2783_ISO_OSI 2783 ISO OSI

User Manual: Pdf 2783_ISO_OSI

Open the PDF directly: View PDF PDF.
Page Count: 44

Download2783_ISO_OSI 2783 ISO OSI
Open PDF In BrowserView PDF
DATA PRO

Data Networking

2783

1

Standards

ISO Reference Model
for Open Systems
Interconnection (OSI)
In this report:

Datapro Summary

OSI Standards Progress ..... 6

The goal of Open Systems Interconnection (OS!) was designed to enable dissimilar computers in multivendor environments to share information transparently. The OSI structure
calls for cooperation among systems of different manufacture and design. There are seven
layers of the OSI model that communicate between one end system and another. The layers
cover nearly all aspects of information flow, from applications-related services provided at
the Application Layer to the physical connection of devices to the communications medium
at the Physical Layer. All seven layers have long since been defmed and ISO protocols
ratified for each layer, though extensions have been made occasionally. Although the model
has changed the way we look at networking, the dream of complete OSI-compliance has not
come to fruition. The causes are varied, but this is essentially because OSI protocols are too
expensive and too complex compared with other protocols that have become de facto standards in their own right. Even so, it is important to understand the model because, although
the complete stack of protocols is not much used today, the model has formed the way we
think of the structure of networks, and the model itself is always referred to in intemetworking matters.

OSI Management ................ 8
OSI and the Future •....••....•.. 9

Note: This report explains the OSI SevenLayer Reference Model at
all layers; compares OSI
to other architectures;
rationalizes the need for
standards testing and verification; examines the
case for OSI; profiles
major testing organizations; and outlines OSI
Management standards
and status.

Analysis
The proliferation of computerized data processing systems in the late 1960s produced a need for
compatible data communications networks in
the 1970s. Several proprietary network architectures were developed for mainframe-to-tenninal
communications, including ffiM's SNAin 1974.
Although many of these proprietary architectures were based on a layered model, none was
compatible with any other. The CClTI's X.25
host interface to the packet networks standard
was ratified in 1976 but this is not a complete
network architecture. In 1977 the International
Organization for Standardization (ISO) formed
ISO Technical Committee 97 (TC97), Subcommittee 16 (SC16), to embark on a worldwide

-By Marina Smith
Senior Analyst
email: smithma@mcgraw-hill.com

1997 The McGraw-HUI Companies, Inc. Reproduction Prohibited.
Dalapro Information Services Group. Dellan NJ 08075 USA

@ August

standardization effort and confront the issue of
incompatibility head-on. The purpose of TC97!
SC 16 was to develop a model and define the
protocols and interfaces required to support an
open system. The goal of OS! was, and still is,
to enable dissimilar computers in multivendor
environments to share information transparently.
With this capability, it was thought that global
digital networks could become a reality. As we
shall see, however, much of the OSI goal has in
fact come about through widespread use of de
facto protocols such as TCPIIP and from multivendor initiatives formed to ensure interoperability such as the ATM Forum, a standards-setting body in its own right.

The Open System
The ISO defines a system as a set of one or more
computers and associated software, peripherals,
tenninals, human operators, physical processes,
information transfer means, etc., which form an
autonomous whole capable of performing information processing and/or information transfer.
An open system is one that obeys OSI standards
in its communication with other systems.

On Ihe Internet http:ltwww.datapro.com

2

ISO Reference Model
for Open Systems·
Interconnection (OSI)

2783
Standards

An application process is an element within a system that
performs information processing for a particular application. The
application process can be manual (a person operating a banking
terminal), computerized (a program executing in a computer center and accessing a remote database), or physical (a process control program executing in a dedicated cQIllPuter attachedto industrial equipment and linked to a plant control system).
The OSI structure calls for cooperation among systems of different manufacture and design. This includes coordinating activities such as the following:
• Interprocess communications-the synchronization between
OSI application processes and the exchange of information
• Data representation-the creation and maintenance of data
descriptions and transformations for reformatting data exchanged between systems
• Data storage-storage media, file systems, and database systems for providing access to and management of stored data
• Process and resource management-how application processes
are declared, initiated, controlled, and acquired
• Integrity and security-information processing constraints that
must be ensured during open systems operations
• Program support-the definition, compilation, testing, linking,
storage, and transfer of and access to programs executed by the
application processes
The OSI model is concerned only with the exchange of information between open systems.

The Layering Concept
Layering is a basic structuring technique used in the OSI model.
Each layer is composed of an ordered set of subsystems, with
logically related functions grouped together. The OSI model
breaks down internetworking activities between systems into two

Data Networking

distinct groups. Communications-oriented functions are sepa. rated from user-oriented functions; features which move informa~on across a network are distinct from features which handle and
format information.
There are seven layers of the OSI model that communicate
between one end system and another end system. The layers
cover nearly all aspects of information flow, from applicationsrelated services provided at the Application Layer to the connectioJ;l of devices to the communications medium at the Physical
Layer. Below the Physical Layer, the media itself corresponding
to '1..ayer 0"-such as wire, cable, or through-the-air communication-is not addressed by the model. Application, Presentation,
Session, Transport, Network, Data Link, and Physical Layers
have been defined (see Table "The Seven Layers of OSI"). The
table describes the OS.! model's seven layers and their purposes.
In the model, information flows down from Layer 7 to Layer 1,
and then out over a physical transmission medium. At the receiving end, the information flows into another end system and up
from Layer I to Layer 7, until it is received by a user.
The seven layers can be divided into two functional groups:
the Transport Platform (Layers I to 4) and the Application Platform (Layers 5 to 7). The Transport Platform's function is to get
data from one system to another without errors. The Application
Platform's function is to interpret the data stream and present it to
the user in a usable form (see Figure "Application and Transport
Division").
Each layer contributes functions to the communications task.
For example, the Link Layer enables communications across a
single physical connection, while the Network Layer provides
end-to-end routing and data relay. Services at the upper-layer interface--providing communications to the next~higher layerare provided by each layer, usually described by a service specification for the layer. Services at each layer are provided by a
layer entity. Each layer entity communicates with its peer at the
same layer on another system, providing services specified in the
service specification.

The Seven Layers of 051
Layer

Name

Purpose

7

Application

Applications and application interfaces for
OSI networks. Provides access to lower-layer
functions and services.

6

Presentation

Negotiates syntactic representation for the
Presentation Layer and performs data
transformations.

5

Session

Coordinates connection and interaction
between applications. Establishes a dialog,
manages and synchronizes the direction of
data flow.

4

Transport

Ensures end-to-end data transfer between
applications, data integrity, and service
quality. Assembles data packets for routing by
Layer 3.

3

Network

Routes and relays data units among network
nodes.

2

Data Unk

Transfers data units from one network node
to another over a transmission circuit.
Ensures data integrity between nodes.

Physical

Delimits and encodes the bits onto the
physical medium.

On the Intemet htIp:llwww.datapro.com

1997 The McGraw-HiII Companies. Inc. ReproducIion Prohibited.
Datapro Information Services Group. Delran NJ 08075 USA

@

Data Networking

ISO Reference Model
for Open Systems
Interconnection (051)

Standards Organizations
Several standards testing and
verification bodies have been
organized by vendor consortiums, govemment agencies,
and independent organizations. They have found that
developing conformance
specifications, producing testing suites, and conducting
comprehensive testing are
complicated, expensive, and
time consuming. Regional differences can stymie attempts
at verification. The trend for
these organizations, therefore,
is to cooperate with each
other, sharing resources and
expertise. A primary objective
is demonstrating interoperability among different vendors;
i.e., proving that standards
really work and fostering enduser interest. Many agencies
have tried vainly to involve
more end users but are
backed primarily by the
vendors.

ANSI (American National
Standards Institute)
ANSI
11 W.42nd Street
New York NY 10036, U.S.A.
Tel:+12126424900
Fax: +12123980023
http://www.ansi.org

ATMForum
World Headquarters
2570 West EI Camino Real
Suite 304
Mountain View, CA 940401313, U.S.A.
Phone: +1 4159496700
Fax: +14159496705
http://www.atmforum.com

European Office
Boulevard Saint-Michel 78
1040 Brussels, BELGIUM
Phone: +32 2 732 8505
Fax: +32 2 732 8485

Asia-Pacific Office
Hamamatsucho Suzuki
Bldg.3F
1-2-11 Hamamatsucho,
Minato-ku
Tokyo 105, JAPAN
Phone: +8133438 3694
Fax: +81 3 3438 3698

IEEE (The Institute Of
Electrical And Electronics
Engineers)
The Institute Of Electrical And
Electronics Engineers, Inc.
1828 l Street NW, Suite 1202
Washington DC 20036-5104,
U.S.A.
Tel: +1 908 981 0060
Fax: +19089810027
http://www.ieee.org

IBM's SNA is also a layered architecture, following rules of
layering similar to OSI and other layered architectures. There are
good reasons for layering: layering simplifies change; components inside a layer can be changed without affecting any other
layers in that node. Layers are like structured programming-but
for teleprocessing systems. Because there are rigid interfaces between levels, fewer people need to react to changes, allowing
them to be implemented faster. There is no better way of achieving complex functions. Layering allows each network function to
be made "transparent," unaware and independent of other functions at other layers, thus enabling any layer to be modified without changing the entire monolithic architecture.
Each layer may support one of several different protocols
designed for specific network applications; the choice of a specific protocol is optional, allowing users to tailor networks to
their own design. Each layer defines functions crucial to the communications process at that layer, independent of the other layers.
However, a layer may perform functions hinging on functions
performed in the layers immediately above or below. A layer can
only communicate with another device or network node at its peer
layer. Messages exchanged between peer layers are "enveloped"
@ 1997 The McGraw·Hill Companies, Inc. Reproduction Prohibited.

Datapro Information Services Group. Delran NJ 08075 USA

2783

3

Standards

IEEE Corporate Office
345 E. 47th Street
New York, NY, 10017, U.S.A.
Tel: +1 2127057900
IEEE Operations Center
445 Hoes Lane
Piscataway, NJ, 08855-1331,
U.S.A.
Tel: +1 908981 0060
IEEE European Operations
Center (Brussels)
Tel: +32 2 770 2242
Fax: 32 2 770 8505
E-mail: memserviceeurope@ieee.org

ISO (International
Organization for
Standardization)
ISO Central Secretariat
1, rue de Varembe
Case Postale 56
CH-1211 Geneva 20
Switzerland
Tel: + 4122 749 0111
Fax: + 4122 733 34 30
E-mail:
INTERNET: central@iso.ch
X.4OO: c=ch; a=4oonet; p=iso;
e=isocs; s=central
http://www.iso.ch
Please note: Copies of ISO
standards can be ordered
from local standards offices.

ITU (International
Telecommunications Union)
Place des Nations
CH - 1211 Geneva 20
Switzerland
Tel: +412273051 11
Fax (Group 3): +41 22 733
7256
Fax: (Group 4): +41 22 730
6500
http://www.itu.ch

European Computer
Manufacturers Association
(ECMA)
Rue du Rhone 114
CH-1204 Geneva, Switzerland
Tel: +41 22 849 6000
Fax: +41 22 849 6001
Telex: 413237 ECMA CH
http://www.ecma.ch

Electronic Industries
Association (EIA)
Electronic Industries
Association
2500 Wilson Boulevard
Arlington, VA 22201-3834
Tel: +1 703 907 7500
Fax: +1 703 907 7501
http://www.eia.org

with messages from other layers and passed through these other
layers on the way to their destination, picking up and then shedding these other protocol layers along the way. For example, if
layer seven at one end system must send a message to layer seven
at another, it must travel down through six layers at its own end
and then up through six layers at the other, until it reaches layer
seven at its opposite (peer) layer.
Each network node (a network user, computer, terminal) is
equipped with this layer mechanism. However, not all intermediate nodes need all seven layers. Network nodes, in particular,
must only route and transmit data packets-functions at the bottom three layers of the OS! model. Layer 4 through 7 functions
are not required and, therefore, not included in network node software. Data packets processed in these nodes reach only Layer 3
and are then routed elsewhere (see Figure "Message Movement
Among OS] l.o.yerS'). A node communicates with its peer in another node sending or receiving data. Data transfer is routed from
Layer 7 down to Layer 1 at the transmitting node, then along the
network to Layer 1 at the receiving node, and finally from Layer I
up to Layer 7. Peer layers communicate by the same method.

On !he ln1ernet htIp:l/www.dalapro.com

ISO Reference .Model
for Open Systems
Interconnection (051)

2783

4

Standards

does not provide services to a layer above it. Some of the services
provided by this layer, other than information transfer, are the
following:

Figure
Application and Transport Division

• Identifying intended communications partners

7
Application

6
Presentation

• Determining current availability of the intended partners

Application
Platform

• Agreeing on responsibility for error recovery
• Agreeing on procedures for controlling data integrity

The Presentation Layer (Layer 6) allows an application to interpret the meaning of information exchanged, Information is formatted and translated at this layer. Aspects of Layer 6 include data
syntax, which is the data to be transferred between layers, and the
presentation image syntax, which is the data structure thatapplication entities refer to in their dialog, or the set of actions that may
be performed on the data structure.
Services provided to the Presentation Layer include the
following:

Session

4
Transport

3
2
Data Unk

• Establishing the authority to communicate

The Presentation Layer

5

Network

Data Networking

Transport
Platform

1
Physical

• Transforming data syntax, primarily code and character set
conversion
• Transforming and selecting the presentation syntax, the adaptation and modification of the presentation data (the OSI view)
Functions within the Presentation Layer include session establishment request; data transfer; negotiation and renegotiation of
data syntax and presentation image syntax; and session termination request.

