Layer 7: Application Layer
The Application layer of the OSI model is the layer closest to the end-user, which means that both the OSI application layer and the user interact directly with the software application. This layer interacts with software applications that implements a communicating component.
Functions of the Application Layer
- Responsible for identifying and establishing the availability of the intended communication partner and determining if sufficient resources for the intended communication exist
Security Challenges of the Application Layer
- Being able to verify the genuineness of the particular application
- Availability of internetworking applications required for variety of tasks.
Layer 6: Presentation Layer
The presentation layer establishes context between application-layer entities, in which the application-layer entities may use different syntax and semantics if the presentation service provides a big mapping between them. This layer provides independence from data representation by translating between application and network formats. It translates the data into the form that the application accepts.
Functions of the Presentation Layer
- It provides coding and format conversion functions
- Handles data compression and decompression
- Handles data encryption and decryption
- Also involve in multimedia operations
Security Challenges of the Presentation Layer
- Handling of all the available data formats may not easily be achieved
Layer 5: Session Layer
The Session Layer is responsible for setting up, managing and then terminating sessions between Presentation Layer entities.
Functions of the Session Layer
- Handles setup and termination of connection between two Presentation Layer entities
- Provides dialog between devices or nodes.
- Coordinates communications between systems and serves to organize their communication by offering three different modes: simplex, half-duplex and full-duplex
- Keeps different applications’ data separate from other applications’ data
Security Challenges of the Session Layer
- Multiplicity of Session Layer Protocols may lead to security challenges
Layer 4: Transport Layer
The transport layer provides the functional and procedural means of transferring variable-length data sequence from a source to a destination host via one or more networks, while maintaining the quality of service functions. Services located in the Transport layer both segment and reassemble data from upper-layer application and unite them into a single data stream.
Functions of the Transport Layer
- Provides end-to-end data transport services and can establish a logical connection between sending host and destination host on an internetwork
- Provides mechanisms for multiplexing upper-layer applications
- It hides details of any network-dependent information from the higher layers by providing transparent data transfer.
- Maintaining flow control
Security Challenges of the Transport Layer
- Ensuring data integrity
- Data loss might result from overflow of the buffer of the receiving host
Layer 3: Network Layer
The Network Layer is responsible for routing through an internetwork and for network addressing. This means that the Network layer is responsible for transporting traffic between devices that are not locally attached.
Functions of the Network Layer
- Translation of logical machine address into physical machine address
- Responsible for routing traffic between two different networks.
- Handles logical addressing
- Responsible for uniquely identifying each network
Security Challenges of the Network Layer
- Loss of packet if the entry for the destination network is not found in the routing table.
- Message delivery at the network layer is not necessarily guaranteed to be reliable
Layer 2: Data Link Layer
The Data Link layer ensures that messages are delivered to the proper device and translates messages from the Network layer into bits for the Physical layer to transmit.
It provides node-to-node data transfer-a link between two directly connected nodes
Functions of the Data Link Layer
- It defines protocols to establish and terminate a connection between two physically connected devices.
- It defines a protocol for flow control between the two end-points.
- Formatting of the message into data frames and adds a customized header containing the hardware destination and the source address
- Formats messages into frames
- It detects and possibly corrects errors that may occur in the physical layer
- Responsible for uniquely identifying each device on a local network
- Provides flow control and sequencing control bits
Security Challenges of the Data Link Layer
- Cannot handle broadcasts
Layer 1: Physical Layer
The physical layer is the layer that contains physical medium of data transfer such as the cables and the interface cards
Functions of the Physical Layer
- It defines the electrical and physical specification of the data connection
- It defines transmission modes ie simplex, half-duplex and full-duplex
- It defines network topology such as bus, mesh or ring
- Encoding of the bits is done in this layer
- It determines whether encoded bits will be transmitted by baseband(digital) or broadband(analog) signal
- It mostly deals with raw data
- Communicates with various types of communication media
- Specifies the electrical, mechanical and functional requirements for each medium
- Identifies the Data Terminal Equipment(DTE) and the Data Communication Equipment(DCE)
- Allows for disparate systems to communicate
Security Challenges of the Physical Layer
- Interconnectivity between network equipment from different vendors may be a challenge.
Please leave a commend if this has been informative for your.
You actually make it seem so easy with your presentation but I find this matter
to be actually something which I think I would never understand.
It seems too complex and extremely broad for me.
I am looking forward for your next post, I’ll try to get the hang of
it!