The OSI Model (Open Systems Interconnection) is a conceptual framework developed by the ISO (International Organization for Standardization) in 1984. It is a 7-layer architecture, with each layer having specific functionality. All these layers work collaboratively to facilitate data transmission between devices globally. Here is a breakdown of each layer: • Physical Layer (Layer 1) ◦ Responsibility: This is the lowest layer and is responsible for the actual physical connection between devices. It handles the transmission of individual bits from one node to the next. ◦ Data Format: Information at this layer is in the form of bits (0s and 1s). ◦ Key Functions: ▪ Bit synchronization: Provides a clock to synchronize both sender and receiver at the bit level. ▪ Bit rate control: Defines the number of bits sent per second (transmission rate). ▪ Physical topologies: Specifies how devices are arranged in a network (e.g., bus, star, or mesh topology). ▪ Transmission mode: Defines how data flows between devices (e.g., Simplex, half-duplex, and full-duplex). ◦ Devices: Hub, Repeater, Modem, and Cables are physical layer devices. • Data Link Layer (DLL) (Layer 2) ◦ Responsibility: Ensures node-to-node delivery of messages and error-free data transfer over the physical layer. It transmits packets to the host using its MAC address. ◦ Key Actions: Divides packets from the Network layer into frames and includes the sender and receiver's MAC address in the header of each frame. ◦ Key Functions: ▪ Framing: Breaks data into recoverable chunks (frames) that can be easily checked for corruption, making data meaningful to the receiver. ▪ Physical addressing: Adds physical addresses (MAC address) of the sender and/or receiver to the header of each frame. ▪ Error control: Detects and retransmits damaged or lost frames. ▪ Flow Control: Coordinates the amount of data that can be sent before acknowledgment, ensuring a constant data rate to prevent corruption. ▪ Access control: The MAC sub-layer helps determine which device has control over a shared communication channel at any given time. ◦ Devices: Switch and Bridge are Data Link Layer devices. • Network Layer (Layer 3) ◦ Responsibility: Facilitates the transmission of data from one host to another in different networks and handles packet routing to select the shortest path. ◦ Key Actions: Divides data received from the Transport layer into packets and places the sender and receiver's IP addresses in the header of each packet. ◦ Key Functions: ▪ Routing: Determines the most suitable route from source to destination. ▪ Logical Addressing: Defines an addressing scheme (IP addresses) to uniquely and universally identify each device on an internetwork. ◦ Devices: Routers and Layer 3 Switches implement the Network layer. • Transport Layer (Layer 4) ◦ Responsibility: Provides End-to-End Delivery of the complete message. It also handles acknowledgment of successful data transmission and re-transmits data if errors are found. ◦ Data Format: Data at this layer is referred to as Segments. ◦ Key Actions: ▪ At sender's side: Receives formatted data, performs segmentation, implements flow and error control, adds source and destination port numbers. ▪ At receiver's side: Reads the port number, forwards data to the respective application, and performs sequencing and reassembling of segmented data. ◦ Key Functions: ▪ Segmentation and Reassembly: Breaks messages into smaller units (segments) at the sender and reassembles them at the destination. ▪ Service Point Addressing: Uses port addresses (or service point addresses) in the header to ensure the message is delivered to the correct process or application. ◦ Services Provided: ▪ Connection-Oriented Service: A reliable and secure three-phase process (establishment, data transfer, termination) where the receiving device sends acknowledgments. ▪ Connectionless Service: Faster communication where the receiver does not acknowledge receipt of packets, less reliable than connection-oriented service. ◦ Devices: Gateways and Firewalls work on this layer. • Session Layer (Layer 5) ◦ Responsibility: Creates, maintains, and terminates communication sessions between applications. ◦ Key Functions: ▪ Session Establishment, Maintenance, and Termination: Manages the entire lifecycle of a communication session. ▪ Dialogue Control: Manages the structured exchange of data, supporting two-way (full-duplex) or one-way (half-duplex) communication. ▪ Synchronization: Inserts checkpoints into the data stream, allowing sessions to resume from the last checkpoint if interrupted. ▪ Session Recovery: Helps recover the session from interruptions or failures by resuming from the last known state. ◦ Devices: Gateway devices operate at this layer. • Presentation Layer (Layer 6) ◦ Primary Role: Ensures that data is presented in a way that can be understood by the receiving system, regardless of differences in data formats or encoding schemes. ◦ Key Functions: ▪ Data Compression: Reduces the amount of data transmitted, improving speed and bandwidth usage, and ensures decompression at the receiving end. ▪ Data Encryption and Decryption: Secures data transmission by encrypting data before sending and decrypting upon receipt, protecting confidentiality and integrity. ▪ Data Translation: Manages the syntax and structure of data, converting data between different formats (e.g., EBCDIC to ASCII) to ensure compatibility. ◦ Devices: Gateways and SSL/TLS Devices work on this layer. • Application Layer (Layer 7) ◦ Responsibility: Provides the interface for end-users to interact with the network, supporting applications like web browsers, email clients, and file transfer programs. ◦ Key Functions: ▪ End-user Communication: Enables user interaction with network services. ▪ Application Protocols: Supports various protocols that define rules for data exchange between software applications. ▪ Data Representation and Formatting: Ensures data is in an application-understandable format, including serialization (e.g., JSON, XML) and encoding/decoding (e.g., ASCII, UTF-8). ▪ Session Management: While technically handled by the Session Layer, the Application Layer provides mechanisms for users to initiate, manage, and terminate sessions (e.g., logging into an application). ▪ Error Handling and Data Integrity: Deals with application-level error handling and may implement application-specific error-checking procedures. ▪ Network Access and Resource Sharing: Allows users to access networked resources like shared files, databases, or printers, managing access control and permissions. ▪ User Authentication and Authorization: Manages user identity confirmation and permission granting for application access (e.g., logging into an email system). ▪ Communication Services: Provides support for voice (VoIP), video (video conferencing), and text-based (instant messaging) services. ◦ Devices: Firewalls, Load Balancers, and Proxy Servers operate at this layer

视频信息