The Session Layer
The seven layers are divided into two functional groups.

The Session Layer (Layer 5) allows cooperating presentation
entities to organize and synchronize their dialog and to manage
data exchange. It provides the following services:

The message initiated at the Application Layer is passed from
layer to layer, through the various OSI layers, encapsulating control information in the process. A fully encapsulated message
enters the cable at Layer 1. The procedure is reversed at the receiving end. Each item of control information is processed at its
appropriate layer, and the message itself passes up to Layer 7.
Data transfer essentially is a packaging process at the transmitting
node and an unpackaging process at the receiving node.

• Session-connection establishment-creation of an exchange
between presentation entities

The Layers
A number of objectives were considered by the reference model's
designers: to limit the number of layers to make the system engineering task of describing and integrating the layers as simple as
possible; to create boundaries between layers at points where the
description of services can be small and the number of interactions across each boundary is minimized; and to collect similar
functions in the same layer. Table "The Seven Layers of OSf'
summarizes the OSI Reference Model's layers; more detailed
descriptions follow for each layer.

The App6cation Layer
The Application Layer (Layer 7) is the highest layer, providing
the means for the application process to access the OSI environment. Its function is to serve as the passageway between application processes using Open Systems Interconnection to exchange
information; consequently, all application process parameters are
made known to the OSI environment through this layer.
All services directly usable by the application process (i.e.,
systems and applications management functions) are provided by
the Application Layer. It differs from the other layers in that it

On the Intemet http://www.datapro.com

• Session-connection release
• Normal data exchange
• Expedited data exchange
• Interaction management-allowing presentation entities to
take turns exercising control functions
• Session-connection synchronization
• Exception reporting-permitting the presentation entities to be
notified of exceptional situations
• Activity management

The Transport Layer
The Transport Layer (Layer 4) provides transparent data flow
between session entities, freeing the Session Layer from responsibility for cost-effective and reliable data transfer. Layer 4 provides information interchange according to a user-specified reliability level and end-to-end control. Transport protocols transfer
information from one end of a physical connection to another and
ensure that it is delivered correctly_ Layer 4 protocols are used
after a route has been established through the network by the
network-layer protocol.
The services provided by this layer include the following:
• Transport-connection establishment to complete a connection
between session entities

C 1997 The McGraw-Hill Companies. Inc. Reproduction Prohib~ed_
Datapro Infonnation Services Group. Delran NJ 08075 USA

Data Networking

ISO Reference Model
for Open Systems
Interconnection (OSI)

2783

5

Standards

Figure
Message Movement Among OSI Layers

Message moves from Layer 7 through ~
the other layers to reach Layer 7
at the opposite end

,....---------,
7

7

Application

Application

6
Presentation

6
Presentation

5

5

Session

Session

4
Transport

4
Transport

3
Network

I-......;..=.;.;:.;..:.:.----I-~

3
Network

- - - - - - - - -

2
Data Link

3
Network

---------~~------_4

2

2

I-------+~-

Data Link

- - - - - - --

Data Link
---------~~------_4

1
Physical
L . - -__r------L~

1
Physical
- - - - - - - - -

Transmission
Media

'--v-----'

---------~~--~--~

'--v-----'

'--v-----'

End System

Network Node

End System

Intermediate nodes in an OSI network require only bottom-layer functions of the OSI modeL Note how peer layers communicate only with their
peers; i.e., Layer I talks to other Layer Is but not to Layer 2s.

• Data transfer, in accordance with the agreed quality of service
• Transport-connection release

• Noting errors for reporting unrecoverable errors to the transport layer
• Sequencing network control data units

The European Computer Manufacturers Assn. (ECMA) has
defined this layer in its Transport Protocol standard, ECMA-72.
In the early 199Os, as the popularity of the OSI protocols began to wane and TCPIIP began to take over, a number of hybrid
stacks were developed whereby data streams could "cross over"
from one type of stack to another, in either direction. The crossover point was at the Transport Layer in all cases. This allowed
applications to reach their intended destinations whichever system they were using, and encouraged interoperability. Although
this was in keeping with the aims of the ISO, it made possible
migration to the newly-popular TCPIIP stack, and aided the eventual near-demise of the OSI stack as a complete set of protocols.

The Network Layer
The Network Layer (Layer 3) provides the means to establish,
maintain, and terminate connections between systems. Its basic
service is providing transparent data transfer between transport
entities.
The services provided by this layer encompass the following:
• Establishing network connections for transporting data between transport entities through network addresses
• Identifying connection endpoints
• Transferring network service data units
1997 The McGraw-HRI Companies, Inc. ReproduCtion Prohibited.
Oatapro Information Services Group. Delran NJ 08075 USA

@

• Row control
• Releasing the network connection
The Network Layer is where routers and, nowadays, some LAN
switches operate. They are indifferent to the type of network and
can therefore be used to pass data from one type of network to
another, for example from Ethernet to Token-Ring. Although
many routers have OSI protocol support, in fact it is little used, IP
being by far the preferred protocol for this layer. Given the importance of the Internet, which today runs almost entirely on IP, this
can only increase. However, the remarks made earlier as to how
the model has formed the way we think about networks holds
particularly true for this layer and Layer 2-nobody can talk coherently about networking without mentioning these layers.

The Data Link Layer
Data Link Layer 2 provides the procedural and functional means
to establish, maintain, and release data link connections between
two network nodes or network entities and to transfer data frames
(or packets). This layer also detects and may correct errors that
occur in the Physical Layer.
Services provided by the Data Link Layer to the Network
Layer include data link connection, sequencing, error notification, flow control, and data unit transfer.
On the Intemet htIp:llwww.datapro.com

2783

6

Staodards

Layers are sometimes divided into sublayers, for several reasons. Layer functions are often divided into separate modules to
handle the service interface of the layer beneath it. This avoids
"rewriting" the entire layer. The Data Link Layer of the IEEE 802
Local Area Network (LAN) standards is divided into a Logical
Link Control (LLC) sublayer and a Media Access Control (MAC)
sublayer. The MAC sublayer depends on characteristics of the
underlying" Physical Layer. Any layer may originate a message to
fulfill its responsibilities. The message may not bypass any layer
en route to its destination. If a message leaves the node, it will end
up in another node at the same layer that originated the message.
It is at Layer 2 that bridges and most LAN switches reside. All
such devices have a MAC address table for all the end stations
(which all have MAC addresses).
The Physical Layer
The lowest of the OSI layers is Physical Layer I. It provides the
electrical, mechanical, functional, and procedural characteristics
for activation, maintenance, and deactivation of a physical connection. Physical Layer standards specify physical interfaces
(connectors) connected by a physical medium.
Services provided by this layer include the following:
• Activating and deactivating physical connections
• Data circuit identification
• Sequencing
• Transmitting physical service data units either synchronously
or asynchronously
• Fault condition notification

Abstract Syntax Notation One (ASN.1)
ASN.I is a specification language adopted for the OSI Reference
Model, giving standards developers a common method for defining syntax. ASN.I is somewhat analogous to grammatical rules
defining the English language, with the exception that it is not
procedural. Just as English grammar specifies notation (punctuation symbols) and word classifications (such as nouns and verbs),
ASN.I specifies the rules that help standards developers define
complex data types in terms of simple building blocks.
ASN.I was first formally described and published in 1984, in
the ITU-T X.409 standard entitled "Message Handling Systems:
Presentation Syntax and Notation." It is now described (in less
readable fashion) in two later documents: ITU-T X.208 (ISO
8824), entitled "Specification of Abstract Syntax Notation One
(ASN.l)," and X.2OO (ISO 8825), "Basic Encoding Rules for
Abstract Syntax Notation One (ASN.l)."
According to ASN.I, each fragment of information must possess a type and a value. For example:
.• Device-Status could be a type (in this case, it is a Boolean tyj,e)
• Zero or One are the possible values
This is specified in ASN.I notation as such:
Device-Status ::= Boolean
Boolean ::= I (or 0)
This is a very simple example; ASN.I is a powerful grammar,
capable of specifying very complex data types. Hence, it will
continue to be the grammar of choice for specifying open systems
standards and protocols.

On \he Intemet htIp:llwww.datapro.com

ISO Reference Model
for OpenSyatems
Interconnection (OSI)

Data NetworKing

OSI Standards Progress
There are four stages in the developmerit cycle: working paper;
committee draft (CD), previously known as a draft proposal; draft
international standard (DIS); and international standard (IS). A
working paper is developed in the first stage. When it matures and
contains well-developed technical concepts, it is registered as a
CD. Passage advances the CD to the DIS level, and the document
is considered sufficiently stable to serve as the basis of initial
implementations. At the DIS level, the document is distributed for
a 180-day ballot. The DIS may require multiple ballots. A successful ballot elevates the DIS to the level of IS and completes
ISO's process.
The entire process usually takes between four and eight years.
Here we can see one of the reasons for the lack of popularity for
the protocols involved. The ITU-T was formerly the CCITT,
under whose aegis these standards were set. The CCITT has now
been devolved into the International Telecommunications Union
(ITU). Telecommunications standards can be set over a long
period of time as the voice and WAN world needs to ensure high
quality and complete interoperability between systems. Data networking, on the other hand, in many cases exists in isolated
LANs, and though these are almost always today connected to the
outside world in some manner, a gateway of some sort, often IP,
gives enough connectivity. For Wide Area Networks (WANs) the
same needs may apply as for voice but there is a lot of crossover
between the types of device used and the WAN manufacturers
have adopted the same standards as are used in LANs in many
cases. With the new standard, Asynchronous Transfer Mode
(ATM), the standard was set for WANs, but became developed by
the LAN vendors far more quickly. Given the fast-moving nature
of LAN developments, with low-cost high-volume products
appearing in ever greater numbers and new high-specification
models ensuring replacements in ever-shorter times, it is easy to
see that a standards process that takes up to eight years to complete is not workable. LAN standards today are proposed one
year and a first version out the next. Again, the ISO process that
demands a complete standard before the first release is ignored.
as soon as a halfway working standard can be given out, it is, with
a further release the year after. A case in point is the new LAN
standard for virtual LANs, being developed by the IEEE 802.lq
working group-the first release, planned for mid- to late 1997,
has only the facilities for port-switching LANs, whereas the idea
of completely separating the logical from the physical LAN
(which is what a virtual LAN can do) needs far more than that to
be efficient.
A list of standards organizations, together with contact details,
associated with the OSI Reference Model and other standards
mentioned here is given at the end of this report.

OSI Applications Standards
In the early 1990s, applications at Layer 7 were considered the
driving force of OSI acceptance. In particular, the ISO electronic
mail standard for message handling systems (MHSs)-or
X.400-was becoming popular in commercial implementations.
Two versions, one in 1984, and another in 1988, were unratified
draft international standards. The standard was given a big boost
in 1989, when the Aerospace Industry Assn. (AlA) adopted X.400
to interconnect its diverse electronic mail networks. Gateways to
proprietary E-Mail systems were also developed that year, and
dozens of vendors rolled out X.400-based products. In addition,
the ISO adapted XAOO as the message medium for electronic data
interchange (EDI). In this context, X.400 was to be used as the
communications method to· store and forward trade documents
and business forms conforming to ANSI X 12, the European EDIFACT, and de facto EDI standards. Alas, MHSIX.400 proved

C1997Th&McGraW·HiIl Companies, Inc. Repl'Gduclion Prohibited.
Datapro Inionnation ServiCes Group. Delran NJ08075 USA

Data Networking

ISO Reference Model
for Open Systems
Interconnection (051)

costly and complicated to implement, and was overtaken by
other, simpler, electronic mail standards, particularly, since the
mid-199Os, Internet mail based on IP.
One component of successful E-Mail internetworking is directory services (OS), with the ISO version known as X.500. Again,
this seems to be unworkable and, while no international standard
has taken over, Novell's NOS and Banyan's StreetTalk provide
most of the directory functionality in use today. Microsoft is also
in the process of developing a similar function. In today's open
networking environment, reliance on proprietary software is unusual (unless as pre-standard releases) and it can only be concluded that X.500 proved more or less unworkable, although
Banyan declared its StreetTalk to be based very much upon X.500
and obviously drew upon it for a lot of the ideas.
X.500 specifies an on-line directory for message communications, ultimately allowing network providers to map a common,
interconnected directory of worldwide users. X.500 dictates naming conventions, how users access directory information, and
what services are available.
The OSI protocol pair for office automation, Office Document
Architecture (aDA) and Office Document Interchange Format
(ODIF), has been an international standard since 1988 (ISO
8613). It was also specified in the various governments' GOSIP
procurement standards until the demise of GOSIP worldwide in
the early 199Os. aDA and ODIF facilitate the exchange of office
documents-such as letters, memoranda, and business reportsamong dissimilar systems. Moreover, the standard specifies the
formatting and exchange of compound documents-those containing combinations of text, images, and graphics. Several ISO
working groups are attempting to strengthen and extend the standard in such areas as the inclusion of audio, spreadsheet data,
color graphics, document security, and various layout and presentation styles.
The OSI standard for sending and sharing data files-File
Transfer, Access, and Management (FTAM)-is also a finalized
international standard. It is a Layer 7 component of the Manufacturing Automation Protocol (MAP), which was developed from
networking efforts in the manufacturing industry. It spread
quickly in Europe and made significant progress in domestic
business applications, but the file protocol used with Transmission Control Protocol/lnternet Protocol (TCPIIP)-File Transfer
Protocol (FfP)-was also well established in the U.S., however,
and generally more popular than FTAM. FTPhas since taken over
from FTAM for most file transfer and is the established way of
downloading large files from Internet sites. It was thought that
FfAM would become the standard for EDI transfers but, again, it
became apparent that it was too cumbersome, and that was when
X.400 became popular for that. The difference in use between
X.400 (or any messaging system) and FTAM (or any other file
transfer protocol such as FfP), is that file transfer is real time
while X.400 is store and forward. With any store-and-forward
system, there can be long delays while the information gets
through the network-with FfAM and FTP any delays during
transmission are usually brief, but are variable depending upon
bottlenecks on a large system such as the Internet.
The Layer 7 protocol for network management, Common
Management Information Protocol (CMIP), is now an International Standard. CMIP is a communications protocol between the
agent process, and management agents at each managed OSI
node. The real work of managing network processes is located
within each node's managed objects at individual OSI layers. In
other words, each layer must have its own network management
system, which OSI does not specify. CMIP allows a centralized
management process to either modify the value of an attribute, or
request its value (read its status) at each of the layers. While
CMIP has been more or less superseded by the Simple Network

@ 1997 The McGraw-HiA Companies, Inc. Reproduction

Prohibited.

