"A Comprehensive Journey Through the OSI Model's Layers, Layer 5, Layer 6 and Layer 7."
The Open Systems Interconnection (OSI) model is a conceptual framework that divides network communications functions into seven layers each responsible for specific functions. Sending data over a network is complex because various hardware and software technologies must work cohesively.
The OSI data model provides a universal language for computer networking, so diverse technologies can communicate using standard protocols or rules of communication. Every technology in a specific layer must provide certain capabilities and perform specific functions to be useful in networking. Technologies in the higher layers benefit from abstraction as they can use lower-level technologies without having to worry about underlying implementation details.
The layers 5, 6 and 7 of the model are given next.
Layer 5: The Session Layer.
When two computers or networked devices need to communicate, the Session Layer (also called the network dialogue controller) comes into play, managing the setup, coordination (including determining how long a system should wait for a response), and termination between the applications at each end of the session. Services provided by the Session Layer include authentication and reconnections after an interruption, contributing to the uninterrupted flow of data transmission.
Essentially, the session layer controls the connection between computers, monitoring dialogues, and establishing, controlling, and ending sessions between local and remote applications. It also maintains connections to prevent interruption of data transmission.
How does the session layer work ?
The Session Layer acts as an intermediary between the Presentation Layer and the Transport Layer, relaying information between these adjacent layers. To establish and maintain a connection between entities, the Session Layer performs the following tasks:
Session layer protocols.
OSI session layer protocols provide security, accuracy and safety in communication between two applications.
These protocols include:
Tearing down a session:
In the context of networking, tearing down a session refers to the process of disconnecting a communication link between two devices. This disconnection can occur through mutual agreement between the devices involved in the session. Alternatively, a session might be terminated if one party intentionally disconnects or due to an error condition. If one party initiates the disconnection, the other party is capable of detecting the loss of communication and subsequently tearing down its side of the session. This mechanism ensures that sessions are managed efficiently, allowing for controlled and orderly termination based on the intentions or conditions of the communicating parties.
Layer 6: The Presentation layer
The presentation layer plays a pivotal role in the translation and formatting of data exchanged between the network and applications.
Often referred to as the syntax layer because it maintains the proper syntax of transferred data. Acting as a translator, this layer formats and translates data for the application layer, aligning it with the syntax or semantics accepted by the application.
This layer can also handle the encryption and decryption required by the application layer, providing a crucial security layer for data in transit.
In essence, it functions as a reliable converter, transforming incoming data into an accurate, standardized format that aligns with the expectations of the application layer.
Functions of the presentation Layer.
The presentation layer is thus responsible for three general functions: translation, compression, and encryption and decryption.
Translation.
Layer 6 translates data based on the host’s needs. Different hosts represent data in diverse manners, especially when dealing with heterogeneous networks.
The data received from the application layer usually includes numbers and characters. The presentation layer then deals with translating the data into a transportable and storable data format that the receiving application can understand.
On the sender's end, the presentation layer prepares the data in a format suitable for the application layer and potential encoding for transmission, ensuring proper structure and format for the recipient.
Recommended by LinkedIn
Compression.
Data compression reduces data size by encoding the actual number of bits that require transmission on the network. Therefore, through this, it helps speed up file transfer, save storage capacity, reduce bandwidth, and decrease costs for storage hardware.
The goal of compression in the presentation layer is to reduce the number of bits needed to represent data; the aforementioned encoding can thus be achieved by inserting a single repeat character or by removing all unneeded characters.
The process helps accelerate the rate at which data transmits to other layers. If you’re sending many files, the layer ensures that the files reach its destination quickly and without quality loss.
Encryption and decryption.
Both encryption and decryption occur at the sixth layer. Encryption converts data from a readable format, plaintext, into an unreadable format, ciphertext. However, only the user with the correct encryption key can access the data. The correct key then decrypts the data for proper display on the next layer.
The encryption occurs at the transmitter and the decryption occurs at the receiver. Both tasks are crucial to data security. Encryption and decryption provide data protection, protect against file tampering, and increase trust.
Presentation layer protocols
To perform the necessary functions, the presentation layer utilizes certain protocols, including:
Layer 7: The Application Layer.
The Application Layer in the OSI model is the layer that is the “closest to the end user”. This layer serves as the interface between the software application and the network. Oddly enough, applications themselves do not reside at the application layer. Instead the layer facilitates communication through lower layers in order to establish connections with applications at the other end. Web browsers (Google Chrome, Firefox, Safari, etc.) TelNet, and FTP, are examples of communications that rely on Layer 7.
The application layer includes protocols designed for end-users. For example, HTTP is a Layer 7 protocol designed to transmit data between a web server and a client.
The application layer identifies communication partners, resource availability, and synchronizes communication.
The Application Layer ensures that end-user applications can effectively communicate over the network.
Functions of the application layer.
Application Services:
This encompasses various functions within the application layer, including:
Before end this article, let's talk about the Protocol Data Unit (PDU).
Protocol Data Unit (PDU).
The information transferred at each layer of the OSI model is encapsulated within a PDU. The PDU not only contains the actual data but also includes protocol-specific control information relevant to that layer. As the PDU moves down the layers (or up, depending on the direction of communication), each layer adds or removes its specific protocol information. The PDU is assigned a different name at each layer to signify its role in the communication process. This concept is integral to the OSI model, where the PDU adapts to layer-specific protocols and conventions. Essentially, in a computer network, the PDU represents a block of information exchanged between network end systems, playing a crucial role in the layered communication process. Different layers of the protocol stack handle distinct types of data as they facilitate communication across the network.
The following table illustrates the PDU of each protocol stack layer.
Till here, a brief of Layer 5, 6, 7 and the PDU.