical (wifi, ethernet, bluetooth) 2. Link (PPP, ATM, wifi, ethernet) 3. Network (IP, ICMP, ARP) 4. Transport (TCP, UDP, STCP) 5. Session (RPC, NetBios) 6. Presentation (TLS) 7. Application (HTTP/DNS) Could anyone confirm these protocols are on the right layers? (some of them are duplicated, for example ethernet and wifi span two layers) |
Funny that this has come up some many times in the last few days in various places.
I'd look at TechTarget's summary: https://www.techtarget.com/searchnet...definition/OSI Thus is might look like Wi-Fi and Ethernet are in there twice, but those are separate: There is the cabling of Ethernet (the wires) and the electrical signal of Ethernet (IEEE 802.3) over the wires. Same for the Wi-Fi. There are the electromagnetic waves and then the signal (IEEE 802.11) over those waves, if I understand correctly. However, there are often three additional unofficial but very important layers described as the financial, political, and religious layers. TLS could be in the Session or Presentation layers. There is even some commentary on the shortcomings of the OSI model since a lot of other protocols don't quite fit in one layer or another either: But to get to the primary source, the PDF is available at ISO: https://standards.iso.org/ittf/Publi...-1_1994(E).zip Bizarrely the PDF is wrapped in a Zip archive. |
Quote:
Some examples: The various 802-standards specifying data transmission over twisted-pair wire, coaxial cable, radio waves, and optical fibre. These standards are implemented as physical components inside various types of tranceivers. Quote:
Layer 2 will typically also specify some form of node addressing, making it possible to send frames to and from specific nodes in a multi-node setup. For 802.3/802.11 that would be the MAC addresses. Examples: 802.3 ("Ethernet"), 802.11, and yes, PPP. Note that some of these standards encompass one or more Layer 1 specifications as well. Since Layer 1 can transmit bits, it's entirely possible to use the same Layer 2 frame format with different Layer 1 technologies; Ethernet over twisted-pair, coaxial, and fibreoptic cable all use the exact same Layer 2 frame format. Same with PPP, you can run that over a number of different media/transports. Layer 2 may also encompass certain "control plane" protocols that network equipment use to communicate with one another and possibly auto-configure links, but that do not contain any upper-layer information. Examples: The Spanning-Tree protocol (STP/RSTP), Link-Layer Discovery Protocol (LLDP), Link Aggregation Control Protocol (LACP). Layer 2 standards are implemented inside various types of chips (typically ASICs) inside switches and network interface adapters. The connection to Layer 3 (if relevant) is provided by drivers. Quote:
Examples: IPv4, IPv6 (and older standards like IPX, DECnet, etc.) While Layer 3 should in theory be completely Layer 2-agnostic, a Layer 3 protocol must also specify how a network address is associated with a local Layer 2 address, and how such associations are discovered and published. Examples: ARP (for IPv4), NDP (for IPv6) Some non-data-carrying protocols designed for network operations and troubleshooting also fit into this category, simply by virtue of not (normally) carrying user data. Examples: ICMP (ping), various routing protocols (RIP/OSPF/BGP/etc.) Quote:
Quote:
NFS and SMB are fairly good examples of protocols that include a session layer (and a lot more). Protocols like Telnet and SSH also work like this, but they rely on a single TCP connection for session management and thus have no real session layer of their own. Quote:
TLS (and its predecessor SSL) sits directly on top of a transport protocol (TCP or UDP), while IPsec runs directly over Layer 3 (IP) and does session management over a separate UDP connection. In the latter case the encrypted connection is itself treated as a Layer 3 protocol, meaning the result looks something like this: Code:
Layer 1 - Layer 2 - Layer 3 - IPsec - Encrypted Layer 3 - Layer 4 etc. Quote:
|
That OSI model refuses to die article is a gem.
Thanks a lot for the pointer. I feel releived! |
Thanks for the extremely detailed explanation Ser Olmy,
one the most intelligible things I have read on the matter today. |
All times are GMT -5. The time now is 07:18 PM. |