Delapro Infonnation Services Group. Delran NJ 08075 USA

2783

7

Standards

Management Protocol (SNMP) in the LAN, CMIP is still popular
for WAN management, showing once again how different the two
worlds can be. SNMP has taken up the structure for management
that OSI set up with CMIP and now does the job of managing
networks perfectly well. (For more information, see the OSI
Management section featured later in this report.)
Other Layer 7 protocols include distributed Transaction Processing (TP), designed to interconnect different transaction computing systems across OSI networks; Remote Database Access
(RDA), a protocol for integrating database management systems;
and Manufacturing Message Specification (MMS), ISO 9506, a
manufacturing protocol that requires extensions for specific
manufacturing device types.
Connection Methods
Every layer of the OSI Reference Model, except the Physical
Layer, supports both connection and connectionless mode (this is
one of the reasons the protocols are so complex and expensive to
implement-{)ther technologies are one or the other). Connection-oriented service requires a connection establishment phase, a
data transfer phase, and a connection termination phase; a logical
connection is set up between end systems prior to data exchange.
These phases define the necessary sequence of events for successful data transmission. Connection-oriented service capabilities include data sequencing, flow control, and transparent
error handling.
In a connectionless service, such as Switched Multi-megabit
Data Service (SMDS), each Protocol Data Unit (PDU) isjndependently routed to the destination; no connection establishment
activities are required, since each data unit is independent of the
previous or subsequent one. Connectionless-mode service transfers data units without regard to establishing or maintaining connections. In connectionless mode, transmission delivery is uncertain due to the possibility of errors. This appears contrary to the
goal of network design--users want to ensure that messages
reach their destination. In reality, connectionless-mode communication simply shifts responsibility for message integrity to a
higher layer, which checks integrity only once, rather than requiring checks at each lower layer. Alternatively, each data unit might
contain the error recovery mechanism.
In connection-oriented networking, such as ATM, a connection is established for the whole data stream just once, and all
packets or cells follow that path. There is now also what might be
thought of as a hybrid never dreamed of in OSI-IP switching,
where the first packet is examined but the rest follow the path of
the first through the switch, despite the connectionless nature of
the protocols involved. This depends on having a switched network. Multiprotocol Over ATM (MPOA) will perform the same
function when standardized late in 1997.
Lower-Layer Protocols
Lower-layer OSI protocols for Layers 1 through 3 are welldefined veterans and in many cases borrowed from existing EIA,
IEEE, or ITU-T standards_ Connectionless communications at the
lower layers of the OSI model is well established and is found, for
example, in LANs and metropolitan area networks (MANs).
While the original OSI model-described in ISO 7498-was
connection oriented, the ISO foresaw the need for connectionless service and issued an addendum to that protocol (ISO 74981
ADI). The ISO standard for Network Layer service, ISO 8348,
contains connectionless service (in ADl) in addition to the connection mode.

OSI Security
By definition, an open system is one that encourages communications between different applications or users. Unfortunately, an

On the Internet htlp://www.datapro.com

8

2783
Standards

open system can also encourage illegal eavesdropping and information theft or destruction. Notorious examples of white-<:ollar
crime, corporate espionage, and network intrusions by computer
worms and viruses have alarmed information processing professionals, and raised a general awareness of computer security issues. The concepts of information security and open systems are
antithetical; nevertheless, the ISO has taken steps to provide a
secure environment within the OSI Reference Model.
International Standard 7498, Part 2 addresses a security
architecture within the general OSI model. It describes security
measures that can be provided by specific layers in the model.
Specific security standards are not yet defined, however, but
are under study by working group JTC1, Subcommittee 27
for Information Technology Security Standards, plus other subcommittees.
SC2l, concerned with maintaining and defining the upper
three layers of the OSI Reference Model, stabilized several network management and security standards in 1991. The Security
model is composed of six frameworks that work together across
all seven layers of the OSI Reference Model: authentication,
access control, security audit, nonrepudiation, confidentiality,
and integrity.

OSI and MAP/TOP
The Manufacturing Automation Protocol and Technical Office
Protocol (TOP) were originally developed by General Motors and
Boeing Computer Services, respectively; to automate manufacturing functions on the factory floor and in the "back office." Both
are based on the OSI Reference Model, using formal standards
for each layer where possible. MAP, in particular, is probably the
best-known example of a formal multilevel OSI implementation
and is achieving substantial industry acceptance.
Version 3.0 added a Presentation Layer to the profile and
implemented a version of the Manufacturing Message Specification (MMS), the protocol for transferring factory and robotics
information, ISO 9506. Other Layer 7 protocols specified are
FfAM, Network Management, and Directory Service. Middle
layers implement ISO connection-oriented protocols, although
these must be bypassed for time-critical applications. At the lower
transport layers, MAP specifies the IEEE 802.4 token bus system
employing a Type F coaxial connection to a 75-ohm cable. Although MAP was taken up widely in some countries, notably
Japan, it has not been further pursued generally. LANs have
moved on and few new LANs use token bus or coaxial cable now
(except that in the new field of home LANs, coaxial cable is often
employed for its ease of use, but standard Ethernet is universally
installed here).

OSI and TCP/IP
Transmission Control ProtocollInternet Protocol was developed
by the U.S. government's Defense Advanced Research Projects
Agency (DARPA) for its research network, ARPANET. By 1986,
TCPIIP had gained a following of commercial users seeking a
protocol that could be used as a common denominator for multivendor computer networks. TCP and IP are actually two separate
protocols, occupying middle layers number Four (Transport) and
number Three (Network), respectively, of the OSI Reference
Model.
TCPIIP has been implemented on almost every type of computer and is especially successful in commercial Ethernet LAN
environments. The reason TCPIIP is so popular is because it is
free and its development was paid for by the U.S. government. It
avoids the connection-orientedlconnectionless dilemma by essentially avoiding it. OSI provides a richer set of network options,
but these may not be compatible in different networks. Users
On the Internet htlpitwww.datapro.com

ISO Reference Model
for Open Systems
Interconnection (OSil

Data Networking

cannot communicate across different networks if they implement
different options at these layers.
Despite OSI's early promise, a majority ·of networks no:w use
TCPIIP for LAN interconnectivity. The Internet, the. tool and
plaything "Of the 1990s that is ARPANET's grandchild, runs
almost exclusively on IP, though ATM is hidden now in the infrastructure, and we can expect this to increase as ever more bandwidth is needed. TCPIIP is also used for Ethernet LANs, and
Novell has recently withdrawn its proprietary IPX from new NetWare installations, preferring instead to migrate customers to
pure IP.

OSI Management
Since the first draft of the seven-layer ISO model was produced in
1978, extensions to the basic model have been developed to more
adequately represent all of the functions required by large-scale,
multivendor networking environments. OSI Management is an
extension to the original reference model that specifies transfer of
network management information in the Application Layer and
support for network management functions at Layers 4, 5, and 6.

Advantages and Disadvantages to OSI·Based
Network Management
In addition to solving the problem of managing heterogeneous
environments, OSI-based network management played a part in
bringing about a new phenomenon-the unbundling of network
management from network products. In a proprietary enVlron- .
ment, a given vendor's products are primarily manageable only
by products developed by that vendor. The promise of OS I helped
to split that one-to-one relationship, making it possible for any
OSI-based network management system (NMS) to manage any
OSI Management-conformant device. Despite being widely supported, CMIP has in the end lost out to SNMP in the LAN environment, but the initiative encouraged the widespread publication
of private Management Information Bases (MIBs) so that heterogeneous networks could be managed under SNMP. In the WAN,
CMIP is both widespread and popular. Here, there is not such an
open environment due to lack of customer demand for it, and such
interoperability as there is must be reliable. WAN management is
vital--LAN management is still often, wrongly, treated as a
lUXUry.
The market (both vendors and users)widely criticized ISO for
moving too slowly in its efforts to ratify OSI Management standards. Vendors are wisely unwilling to develop products based on
standards that are not yet final. In an effort to open the door to
new OSI~based network management system products, SC21
WG4 defined groups of network management functions that were
to be covered within OSI-based network management: fault, configuration, performance, accounting, and security management
specifications. These principles, if not the actual protocols, have
been established as the expected field to be covered by any network management system (NMS), and this is one of the areas that
OSI has changed networking profoundly.
Another disadvantage of standards-based network management is that OSI standards merely provide a menu of options.
There are numerouS gaps and ambiguities in OSI Management
standards that could be interpreted differently, leading to incompatible implementations.

Standards Documents
OSI Management standards can be broadly categorized into four

areas:
1.

Functions--what network management is, according to OSI

2.

Services--how network management functions are accomplished

e

1997 The McGraw-HRI Companies, Inc. Reproduction Prohibited.
Datapro Information Services Group. Delran NJ 08075 USA

Data Networking

3.
4.

ISO Reference Model
for Open Systems
Interconnection (OSI)

Information Structure-terms and categories describing
what is managed (e.g., "management information")
Protocols-describe means of transporting network management information

Taken together, these four areas describe a generic package for
network management systems, and how these products relate to
the network devices they manage (called managed objects in OSI
terminology).
A blueprint document, Management Framework OMNIPoint,
places the OSI Management environment in perspective by
describing terms and the scope of OSI network management.

OSI Management Functions
OSI Management functions are described in the Systems Management standards (IS 10040, IS 10164-1 through 10164-7, and
N 10164-8 through 10164-12). Management using three models:
1.

The Organizational Model---describes ways OSI Management can be distributed administratively

2.

The Information Model-provides guidelines for defining
managed objects and their interrelationships, classes, and
names

3.

The Functional Model-describes network management
functions

The Functional Model outlines how ISO has partitioned network
management into five functional areas: fault management, configuration and name management, performance management,
accounting management, and security management. ISO originally described each of these areas in its own standard. Further
studies revealed that functions overlapped; therefore, ISO reorganized the documents in December 1988 into their present Systems Management form.
Fault management provides the detection, isolation, and correction of abnormalities in network operation. Configuration
and name management facilities permit network managers to
control the configuration of the system, network, or layer entities.
Changed configurations may isolate faults, alleviate congestion,
or meet changing user needs. Performance management enables
the network manager to monitor and evaluate the performance of
the system, network, and layer entities. Data from performance
management may be used to initiate configuration changes and
diagnostic testing to allow a satisfactory level of performance.
Accounting management facilities help determine and allocate
costs for the use of a network manager's communications resources. Security management facilities permit the management
of those services providing access protection of communications
resources.

Services

(If"

Services are described, in part, in the Common Management Information Protocol (CMIP) standard, IS 9596. Services use
primitives, or command types, to accomplish network management functions. Examples of CMIP commands include GET,
SET, GET REPORT, CREATE, and DELETE. While service
primitives are somewhat abstract, they are important building
blocks for composite commands used by network management
applications to obtain vital data on the status and activity of network devices.
Common Management Infonnation Services (CMIS) include
a detailed abstract model of open systems management services.
These fall into three categories--event notification, information
transfer, and control. Event notification allows one system to notify another that some event of importance has occurred.

1997 The McGraw-Hili Companies. Inc. Reproduction Prohibited.
Datapro Infonnation Services Group. Delran NJ 08075 USA

@

2783

9

Standards

Information Structure
The most important standards in this category are Structure of
Management Information (SMI), Parts I, 2, and 4 (CD 1Ol6?-I,
-2, and -4). (Part 3 is not missing; rather, ISO merged Part 3 mto
Part 4.) Included in these standards is an explanation of the
object-oriented paradigm, used to model a network in terms of
object classes and attributes. In object-oriented environments, a
variable (for example, a variable called Bridge) is defined both in
terms of the operations that can be performed on it and the values
of attributes it can possess. For example, Bridge can have an
attribute such as Status, which may have a value of Busy; a network management system may obtain this value via a Get operation, or alter it via a Set operation.
Objects (including their attributes and operations) are stored
in a MIB, sometimes called an Object Library. The SMI documents just listed provide syntax and semantics for information in
the MIB; however, no single ISO standard defines exactly what
the OSI MIB will contain, nor how vendors and users can register
objects in the standard MIB.
In the TCPIIP world, an Internet Standard MIB exists for
objects managed using SNMP. This MIB functions in an analogous role to the proposed OSI MIB, although the administration
and rules governing the two are sure to differ.
MIB includes all information needed to make management
decisions. MIB is a conceptual repository of all OSI management
data in an OSI environment. The MIB concept does not imply any
form of physical or logical storage for management infonnation,
however, and its implementation is outside the scope of OSI standards. Rather, the SMI defines the abstract syntax and the semantics of information, so that it can be represented in OSI protocol
exchanges.

Protocols
Common Management Information Protocol, IS 9596, is the primary OSI Management protocol. CMIP specifies procedures for
the exchange of basic management information between open
systems interconnected by OSI protocols.
X.500.-The Directory
The Directory is a related standard designed to manage namerelated infonnation concerning protocol layers and network
nodes. These services connect the actual names used in the network with names and addresses understood by human users. The
Directory is defined in CD 9594.

OSI and the Future
The world needs a network of computers, similar to standards for
international telephony, to link users across oceans and continents. A few years ago, most industry analysts perceived OSI as
the answer. Although endorsed by such prominent vendors as
IBM, DIGITAL, and Hewlett-Packard, OSI's once-bright future
as the premier means of interconnecting multivendor computer
networks is now dimmed. Where OSI was too complex, slow, and
expensive, TCPIIP stepped in to fill the gaps. The OSI Reference
Model also had some technical glitches and holes that prevented
it from being widely implemented. These will probably never
now be repaired. As an internetworking protocol, TCPIIP has
proved its worth and is a popular and commercially succ~ssful
method of linking users across diverse networks. OSI IDlddlelayer protocols 3 through 5, the altematives to TCPIIP, are not as
simple to implement in the real world. SNMP, the network management protocol for TCPIIP networks, is also a proven, comm7rcially successful solution. As long as vendors and users requIre
practical networking products, they will continue using TCPIIPbased protocols-standard or not.

On 1he Internet: http:ltwww.datapro.com

10

2783
Standards

In reality, OSI and other layered architectures .do not serve
every application and are not a panacea. Proprietary architectures
, will continue to thrive alongside both de j(lCto and de jure standards-based networks, especially for closed user groups (where
internetworking is not a requirement) or in time-sensitive applications intolerant of layered protocols' high overhead,
All others who desire internetworking must realize that the
associated protocols are still evolving-nothing is truly cast in
iron. In market-based economies, products that do .not satisfy
market needs will not gain widespread favor. Therefore, prospective users must evaluate OSI protocols and their adoption with an

On the lniemet: http://www.datapro.com

ISO Reference Model
for Open Systems
Interconnection (OSI)

Data Networking

. eye toward future standards developments. As it stands now, OSI
will not be the interconnection standard of the future .. Significant
portions of it, however, have most certainly contributed to the
evolution of international standards. The OSI 7-Layer model itself, however, has proved itself over and over. This view of data
communication has become universally accepted, with even
SNA-which is layered differently-often explained in the OSI
model's terms. While the standards and protocols may not
develop, the structure has added greatly to a common understanding of networking and has now also stood the test of time. -

@

1997 The McGraw-Hil1 Companies. Inc. Reproduction Prohibited.

Datapro Information Services Group. Delran NJ 08075 USA

DATA PRO

Data Networking

2783

1

Standards

(

ISO Reference Model for
Open Systems
Interconnection (OSI)
In this report:

Datapro Summary

051 Standards Progress ..... 6

The goal of Open Systems Interconnection (OSI) is to enable dissimilar computers in mul-

051 Management ..•..•.........• 9
051 and the Future .....••..... 11

Note: This report updates
the OSI's status at all
seven layers; compares
OSI to other architectures;
rationalizes the need for
standards testing and verification; profiles major
testing organizations; and
outlines OSI Management
standards and status.

tivendor environments to share information transparently. The OSI structure calls for cooperation among systems of different manufacture and design. With this capability, global
digital networks can become a reality. There are seven layers of the OSI model that communicate between one end system and another. The layers cover nearly all aspects of information flow, from applications-related services provided at the Application Layer to the physical connection of devices to the communications medium at the Physical Layer. Although
all seven layers have long since been defined and ISO protocols ratified for each layer, the
ISO committees must keep refining and extending specific sections of the model by rewriting existing definitions and adding new protocols.

Analysis
The proliferation of computerized data processing systems in the late 1960s produced a need for
compatible data communications networks in
the 1970s. Several proprietary network architectures were developed for mainframe-to-tenninal
communications, including IBM's SNA in 1974.
Although many of these proprietary architectures were based on a layered model, none were
compatible with any other. The CClTf's X.25
host interface to the packet networks standard
was ratified in 1976 but is not a complete network architecture. In 1977 the International Organization for Standardization (ISO) formed
ISO Technical Committee 97 (TC97), Subcemmittee 16 (SC16), to embark on a worldwide
standardization effort and confront the issue of
incompatibility head-on. The pUIpOse of TC97/
SC 16 was to develop a model and define the protocols and interfaces required to support an open
system. The goal of OSI was, and still is, to enable dissimilar computers in multivendor environments to share infonnation transparently.
With this capability, global digital networks can
become a reality.

1993 McGraw-Hili, Incorporated. Reproduction ProhibRed.
Datapro Information Services Group. Delran NJ 08075 USA

@

The Open System
The ISO defines a system as a set of one or more
computers and associated software, peripherals,
terminals, human operators, physical processes,
infonnation transfer means, etc., which fonn an
autonomous whole capable of perfonning information processing and/or infonnation transfer.
An open system is one that obeys OSI standards
in its communication with other systems.
An application process is an element within a
system that performs infonnation processing for
a particular application. The application process
can be manual (a person operating a banking terminal), computerized (a program executing in a
computer center and accessing a remote database), or physical (a process control program executing in a dedicated computer attached to industrial equipment and linked to a plant control
system).
The OSI structure calls for cooperation
among systems of different manufacture and design. This includes coordinating activities such
as the following:
• Intetprocess communications-the synchronization between OSI application processes
and the exchange of infonnation
• Data representation-the creation and maintenance of data descriptions and transfonnations for refonnatting data exchanged between systems

JUNE 1993

2

ISO ~nc. Model tor

2783

Data Networking

Open Systems
Interconnection (OSI)

Standards

• Data storage---storage media, file systems, and database systems for providing access to and management of stored data
• Process and resource management-how application processes
are declared, initiated, controlled, and acquired
• Integrity and security-information processing constraints that
must be ensured during open systems operations
• Program support-the definition, compilation, testing, linking,
storage, and transfer of and access to programs executed by the
application processes
The OSI model is concerned only with the exchange of information between open systems.

The Layering Concept
Layering is a basic structuring technique used in the OSI model.
Each layer is composed of an ordered set of subsystems, with
logically related functions grouped together. The OSI model
breaks down internetworking activities between systems into two
distinct groups. Communications-oriented functions are separated from user-oriented functions; features which move information across a network are distinct from features which handle and
format information.
There are seven layers of the OSI model that communicate
between one end system and another end system. The layers
cover nearly all aspects of information flow, from applicationsrelated services provided at the Application Layer to the connection of devices to the communications medium at the Physical
Layer. Below the Physical Layer, the media itself corresponding
to "Layer 0"-such as wire, cable, or through-the-air communication-is currently not addressed by the model. Application,
Presentation, Session, Transport, Network, Data Link, and Physical Layers have been dermed (see Table 1). The model described
in Table 1 is OSI's seven layers with their purposes. In Table I,
information flows down from Layer 7 to Layer I, and then out
over a physical transmission medium. At the receiving end, the
information flows into another end system and up from Layer 1 to
Layer 7, until it is received by a user.

The seven layers can be divided into two functional groups:
the Transport Platform (Layers 1 to 4) and the Application Platform (Layers 5 to 7). The Transport Platform's function is to get
data from one system to another without errors. The Application
Platform's function is to interpret the data stream and present it to
the user in a usable form (see Figure 1).
Each layer contributes functions to the communications task.
For example, the Link Layer enables communications across a
single physical connection, while the Network Layer provides
end-to-end routing and data relay. Services at the upper-layer interface-providing communications to the next-higher layerare provided by each layer, usually described by a service specification for the layer. Services at each layer are provided by a
layer entity. Each layer entity communicates with its peer at the
same layer on another system, providing services specified in the
service specification.
Layers are sometimes divided into sublayers, for several reasons. Layer functions are often divided into separate modules to
handle the service interface of the layer beneath it. This avoids
"rewriting" the entire layer. For example, the Link Layer of the
IEEE 802 Local Area Network (LAN) standards is divided into a
Logical Link Control (LLC) sublayer and a Media Access Control (MAC) sublayer. The MAC sublayer depends on characteristics of the underlying Physical Layer. Any layer may originate a
message to fulfill its responsibilities. The message may not bypass any layer en route to its destination. If a message leaves the
node, it will end up in another node at the same layer that originated the message.
IBM's SNA is also a layered architecture, following rules of
layering similar to OSI and other layered architectures. There are
good reasons for layering: layering simplifies change; components inside a layer can be changed without affecting any other
layers in that node. Layers are like structured programming-but
for teleprocessing systems. Because there are rigid interfaces between levels, fewer people need to react to changes, allowing
them to be implemented faster. There is no better way of achieving complex functions. Layering allows each network function to

Table 1. The Seven Layers of OSI
Layer

Name

.Purpose

7

Application

Applications and application interfaces for
OSI networks. Provides access to lower-layer
functions and services.

6

Presentation

Negotiates syntactic representation for the
Presentation Layer and performs data
transformations.

5

Session

4

Transport

Coordinates connection and interaction
between applications. Establishes a dialog,
manages and synchronizes the direction of
dataflow.
Ensures end-ta-end data transfer between
applications, data integrity, and service
quality. Assembles data packets for routing
by Layer 3.

3

Network

Routes and relays data units among network
nodes.

2

Data Link

Transfers data units from one network node
to another over a transmission circuit.
Ensures data integrity between nodes.

Physical

Delimits and encodes the bits onto the
physical medium.

JUNE 1993

1993 McGraw-HiII.lncorporated. Reproduction Prohibited.
Oatapro Infomlation ServIces Group. Delran NJ 08075 USA

@

"'-'--

Data Networking

ISO Reference Model for

2783

Open Syatem.
Interconnection (OSI)

3

Standards

(
Standards Organizations and
Testing Agencies
Although standards are indispensable for computer internetworking, they are useless
unless vendor claims of compatibility can be tested and
users can be ensured of 00quiring products that comply
fully with the standards. In
general, vendor claims of
standards compatibility are
suspect unless verified by an
impartial testing agency. Additionally, compatibility claims
can mean different things to
different people. For users, it
is a good idea to probe vendor
claims of standards compatibility to determine what is
compatible with what, and at
what levels.
Several standards testing and
verification bodies have been
organized both here and
abroad by vendor consortiums, government agencies,
and independent organizations. They have found that
developing conformance
specifications, producing testing suites, and conducting
comprehensive testing are
complicated, expensive, and
time consuming. Regional differences can stymie attempts
at verification. The trend for
these organizations, therefore,
is to cooperate with each
other, sharing resources and

expertise. A primary objective
is demonstrating interoperability among different vendors;
i.e., proving that standards
really work and fostering enduser interest. Many agencies
have tried vainly to involve
more end users but are
backed primarily by the vendors.
In the U.S., primary testing
and certification agencies include the Corporation for
Open Systems (COS), the
National Institute of Science
and Technology (NIST), and
Bell Communications Research (Bellcore). Several
smaller organizations and certain vendors, however, also
offer testing services. Europe
is represented by the Standards Promotion & Application
Group (SPAG); Japan by the
Promoting Conference for OSI
(POSI). Standards organizations are listed below:
American National Standards Institute (ANSI)
1430 Broadway
New York, NY 10018
(212) 642-4900
ANSI X3 Secretariat
Computer and Business
Equipment Manufacturers
Assn. (CBEMA)

be made "transparent," unaware and independent of other functions at other layers, thus enabling any layer to be modified without changing the entire monolithic architecture.
Each layer may support one of several different protocols designed for specific network applications; the choice of a specific
protocol is optional, allowing users to tailor networks to their own
design. Each layer defines functions crucial to the communications process at that layer, independent of the other layers. However, a layer may perform functions hinging on functions performed in the layers immediately above or below. A layer can
only communicate with another device or network node at its peer
layer. Messages exchanged between peer layers are "enveloped"
with messages from other layers and passed through these other
layers on the way to their destination, picking up and then shedding these other protocol layers along the way. For example, if
layer seven at one end system must send a message to layer seven
at another, it must travel down through six layers at its own end

Ie 1993 McGraw-Hili, Incorporated. Reproduction prohibned.
Qatapro Information Services Group. Oelran NJ 08075 USA

Suite SOO, 311 First Street,
NW
Washington, DC 20001-2178
(202) 737-8888
Be" Communications Research (Be"core)
60 New England Avenue
Piscataway, NJ 08854-4196
(908) 699-2000
Customer Service Hot Line:
(800) 521-CORE
Corporation for Open Systems(COS)
Suite 400, 1750 Old Meadow
Road
McLean, VA 221 02-4306
(703) 883-2700
Telex: WU16503157578 MCI
UW
European Computer Manufacturers Assn. (ECMA)
Rue du Rhone 114
CH-1204 Geneva, Switzerland
(+41) 22 735 36 34
Telex: 413237 ECMA CH
Electronic Industries Assn.
(EIA)
1722 Eye Street NW, Suite
300
Washington, DC 20006
(202) 457-4900
International Organization
for Standardization (ISO)
1, Rue de Varembe
Case Postale 56
C8-1211 Geneva 20, Switzerland
(+41) 22 33 34 30
International Telegraph and
Telephone Consultative
Committee (CCITT)
General Secretariat
International Telecommunications Union (ITU)

Place des Nations
CH-1211 Geneva 20, Switzerland
(+41) 22 99 51 11
Fax: (+41) 22 33 72 56
Telex: 421 000 UIT CH
Institute of Electrical and
Electronics Engineers
(IEEE)
Headquarters
345 E. 47th Street
New York, NY 10017
(212) 70~7900
Fax (publications): (212) 70~
7682
IEEE Service Center
(published standards):
445 Hoes Lane, P.O. Box
1331
Piscataway, NJ 0885~1331
(908) 981-1393
Fax: (908) 981-9667
Telex: 833-233
OSINET
Mr. Jerry Mulvenna, Chairman
OSINET Steering Committee
NIST Building 225, Room
B217
Clopper Road
Gaithersburg, MD 20899
Standards Promotion & Application Group SA (SPAG)
Avenue Louise 149, Box 7
10SO Brussels, Belgium
(+32) 2 535 08 11
Telex: 20307 SPAG B
National Institute of Standards and Technology
(NIST)
U.S. Department of Commerce
Gaithersburg, MD 20899
(301) 97~2000

and then up through six layers at the other, until it reaches layer
seven at its opposite (peer) layer.
Each network node (a network user, computer, terminal) is
equipped with this layer mechanism. However, not all intermediate nodes need all seven layers. Network nodes, in particular,
must only route and transmit data packets-functions at the bottom three layers of the OSI model. Layer 4 through 7 functions
are not required and, therefore, not included in network node software. Data packets processed in these nodes reach only Layer 3
and are then routed elsewhere (see Figure 2). A node communicates with its peer in another node sending or receiving data. Data
transfer is routed from Layer 7 down to Layer 1 at the transmitting node, then along the network to Layer 1 at the receiving
node, and finally from Layer 1 up to Layer 7. Peer layers communicate by the same method.
.

JUNE 1993

ISO Refereltce Model for
OpenSyst_.
InterconneCtion (OSI)

2783

4

Standards

does not provide· services to a layer above it. Some of the services.
provided by this layer, other than information transfer,are the'-<_
following:
• .Identifying intended communications partners
• Determining current availability of the intended partners

Figure 1.
ApplictJlion tuUl Transport Divisions

7
AppHcation

6
Presentation

Application
Platform

5
Session

4
Transport

3
Network
2

Transport
Platform

Data Link
1

Physical
The seven layers are divided into two junctional groups.

The message initiated at the Application Layer is passed from
layer to layer, through the various OSI layers, encapsulating control information in the process. A fully encapsulated message enters the cable at Layer 1. The procedure is reversed at the receiving end. Each item of control information is processed at its
appropriate layer,and the message itself passes upto Layer 7.
Data transfer essentially is a packaging process at the transmitting
node and an unpackaging process at the receiving node.
The Lare,.
A number of objectives were considered by the reference model's
designers: to limit the number of layers to make the system engineering task of describing and integrating the layers as simple as
possible; to create boundaries between layers at points where the
description of services can be small and the number of interactions across each boundary is minimized; and to colleCt similar
functions in the same layer. Table 1 summarizes the OSI Reference Model's layers; more detailed descriptions follow for each
layeL
.
The Application Layer
The Application Layer (Layer 7) is the highest·layer, providing
the means for the application process to access the OSI environment. Its function is to serve as the passageway between application processes using Open Systems Interconnection to exchange
information; consequently, all application process parameters are
made known to the OSI environment through this layer.
All services directly usable by the application process (Le.,
systems and applications management functions) are provided by
the Application Layer. It differs from the other layers in that it
JUNE 1993

Data Networking

• Establishing the authority to communicate.
• Agreeing on responsibility for error recovery
• Agreeing on procedures for controlling datil integrity
The Presentation Layer
The Presentation Layer (Layer 6) allows an application·to interpret the meaning of information exchanged. Information is formatted and translated at this layer. Aspects of Layer 6 include data
syntax, which is the data to be transferred between layers, and the
presentation image syntax, which is the data structure that application entities refer to in their dialog, or the set of actions that may
be perfomied on the data structure.
Services provided to the Presentation Layer include the following:
• Transforming data syntax, primarily code and character set
conversion
• Transforming and selecting the presentation syntax, the adaptation and modification of the presentation data (the OSI view)

Functions within the Presentation Layer include session establishmentrequest; data transfer; negotiation and renegotiation of
data syntax and presentation image syntax; and sessiontermination request.
The ~OD Layer
The Session Layer (Layer 5) allows cooperating presentation entities to organize and synchronize their dialog and to manage data
exchange. It provides the following services:
• Session-connection establishment-creation of an exchange
between presentation entities
• Session-connection release
• Normal data exchange
• Expedited data exchange
• Interaction management-allowing presentation entities to
take turns exercising control functions

• Session-connection synchronization
• Exception reporting-permitting the presentation entities to be
notified of exceptional situations
• Activity management
The Transport Layer
The Transport Layer (Layer 4) provides transparent data flow
between session entities, freeing the Session Layer from responsibility for cost-effective and reliable data transfer. Layer 4 provides information interchange according to Ii user-specified reliability level and end-to-end control. Transport protocols transfer
information from one end of a physical connection to another and
ensure that it is delivered correctly. Layer 4 protocols are used
after a route has been established through the network by· the
network-layer protocol.

The services provided by this layer include the following:
• Transport-connection establishment to complete a connection
between session entities

1993 McGraw-HIlI. Incorporated. Reproduction Prohibited.
Datapro Infonnation Services Group; Delran NJ 08075 USA

@

."----

ISO Reference Model for
Open Systems
IntercOlHWCtlon (OSII

Data Networking

2783

5

Standards

Figure 2.

Message Movement Among OSI Layers

~

Message moves from Layer 7 through - - - - - - . .
the other layers to reach Layer 7
at the opposite end

7
Application

~------------------------------------------

6
Presentation

~------------------------------------------

5
Session

4
Transport

~------------------------------------------

~------------------------------------------

3
Network

--------------

2
Data Link

- -------------

1
Physical

ion~

Transmiss
Media \......_ _

..
..
..
..

-------------

..

3
Network

..
..

)

y--~

~-------------~

2
Data Link

~-------------

1
Physical

\.

End System

V

6
Presentation

5
Session

4
Transport

3
Network
2
Data Link
1
Physical

~-------------

I

I

7
Application

)

Network Node

I

\._--,.-~)

V

End System

Intermediate nodes in an OSI network require only bottom-layer functions o/the OSI model. Note how peer layers communicate only with their
peers; i.e.• Layer J talks to other lAyer Is but not to lAyer 2s.

• Data transfer, in accordance with the agreed quality of service
• Transport-connection release
The European Computer Manufacturers Assn. (ECMA) has defined this layer in its Transport Protocol standard, ECMA-72.
This standard has gained the support of a number of North American and European computer manufacturers.
The Network Layer
The Network Layer (Layer 3) provides the means to establish,
maintain, and tenninate connections between systems. Its basic
service is providing transparent data transfer between transport
entities.

The services provided by this layer encompass the following:
• Establishing network connections for transporting data between transport entities through network addresses

The Data Link Layer
Data Link Layer 2 provides the procedural and functional means
to establish, maintain, and release data link connections between
two network nodes or network entities and to transfer data fmmes
(or packets). This layer also detects and may correct errors that
occur in the Physical Layer.
Services provided by the Data Link Layer to the Network
Layer include data link connection, sequencing, error notification, flow control, and data unit transfer.
The Physical Layer
The lowest ofthe OSI layers is Physical Layer 1. It provides the
electrical, mechanical, functional, and proceduml chamcteristics
for activation, maintenance, and deactivation of a physical connection. Physical Layer standards specify physical interfaces
(connectors) connected by a physical medium.

Services provided by this layer include the following:

• Identifying connection endpoints
• Transferring network service data units
• Noting errors for reporting unrecovemble errors to the transport layer
• Sequencing network control data units

• Activating and deactivating physical connections
• Data circuit identification

• Flow control
• Releasing the network connection

• Fault condition notification

C 1993 McGraw-Hili. Incorporated. Reproduction Prohibited.
Datapro Information SeMces Group. Delran NJ 08075 USA

• Sequencing
• Transmitting physical service data units either synchronously
or asynchronously

JUNE 1993

6

2783
Standards

Abstract Syntax Notation One (ASN.1)
ASN.l is a specification language adopted for the OSI Reference
Model, giving standards developers a common method for defining syntax. ASN.l is somewhat analogous to grammatical rules
defining the English language, with the exception that it is not
procedural. Just as English grammar specifies notation (punctuation symbols) and word classifications (such as nouns and verbs),
ASN.l specifies the rules that help standards developers define
complex data types in terms of simple building blocks.
ASN.l was first formally described and published in 1984, in
the CCITI X.409 standard entitled "Message Handling Systems:
Presentation Syntax and Notation." It is now described (in less
readable fashion) in two later documents: CCITI X.208 (ISO
8824), entitled "Specification of Abstract Syntax Notation One
(ASN.l)," and X.2OO (ISO 8825), "Basic Encoding Rules for
Abstract Syntax Notation One (ASN.l)."
According to ASN.1, each fragment of information must possess a type and a value. For example:
• Device-Status could be a type (in this case, it is a Boolean
type)
• Zero or One are the possible values
This is specified in ASN.1 notation as such:
Device-Status ::= Boolean
Boolean ::- 1 (or 0)
This is a very simple example; ASN.1 is a powerful grammar,
capable of specifying very complex data types. Hence, it will
continue to be the grammar of choice for specifying open systems
standards and protocols.

OSI Standards Progress
There are four stages in the development cycle: working paper;
committee draft (CD), previously known as a draft proposal;
draft international standard (DIS); and international standard (IS).
A working paper is developed in the first stage. When it matures
and contains well-developed technical concepts, it is registered as
a CD. Passage advances the CD to the DIS level, and the document is considered sufficiently stable to serve as the basis of initial implementations. At the DIS level, the document is distributed for a 180-day ballot. The DIS may require multiple ballots. A
successful ballot elevates the DIS to the level of IS and completes
ISO's process.
The entire process usually takes between four and eight years.
A list of standards organizations associated with the OSI Reference Model is given at the end of this report.

The Evolution of OSI CommiHees
In the spring of 1977, ISO Technical Committee 97 (TC97)
formed a special subcommittee (SC16) charged with developing
an architectural model that would extend from applications-layer
communications clear down to the connection with the physical
interface. The first draft of the seven-layer OSI Reference Model
was completed in 1978. Between 1978 and 1983, the Basic Reference Model and many of the standards for the individual layers
approached or attained draft international standard status. By the
end of 1984, SC16 was reorganized to form Subcommittee 21
(SC21). Working groups within SC16 were also realigned.
The OSI Basic Reference Model became an international standard in 1984. During 1985 a number of vendors demonstrated
products that implemented these standards and, by the end of
1986, many of these products were commercially introduced.
In July 1987 the Joint Technical Committee for Information
Technology (JTel) was formed when ISOITC97 joined forces
JUNE 1993

ISO Reference MOctei for
Open Systems
Interc~lon (OSI)

Data Networking

with Technical Committee 83 (TC83) of the International Electrotechnical Commission (IEC). The me is a coalition of industrial
standards bodies that is co-located with the ISO in Geneva, Switzerland. The new JTCI held its first meeting in 1987. The standardization activities of SC21 report to JTC I.
SC21 is composed of member bodies (MBs) from 23 different
countries. Each MB has its own national standards organization;
for example, ANSI represents the United States in JTCI. The
individuals or "national correspondents" comprising the MB
delegations come from different groups including user organizations, manufacturing firms, government agencies, and common
carriers or PTfs. As such, they bring varying perspectives and
concerns to the committee sessions.
When an OSI committee or working group produces a document such as a CD, the document is circulated among the MBs for
a vote and to the liaison organizations (LOs) for review. LOs are
independent organizations which also have a vested interest in
OSI development. LOs provide comments on the content of OSI
documents but do not have voting privileges.

Status of OSI Protocols
Protocol standards for all seven layers of the OSI model have
been approved; however, OSI committees are refining and extending some standards as required and may add new standards at
specific layers (particularly Layer 7). Additionally, other standards groups-such as the CCITI, ANSI, and IEEE-may adopt
OSI protocol standards as their own and vice versa. Consequently, many OSI standards are known by more than one standard designation. Table 2 shows some major ISO protocols approved for each OSI layer and lists corresponding appellations
from ANSI, the CCITI, and the ECMA, where applicable.

OSI Applications Standards
ISO committees are working hard at Layer 7, the Application
Layer. In fact, OSI application standards are perceived as potentially powerful and versatile and are the driving force for OSI
market acceptance. We devote considerable space reviewing
some of the most important ones here.
In particular, the ISO electronic mail standard for message
handling systems (MHSs)-or CCITI X.400-is becoming popular in commercial implementations. Two versions, one in 1984,
and another in 1988, are draft international standards that have
not been ratified. The standard was given a big boost in 1989,
when the Aerospace Industry Assn. (AlA) adopted X.400 to interconnect its diverse electronic mail networks. Gateways to proprietary E-Mail systems were also developed that year, and dozens
of vendors have rolled out X.400-based products. Most public
E-Mail carriers have also adopted the standard and are migrating
to the 1988 version.
In addition, the ISO is adapting X.400 as the message medium
for electronic data interchange (EDI). In this context, X.400
would be used as the communications method to store and forward trade documents and business forms conforming to ANSI
X12, the European EDIFACT, and de facto EDI standards.
One component of successful E-Mail intemetworking is directory services (OS), commonly known as CCITI X.500. X.500
specifies an on-line directory for message communications, ultimately allowing network providers to map a common, interconnected directory of worldwide users. X.500 dictates naming conventions, how users access directory information, and what
services are available.
Since the 1988 standard is not flexible, SC21 WG4 is working
to ease the transition to the new 1992 version. Older 1985 X.500
systems will require a software modification to work with the
1992 version. Realistically, the vision of a worldwide messaging
directory probably will not be realized until the late 199Os.

1993 MoGraw-HiII, Incorporated. Reproduction Prohibited.
Datapro Infonnation services Group. Delran NJ 08075 USA

@

Data Networking

ISO Reference Model for

Standards

Interconnection (051)

f

7

2783

Open S,stems

Table 2. ISO Protocols and Equivalent Standards
Layer

ISO

7

8571 (FTAM)
10021 (MHS)
9041 (VT)
10026 (OTP)

Application

ANSI (1)

CCITT

ECMA

X.400

9594 (OS)
8613 (OOA)
9579 (ROA)
9596 (CMIP)

X.500
T.410 Series, T.73

6
Presentation

8823 (connection)
9596 (connectionless)

X.226

5
Session

8327 (connection)
9548 (connectionless)

X.225

X3.153

ECMA-75

4
Transport

8073 (TPO-TP4)
(connection)
860218072
(connectionless)

X.224

X3.140

ECMA-72

3
Network

8208 (Layers 1-3)
8348 (connection)
8473 (connectionless)
9542 (15-15)
8878 (use w/8208)
8880 (LAN)
8881 (X.25 on LANs)

X.25
X.213

7n6(LAPB)

X.25

2
OataUnk

Physical

ECMA-101

ECMA-92
(X.25)

3309 (HOLC)
8802.2-.7 (LAN)
(IEEE 802.2-.7)
9314 (FOOl)
2110 (EIA-2320)
4902 (EIA-449)
2593
4903

X3.66

ECMA-40
ECMA-82, -81, -90, -89

X3.148, X3.139, X3.166
V.24, V.28
V.24, V.28
V.35
X-Series interfaces,
Other V-Series

(1) No ANSI standards exist by policy in most instances, as U.S. follows International standards.

(C-

The OSI protocol pair for office automation, Office Document
Architecture (ODA) and Office Document Interchange Format
(ODIF), has been an international standard since 1988 (ISO
8613). It is also specified in the U.S. government's GOSIP standard. ODA and ODIF facilitate the exchange of office documents-such as letters, memoranda, and business reportsamong dissimilar systems. Moreover, the standard specifies the
formatting and exchange of compound documents-those containing combinations of text, images, and graphics. Several ISO

1993 McGraw-Hili. Incorpora1ed. Reproduction Prohibited.
Datapro Infonnation Services Group. Delran NJ 08075 USA

@

working groups are attempting to strengthen and extend the Standard in such areas as the inclusion of audio, spreadsheet data,
color graphics, document security, and various layout and presentation styles.
The OSI standard for sending and sharing data files-File
Transfer, Access, and Management (FfAM)-is also a finalized
international standard. It is a Layer 7 component of the Manufacturing Automation Protocol (MAP), which was developed from
networking efforts in .the manufacturing industry. FfAM has
spread quickly in Europe and has made significant progress in
domestic business applications. The file protocol used with
JUNE 1993

2783

8

Standards

Transmission Control Protocol/lntemet Protocol (TCP/IP)-File
Transfer Protocol (FfP)-is also well established in the U.S.,
however, and generally more popular than FTAM.
The Layer 7 protocol for network management, Common
Management Information Protocol (CMIP), is now an International Standard. CMIP is a communications protocol between the
agent process and management agents at each 'managed OSI
node. The real work of managing network processes is located
within each node's managed objects at individual OSI layers; in
other words, each layer must have its own network management
system, which OSI does not specify. CMIP allows a centralized
management process to either modify the value of an attribute or
request its value (read its status) at each of the layers. Definitions
and descriptions of management structures and managed information are contained in other OSI standards yet to be completed.
(For more information, see the OSI Management section featured
later in this report.)
Other Layer 7 protocols include distributed Transaction Processing (TP), designed to interconnect different transaction computing systems across OSI networks; Remote Database Access
(RDA), a protocol for integrating database management systems;
and Manufacturing Message Specification (MMS), ISO 9506, a
manufacturing protocol that requires extensions for specific manufacturing device types.
Connection Methods
Every layer of the OSI Reference Model, except the Physical
Layer, supports connection and connectionless mode. Connection-oriented service requires a connection establishment phase, a
data transfer phase, and a connection termination phase; a logical
connection is set up between end systems prior to data exchange.
These phases define the necessary sequence of events for successful data transmission. Connection-oriented service capabilities include data sequencing, flow control, and transparent error
handling.
In a connectionless service, such as new Switched Multimegabit Data Service (SMDS), each Protocol Data Unit is independently routed to the destination; no connection establishment
activities are required, since each data unit is independent of the
previous or subsequent one. Connectionless-mode service transfers data units without regard to establishing or maintaining connections. In connectionless mode, transmission delivery is uncertain due to the possibility of errors. This appears contrary to the
goal of network design-users want to ensure that messages
reach their destination. In reality, connectionless-mode communication simply shifts responsibility for message integrity to a
higher layer, which checks integrity only once, rather than requiring checks at each lower layer. Alternatively, each data unit might
contain the error recovery mechanism.
Lower-Layer Protocols
Lower-layer OSI protocols for Layers I through 3 are well-defmed veterans and in many cases borrowed from existing EIA,
IEEE, or CCITT standards. Connectionless communications at
the lower layers of the OSI model is well established and is found,
for example, in LANs and metropolitan area networks (MANs).
While the original OSI model-described in ISO 7498-was
connection oriented, the ISO foresaw the need for connectionless
service and issued an addendum to that protocol (ISO
7498/ADI). The ISO is now working to update the Connectionless Addendum, and CCITT SG VII pursues a parallel process.
The CCITT, however, has been reluctant to insert connectionlessmode data transmission concepts into CCITT X.200-its version
of the OSI model. The ISO standard for Network Layer service,
ISO 8348, contains connectionless service (in AD I) in addition to
the connection mode.

JUNE 1993

ISO Reference Model for
Open Systems

Data Networking

Interconnection (OSI)

OSI Security
By definition, an open system is one that encourages communications between different applications or users. Unfortunately, an
open system can also encourage illegal eavesdropping and information theft or destruction. Recently, notorious examples of
white-collar crime, corporate espionage, and network intrusions
by computer worms and viruses have alarmed information processing professionals and raised a general awareness of computer
security issues. The concepts of information security and open
systems are antithetical; nevertheless, the ISO has taken steps to
provide a secure environment within the OSI Reference Model.
International Standard 7498, Part 2 addresses a security architecture within the general OSI model. It describes security measures that can be provided by specific layers in the model. Specific security standards are not yet defined, however, but are
under study by working group JTCI, Subcommittee 27 for Information Technology Security Standards, plus other subcommittees.
SC21, concerned with maintaining and defining the upper
three layers of the OSI Reference Model, stabilized several network management and security standards in 1991. The Security
model is composed of six frameworks that work together across
all seven layers of the OSI Reference Model: authentication, access control, security audit, nonrepudiation, confidentiality, and
integrity. SC21 is working to establish two of the six security
standards as Draft International Standards (OISs), and the remaining four standards, which are working drafts, will progress
to CD status.

OSI and MAP/TOP
The Manufacturing Automation Protocol and Technical Office
Protocol (TOP) were originally developed by General Motors and
Boeing Computer Services, respectively, to automate manufacturing functions on the factory floor and in the "back office."
Both are based on the OSI Reference Model, using formal standards for each layer where possible. MAP, in particular, is probably the best-known example of a formal multilevel OSI implementation and is achieving substantial industry acceptance. Many
vendors now offer MAP 3.0 products, which have nearly eliminated proprietary "shop floor" automated factory solutions.
Today, manufacturing networking standards are directed by
the MAPITOP users group. MAP Version 3.0 was released in June
1988 and will remain free from major changes until 1994. Version
3.0 added a Presentation Layer to the profile and implemented a
version of the Manufacturing Message Specification (MMS), the
protocol for transferring factory and robotics information, ISO
9506. The ISO is currently working to extend MMS in support of
realtime applications. Other Layer 7 protocols specified are
FTAM, Network Management, and Directory Service. Middle
layers implement ISO connection-oriented protocols, although
these must be bypassed for time-critical applications. At the lower
transport layers, MAP specifies the IEEE 802.4 token bus system
employing a Type F coaxial connection to a 75-ohm cable.

OSI and TCP/IP
Transmission Control Protocol/lntemet Protocol was developed
by the U.S. government's Defense Advanced Research Projects
Agency (DARPA) for its research network, ARPANET. By 1986,
TCP/IP had gained a following of commercial users seeking a
protocol that could be used as a common denominator for multivendor computer networks. TCP and IP are actually two separate
protocols, occupying middle layers number Four (Transport) and
number Three (Network), respectively, of the OSI Reference
Model.

1993 McGraw-Hill. Incorporated. Reproduction Prohibited.
Datapro Information Services Group. Delran NJ 08075 USA

@

Data Networking

ISO Reference Model for

Open Syatem.
Interconnection (Ostl

TCP/IP has been implemented on almost every type of computer and is especially successful in commercial Ethernet LAN
environments. The reason TCP/IP is so popular is because it is
free and its development was paid for by the U.S. government. In
fact, it is actually more complex than TP4. It avoids the connection-orientedlconnectionless dilemma by essentially avoiding it.
OSI provides a richer set of network options, but these may not be
compatible in different networks. Users cannot communicate
across different networks if they implement different options at
these layers.
Already, some proprietary stripped-down versions of OSI
have been developed to operate over TCP/IP, and some pundits
believe that TCP/IP will evolve to resemble OSI in the future.
TCP/IP's future could have been jeopardized, since the U.S. government mandated OSI compliance in government procurements,
had it not been for Novell's introduction earlier this year of a new
version of its NetWare network operating software that supports
TCP/IP.
A majority of users still use TCP/IP networks for LAN interconnectivity. However, the consensus is that TCP/IP is not the
ultimate solution-a feat attributed to OSI. The trend is toward a
migration to OS I-based applications running on a TCP/IP infrastructure. As a result, more vendors, including Unisys and Amdahl, are introducing products that support multiple protocols.

OSI Management
Since the first draft of the seven-layer ISO model was produced in
1978, extensions to the basic model have been developed to more
adequately represent all of the functions required by large-scale,
multivendor networking environments. OSI Management is an
extension to the original reference model that specifies transfer of
network management information in the Application Layer and
support for network management functions at Layers 4, 5, and 6.
Advantages to OSI·Based Network
Management
OSI-based network management continues to capture attention as
the premier solution for multivendor network management. Vendors such as AT&T, Digital Equipment, Hewlett-Packard, and
NCR are now designing their network management architectures
to accommodate OSI Management standards and protocols.
In addition to solving the problem of managing heterogeneous
environments, OSI-based network management will bring about
a new phenomenon-unbundling network management from network products. In a proprietary environment, a given vendor's
products are primarily manageable only by products developed
by that vendor. Widespread use of OSI will split that one-to-one
relationship, making it possible for any OS I-based network management system (NMS) to manage any OSI Management-conformant device.
Disadvantages to OSI·Baseci Network
Management
The market (both vendors and users) has widely criticized ISO for
moving too slowly in its efforts to ratify OSI Management standards. Indeed, the greatest disadvantage to OS I-based network
management is that the demand for it far exceeds the available
products-and vendors are wisely unwilling to develop products
based on standards that are not yet final. In an effort to open the
door to new OSI-based network management system products,
SC21 WG4 is currently working to finalize fault, configuration,
performance, accounting, and security management specifications. These standards will assist in differentiating OSI-based systems from Simple Network Management Protocol (SNMP)-based
products.

«>

1993 McGraw-Hili, IncO!pOrated. Reproduction Prohibited.
Oatapro Information Services Group. Oelran NJ 08075 USA

2783

9

Standards

Another disadvantage to standards-based network management is that OSI standards merely provide a menu of options.
There are numerous gaps and ambiguities in OSI Management
standards that could be interpreted differently, leading to incompatible implementations. Industry consensus is the only hope for
interoperable implementations. Currently, this consensus is building around the Network Management Forum and the Network
Management Special Interest Group (NMSIG) of the OIW, sponsored by NIST and the IEEE. The NMSIG is developing Implementation Agreements (lAs) based on emerging network management standards. lAs are being introduced in phases that
coincide with ISO/IEC standards as they progress from CD to
international standards. The OIW NM Phase I IA became stable
in December 1990.
To further simplify government procurement of network management products, NIST introduced a proposal in 1991, called the
Government Network Management Profile (GNMP). GNMP will
also be introduced in phases that will cross-reference the latest
GOSIP versions. GNMP Phase I, II, and III will address the following categories of management information:
• Phase I-IEEE 802 LAN standards, X.25, ISDN, FDOI, modems, mUltiplexers, bridges, and the physical link of the OSI
model.
• Phase II-protocol software operating in Layers 3 to 7, routers,
terminal servers, MTAs, PBX, and circuit switches.
• Phase I1I--applications, services, operating systems, computers, networks, and database management systems.
GNMP Phase I specifies CMISIP, management definitions in
GNMP section 4, and five systems management functions: object
management function, state management function, attributes for
representing relationships, alarm reporting, and event reporting.
Since SNMP is already widely implemented, it is likely that
SNMP will be deployed to manage routers. Future versions of
GNMP will specify a network management architecture incorporating both SNMP and GNMP protocols.
Standards Documents
OSI Management standards can be broadly categorized into four
areas:
1. Functions--what network management is, according to OSI
2. Services--how network management functions are accomplished
3. Information Structure-terms and categories describing
what is managed (e.g., "management information")
4. Protocols--describe means o!transporting network management information
Thken together, these four areas describe a generic package for
network management systems, and how these products relate to
the network devices they manage (called managed objects in OSI
terminology).
A blueprint document, Management Framework OMNIPoint,
places the OSI Management environment in perspective by describing terms and the scope of OSI network management.
051 Management Functions
OSI Management functions are described in the Systems Management standards (IS 10040, IS 10164-1 through 10164-7, and
N 10164-8 through 10164-12). Management using three models:
1. The Organizational Model-describes ways OSI Management can be distributed administratively

JUNE 1993

ISO Reference Model for

2783

10

Data Networking

Open Systems
Interconnection 10SI)

Standards

Figure 3.
ISDN Through OSI Eyes

7

6

Application-related functions

Encryption/decryption

etc•

Compression/expansion

....

Q)

>as

U)

1~
.2> c:

5

Session
connection
establishment

:I:.2

Session
connection
release

Layer 4
connection
multiplexing

4

Routing/
relaying

Session
Session
Session
connection
transport conmanagement
synchronization nection mappina
Layer 4
connection
establishment

Network
connection
establishment

Data link
connection
establishment

Data link
congestion
release

Physical
layer connection
activation

Physical layer
connection
deactivation

Layer 4
connection
release

etc.

Error
detection/
recovery

Flow
control

Network
Network
connection connection
release
multiplexing

Congestion
control

Addressing

etc.

Flow
control

Error
control

Sequence
control

Framing
synchronization

etc.

Bit transmission

Channel
structure
multiplex

Segmenting
blocking

etc.

etc.

ISDN functions allocated according to Ioyering principles ofRecommendation X.200.

2.

The Infonnation Model-provides guidelines for defining
managed objects and their interrelationships, classes, and
names
3. The Functional Model-describes network management
functions

The Functional Model outlines how ISO has partitioned network
management into five functional areas: fault management, configu~tion and name management, perfonnance management, accountmg management, and security management. ISO originally
described each of these areas in its own standard. Further studies
revealed that functions overlapped; therefore, ISO reorganized
the documents in December 1988 into their present Systems
Management fonn.
Fault management provides the detection, isolation, and correction of abnonnalities in network operation. Configuration and
name management facilities pennit network managers to control
the configuration of the system, network, or layer entities.
Changed configurations may isolate faults, alleviate congestion,
or meet changing user needs. Perfonnance management enables
the network manager to monitor and evaluate the perfonnance of
the system, network, and layer entities. Data from perfonnance
management may be used to initiate configuration changes and
diagnostic testing to allow a satisfactory level of perfonnance.
Accounting management facilities help detennine and allocate
costs for the use of a network manager's communications resources. Security management facilities pennit the management
of those services providing access protection of communications
resources.

JUNE 1993

Service.
Services are described, in part, in the Common Management Infonnation Protocol (CMIP) standard, IS 9596. Services use primitives, or command types, to accomplish network management
functions. Examples of CMIP commands include GET, SET,
GET REPORT, CREATE, and DELETE. While service primitives are so~ewhat abstract, they are important building blocks
for composite commands used by network management applications to obtain vital data on the status and activity of network
devices.
Common Management Infonnation Services (CMIS) include
a detailed abstract model of open systems management services.
These fall into three categories-event notification, infonnation·
transfer, and control. Event notification allows one system to notify another that some event of importance has occurred.

Information Stftlcture
The most important standards in this category are Structure of
Management Infonnation (SMI), Parts 1,2, and 4 (CD 10165-1,
-2, and -4). (part 3 is not missing; rather, ISO merged Part 3 into
Part 4.) Included in these standards is an explanation of the object-oriented paradigm, used to model a network in tenns of object classes and attributes. In object-oriented environments a
variable (for example, a variable called Modem) is defined ~th
in tenns of the operations that can be perfonned on it and the
values of attributes it can possess. For example, Modem can have
an attribute such as Status, which may have a value of On-Line or
Off-Line; a network management system may obtain this value
via a Get operation or alter it via a Set operation.
Objects (including their attributes and operations) are stored
in a Management Information Base (Mffi), sometimes called an
Object Library. The SMI documents just listed provide syntax

o 1993 McGraw-Hill. Incorporaled. RlIProduc1lon Prohibited.
Datapro Information Servlc;es Group. 0eI1'lIll NJ 08076 USA

Data Networking

ISO Reference Model for
Open Systems
Interconnection lOSI)

and semantics for information in the MIB; however, as yet no
single ISO standard defines exactly what the OSI MIB will contain, nor how vendors and users will register objects in the standard MIB. SC21 WG4 is currently working to finalize the SMI,
providing guidelines that can be used to define management objects and their attributes. The final SMI will ensure interoperability among OSI-based network management systems.
In the TCP/IP world, an Internet Standard MIB exists for objects managed using SNMP. This MIB functions in an analogous
role to the proposed OSI Mm, although the administration and
rules governing the two are sure to differ.
MIB includes all information needed to make management
decisions. Mm is a conceptual repository of all OSI management
data in an OSI environment. The MIB concept does not imply any
form of physical or logical storage for management information,
however, and its implementation is outside the scope of OSI standards. Rather, the SMI defines the abstract syntax and the semantics of information so that it can be represented in OSI protocol
exchanges.

Protocols
Common Management Information Protocol, IS 9596, is the primary OSI Management protocol. CMIP specifies procedures for
the exchange of basic management information between open
systems interconnected by OSI protocols. CMIP is intended to be
a general-purpose management protocol suitable for the management of both OSI resources and the real resources used to provide
communications services.

X.500-The Directory
The Directory is a related standard designed to manage namerelated information concerning protocol layers and network
nodes. These services connect the actual names used in the network with names and addresses understood by human users. The
Directory is defined in CD 9594 and several other OSI working
drafts. CD 9594 attained DIS in March 1988.

OSI and the Future
The world needs a network of computers, similar to standards for
international telephony, to link users across oceans and continents. A few years ago, most industry analysts perceived OSI as
the answer. Although endorsed by such prominent vendors as
IBM, Digital, and Hewlett-Packard, OSI's future as the premier

2783
Standards

11

means of interconnecting multivendor computer networks is now
uncertain. The tremendous growth of the Internet has given
TCP/IP a firm base in the United States and the protocol has also
been making significant strides in Europe. OSI applications protocols, such as CCITI X.400, X.500, and EDI, are still very popular, however, and lend support to OSI.
The OSI Reference Model has some glitches and holes that
prevent it from being widely implemented. In the U.S., OSI and
TCPIIP proponents are badly divided. As an internetworldng protocol, TCP/IP has proved its worth and is a popular and commercially successful method oflinking users across diverse networksparticularly LANs. OSI middle-layer protocols 3 through 5, the
alternatives to TCP/IP, are not as simple to implement in the real
world. SNMP, the network management protocol for TCP/IP networks, is also a proven, commercially successful solution. As
long as vendors and users require practical networking products,
they will continue using TCP/IP-based protocols-standards or
not.
OSI will most likely evolve to better serve user needs, with an
OSI-TCP/IP hybrid a likely compromise. A possible scenario for
wider OSI acceptance is that TCP/IP middle layers will migrate to
resemble OSI, at least functionally. In many commercial networking applications, however, vendors are blending different
protocol stacks from different sources to match user needs. For
instance, one vendor's network protocol might graft together different layers from OSI, TCP/IP, and IBM's SNA.
In reality, OSI and other layered architectures do not serve
every application and are not a panacea. Proprietary architectures
will continue to thrive alongside OSI-based networks, especially
for closed user groups (where internetworking is not a requirement) or in time-sensitive applications intolerant of layered protocols' high overhead.
All others who desire internetworking must realize that the
associated protocols are still evolving-nothing is truly cast in
iron. In market-based economies, products that do not satisfy
market needs will not gain widespread favor. Therefore, prospective users must evaluate OSI protocols and their adoption with an
eye toward future standards developments. As it stands now, OSI
will not be the interconnection standard of the future. Significant
portions of it, however, will most certainly contribute to the evolution of an international standard. -

(
1993 McGraw-Hili, Incorporated. Reproduction Prohibited.
Datapro Infonnation Services Group. Delran NJ 08075 USA

@

JUNE 1993

DATAPRO

Data Networking

2783

1

Standards

ISO Reference Model for
Open Systems
Interconnection (OSI)
In this report:

Synopsis

The Open
System ........................... 2

Editor's Note
The goal of Open Systems Interconnection (OSI) is to enable dissimilar
computers in multi vendor environments to share information transparently. The OSI structure calls for ,
cooperation among systems of different manufacture and design. With
this capability, global digital networks can become a reality.

OSI Standards
Progress ...................... 10
OSI and Other
Network
Architectures ................ 14
Testing and Verification
Agencies ...................... 16
OSI
Management ................ 18
OSI and the
Future ........................... 21

There are seven layers of the OSI
model that communicate between
one end system and another. The
layers cover nearly all aspects of information flow, from applicationsrelated services provided at the
Application Layer to the physical
connection of devices to the communications medium at the Physical
Layer.

@ 1991 McGraw-Hili, Incorporated. Reproduction Prohibited.
Datapro Information Services Group. Delran NJ 08075 USA

o

Although all seven layers have long
since been defined and ISO protocols
ratified for each layer, the ISO committees must keep refining and redefining specific sections of the model
by rewriting existing definitions and
adding new protocols.
Report Highlights
This report updates the OSI's status
at all seven layers; gives the status of
OSI standards progress; compares
OSI to other architectures, including
ISDN, SNA, DECnet, MAP/TOP,
and TCP/IP; rationalizes the need
for standards testing and verification; profiles major testing organizations; and outlines OSI Management
standards and status.

AUGUST 1991

2

2783
Standards

Analysis

ISO Reference Model for
Open Systems
Interconnection (OSI)

Data Networking

TheOSI structure calls for cooperation
among systems of different manufacture and design. This includes coordinating activities such as
the following:
• Interprocess communications-the synchronization between OSI application processes and
the exchange of information

The proliferation of computerized data processing
systems in the late 1960s produced a need for compatible data communications networks in the
1970s. Several proprietary network architectures
were developed for mainframe-to-terminal communications, including IBM's SNA in 1974. Although many of these proprietary architectures
were based on a layered model, none were compatible with any other. The CCITT's X.25 host interface to the packet networks standard was ratified
in 1976 but is not a complete network architecture.
In 1977, the International Organization for Standardization (ISO) formed ISO Technical Committee 97 (TC97), Subcommittee 16 (SC16), to
embark on a worldwide standardization effort and
confront the issue of incompatibility head-on. The
purpose of TC97/SC16 was to develop a model and
define the protocols and interfaces required to support an open system. The goal of Open Systems
Interconnection (OSI) was, and still is, to enable
dissimilar computers in multivendor environments
to share information transparently. With this capability, global digital networks can become a reality.

The Open System
The ISO defines a system as a set of one or more
computers and associated software, peripherals,
terminals, human operators, physical processes,
information transfer means, etc., which form an
autonomous whole capable of performing information processing and/or information transfer. An
open system is one that obeys OSI standards in its
communication with other systems.
An application process is an element within a
system that performs information processing for a
particular application. The application process can
be manual (a person operating a banking terminal),
computerized (a program executing in a computer
center and accessing a remote database), or physical (a process control program executing in a dedicated computer attached to industrial equipment
and linked to a plant control system).
AUGUST 1991

• Data representation-the creation and maintenance of data descriptions and transformations
for reformatting data exchanged between systems
• Data storage-storage media, file systems, and
database systems for providing access to and
management of stored data
• Process and resource management-how application processes are declared, initiated, controlled, and acquired
• Integrity and security-information processing
constraints that must be ensured during open
systems operations
• Program support-the definition, compilation,
testing, linking, storage, and transfer of and access to programs executed by the application
processes
The OSI model is concerned only with the exchange of information between open systems.
The Layering Concept

Layering is a basic structuring technique used in
the OSI model. Each layer is composed of an ordered set of subsystems, with logically related functions grouped together. The OSI model breaks
down internetworking activities between systems
into two distinct groups. Communicationsoriented functions are separated from useroriented functions; features which move
information across a network are distinct from features which handle and format information.
There are seven layers of the OSI model that
communicate between one end system and another
end system. The layers cover nearly all aspects of
information flow, from applications-related services provided at the Application Layer to the connection of devices to the communications medium
at the Physical Layer. Below the Physical Layer,
the media itself corresponding to "Layer 0"-such
as wire, cable, or through-the-air communicationis currently not addressed by the model.
~

1991 McGraw-HiII,lncorporated. Reproduction Prohibited.
Datapro Information Services Group. Delran NJ 08075 USA

@

/

Data Networking

ISO Reference Model for
Open Systems
Interconnection (OSI)

Standards Organizations and
Testing Agencies

r
'I r

',-

Although standards are
indispensable for computer internetworking,
they are useless unless
vendor claims of compatibility can be tested and
users can be assured of
acquiring products that
comply fully with the standards. In general, vendor
claims of standards compatibility are suspect unless verified by an
impartial testing agency.
Additionally, compatibility
claims can mean different
things to different people.
For users, it is a good
idea to probe vendor
claims of standards compatibility to determine
what is compatible with
what, and at what levels.
Several standards testing
and verification bodies
have been organized both
here and abroad by vendor consortiums, government agencies, and
independent organizations. They have found
that developing conformance specifications, producing testing suites, and
conducting comprehensive testing is complicated, expensive, and
time consuming. Regional
differences can stymie
attempts at verification.
The trend for these organizations, therefore, is to
cooperate with each
other, sharing resources

and expertise. A primary
objective is demonstrating
interoperability among
different vendors; i.e.,
proving that standards
really work and fostering
end-user interest. Many
agencies have tried vainly
to involve more end users
but are backed primarily
by the vendors.
In the U.S., primary testing and certification agencies include the
Corporation for Open
Systems (COS), the National Institute of Science
and Technology (NIST),
and Bell Communications
Research (Bellcore). Several smaller organizations
and certain vendors, however, also offer testing
services. Europe is represented by the Standards
Promotion & Application
Group (SPAG); Japan by
the Promoting Conference for OSI (POSI). Standards organizations are
listed below:
American National Standards Institute (ANSI)
1430 Broadway
New York, NY 10018
(212) 642-4900
ANSI X3 Secretariat
Computer and Business
Equipment Manufacturers
Association (CBEMA)
Suite 500, 311 First
Street, NW

2783

3

Standards

Washington, DC 200012178
(202) 737-8888
Bell Communications Research (Bellcore)
60 New England Avenue
Piscataway, NJ 088544196
(908) 699-2000
Customer Service Hot
Line:
(800) 521-CORE
Corporation for Open
Systems (COS)
Suite 400, 1750 Old
Meadow Road
McLean, VA 22102-4306
(703) 883-2700
Telex: WUI 6503157578
MCIUW
European Computer
Manufacturers Association(ECMA)
Rue du Rhone 114
CH-1204 Geneva, Switzerland
(+41) 22 735 36 34
Telex: 413237 ECMA CH
Electronic Industries Association (EIA)
1722 Eye Street NW,
Suite 300
Washington, DC 20006
(202) 457-4900
Intemational Organization for Standardization
(ISO)
1, Rue de Varembe
Case Postale 56
CS-1211 Geneva 20,
Switzerland
(+41) 22 33 34 30
Intemational Telegraph
and Telephone Consultative Committee (CCITT)
General.8ecretariat
International Telecommunications Union (ITU)
Place des Nations

CH-1211 Geneva 20,
Switzerland
(+41)22995111
Fax: (+41) 22 33 72 56
Telex: 421 000 UIT CH
Institute of Electrical and
Electronics Engineers
(IEEE)
Headquarters
345 E. 47th Street
New York, NY 10017
(212) 705-7900
Fax (publications): (212)
705-7682
IEEE Service Center
(published standards:)
445 Hoes Lane, P.O. Box
1331
Piscataway, NJ 088551331
(908) 981-1393
Fax: (908) 981-9667
Telex: 833-233
OSINET
Mr. Jerry Mulvenna,
Chairman
OSINET Steering Committee
NIST Building 225, Room
B217
Clopper Road
Gaithersburg, MD 20899
Standards Promotion"
Application Group sa
(SPAG)
Avenue Louise 149, Box 7
1050 Brussels, Belgium
(+32) 2 535 0811
Telex: 20307 SPAG B
National Institute of Standards and Technology
(NIST)
U.S. Department of Commerce
Gaithersburg, MD 20899
(301) 975-2000

("
1991 McGraw-Hili. Incorporated. Reproduction Prohibited.
Datapro Information Services Group. Delran NJ 08075 USA

@

AUGUST 1991

4

ISO Reference Mode' for
Open S,stems
Interconnection (OSI)

2783
Standards

~

(Analysis continued)

model. Application, Presentation, Session, Transport, Network, Data Link, and Physical Layers
have been defined (see Table 1). The model represented by Table 1 is only one end system, in this
case the transmitting end; most networks have at
least two end systems. In Table 1, information
flows down from Layer 7 to Layer 1, and then out
over a physical transmission medium. At the receiving end, the information flows into another
7, until it
end
. system and up from Layer 1 to Layer
.
IS received by a user.
The seven layers can be divided into two
functional groups: the Transport Platform (Layers
1 to 4) and the Application Platform (Layers 5 to
7). The Transport Platform's function is to get data
from one system to another without errors. The
Application Platform's function is to interpret the
datastream and present it to the user in a usable
form (see Figure 1).
Each layer contributes functions to the communications task. For example, the Link Layer enables communications across a single physical
connection, while the Network Layer provides endto-end routing and data relay. Services at the upper
Figure 1.
Application and Transport Divisions
7
Application
6
Presentation

Application
Platform

5
Session

4
Transport

3
Network

Transport
Platform

2
Data Link

1
Physical

Data Networking

layer interface-providing connection to the nexthigher layer-are provided by each layer, usually
described by a service specification for the layer.
Services at each layer are provided by a layer entity. Each layer entity communicates with its peer
at the same layer on another system, providing services specified in the service specification.
Layers are sometimes divided into sublayers,
for several reasons. Layers often need sublayers to
handle the service interface of the layer beneath it.
This avoids "rewriting" the entire layer. For example, the Link Layer of the IEEE 802 Local Area
Network (LAN) standards is divided into a Logical
Link Control (LLC) sublayer and a Media Access
Control (MAC) sub layer. The MAC sublayer depends on characteristics of the underlying physical
layer. Layer independence and modularity are promoted by ensuring that layer entities on one system
are not permitted to communicate with nonpeers
on another OSI system.
IBM's SNA is also a layered architecture, following rules of layering common to OSI and other
layered architectures. Any layer may originate a
message to fulfill its responsibilities. The message
may not bypass any layer en route to its destination. If a message leaves the node it will end up in
another node at the same layer that originated the
message.
There are good reasons for layering: layering
simplifies change; components inside a layer can
be changed without affecting any other layers in
that node. Layers are like structured programmingbut for teleprocessing systems. Because there
are rigid interfaces between levels, fewer people need to react to changes, allowing them to be
implemented faster. There is no better way of
achieving complex functions. Layering allows each
network function to be made "transparent," unaware and independent of other functions at other
layers, thus enabling any layer to be modified without changing the entire monolithic architecture.
Each layer may support one of several different protocols designed for specific network applications; the choice of a specific protocol is optional,
allowing users to tailor networks to their own design. Each layer defines functions crucial to the
communications process at that layer, independent
ofthe other layers. However, a layer may perform
functions hinging on functions performed in the
layers immediately above or below. A layer can

The seven layers are divided into two functional groups.
AUGUST 1991

1991 McGraw-HiII,lncorporated. Reproduction Prohibited.
Datapro Information Services Group. Delran NJ 08075 USA

@

ISO Reference Mode. for
Open Systems
Interconnection (OSII

Data Networking

2783

5

Standards

Figure 2.
Message Movement among OS] Layers

~

Message moves from Layer 7 through ~
the other layers to reach Layer 7
at the opposite end
r----------,

r-----~~~

7

7

Application

Application

6
Presentation

Presentation

5
Session

Session

4
Transport

4
Transport

6
5

3

3

3

Network

Network

Network

2

2

2

Data Link

Data Link

Data Link

1
Physical

1
Physical

1
Physical

'---y---J

'---y---J

Network Node

End System

Transmission
Media

'---y---J
End System

Intermediate nodes in an OS] network require only bottom-layer functions ofthe OSI model. Note how peer layers communicate only with their peers; i.e., Layer I talks to other Layer Is but not to Layer 2s.

only communicate with another device or network
node at its peer layer. Messages exchanged between
peer layers are "enveloped" with messages from
other layers and passed through these other layers
on the way to their destination, picking up and
then shedding these other protocol layers along the
way. For example, if layer seven at one end system
must send a message to layer seven at another, it
must travel down through six layers at its own end
and then up through six layers at the other, until it
reaches layer seven at its opposite (peer) layer.
Each network node (a network user, computer, terminal) is equipped with this layer mechanism. However, not all intermediate nodes need all
seven layers. Network nodes, in particular, must
only route and transmit data packets-functions at
the bottom three layers of the OSI model. Layer
four through seven functions are not required and
therefore not included in network node software.
Data packets processed in these nodes reach only
Layer 3 and are then routed elsewhere (see Figure
1991 McGraw-Hili, Incorporated. Reproduction Prohibited.
Datapro Information Services Group. Delran NJ 08075 USA

@

2). A node communicates with its peer in the node
sending or receiving data. Interfaces within nodes
allow them to accept, process, and route data. Data
transfer is routed from Layer 7 down to Layer 1 at
the transmitting node, then along the network to
Layer 1 at the receiving node, and finally from
Layer 1 up to Layer 7. Peer layers communicate by
the same route.
The message initiated at the transmitting
node (Layer 7) is passed from layer to layer, each
layer adding control information, if required, and
acting in accord with control information from its
peer in the receiving node. A fully prepared message enters the cable at Layer 1. The procedure is
reversed at the receiving end. Each item of control
information stops at its appropriate layer, and the
message itself passes up to Layer 7. Data transfer
essentially is a cumulating process at the transmitting node and a diminishing process at the receiving node.

AUGUST 1991

8

ISO Reference Model for·
Open S,stems
Interconnection (OSI)

2783
Standards

Data Networking

Table 1. The Seven Layers of OSI
Layer

Name

Purpose

7

Application

Applications and application interfaces for
OSI networks. Provides access to lower
layer functions and services.

6

Presentation

Formats data received from Layer 7; includes terminal standards, display rules.

5

Session

Coordinates connection and interaction
between applications. Establishes a dialog, manages and synchronizes the direction of data flow, and terminates the
session.

4

Transport

Ensures end-to-end data transfer between applications, data integrity, and
service quality. Assembles data packets
for routing by Layer 3.

3

Network

Routes and relays data units among network nodes.

2

Data Link

Transfers data units from one network
node to another over a transmission circuit. Ensures data integrity between
nodes.

1

Physical

Sends the bit stream to the transmission
medium.

The Layers

A number of objectives were considered by the reference model's designers: to limit the number of
layers to make the system engineering task of describing and integrating the layers as simple as possible; to create boundaries between layers at points
where the description ofservices can be small and
the number of interactions across each boundary is
minimized; and to collect similar functions in the
same layer. Table I summarizes the OSI Reference
Model's layers; more detailed descriptions follow
for each layer.
The Application Layer
The Application Layer (Layer 7) is the highest
layer, providing the means for the application process to access the OSI environment. Its function is
to serve as the passageway between application
processes using Open Systems Interconnection to
exchange information; consequently, all application process parameters are made known to the
OSI environment through this layer.
All services directdy usable by the application
process (i.e., systems and applications management
functions) are provided by the Application Layer.
It differs from the other layers in that it does not

AUGUST 1991

provide services to a layer above it nor is it associated with a service-access point. Some of the services provided by this layer, other than
information transfer, are the following:
•

Identifying intended communications partners

• Determining current availability of the intended partners
• Establishing the authority to communicate
• Agreeing on responsibility for error recovery
• Agreeing on procedures for controlling data integrity
The Application Layer actually consists of two sublayers. The uppermost sublayer consists of Specific
Application Service Elements (SASEs), such as
message handling system (X.400), FTAM, Directory Services (X.500), DTP, and Virtual Terminal
(VT). The lower sublayer consists of Common Application Service Elements (CASEs), which provide
specific services for the upper applications. Examples of CASE protocols include Commitment Concurrency and Recovery Service Element (CCR) and
Remote Operation Service Element (ROSE).
The Presentation Layer
The Presentation Layer (Layer 6) allows an application to interpret the meaning of information exchanged. Information is formatted and translated
1991 McGraw-HIII,lncorporated. Reproduction Prohlbitad.
Datepro Information Servioes Group. Delran NJ 08075 USA

@

Data Networking

ISO Reference Model for
Open S,stems
Interconnection (OSI)

7

2783
Standards

Table 2. ISO Protocols and Equivalent Standards
Layer
7
Application

6
Presentation
5
Session
4
Transport
3
Network

2
Data Link

(

1
Physical

ISO
8571 (FTAM)
10021 (MHS)
9041 (VT)
10026 (OTP)
9594 (OS)
8613 (OOA)
9579 (ADA)
9596 (CMIP)
8823 (connection)
9596 (connectionless)
8327 (connection)
9548 (connection less)
8073 (TPO-TP4)
(connection)
8602/8072
(connection less)
8208 (Layers 1-3)
8348 (connection)
8473 (connectionless)
9542 (IS-IS)
8878 (use w/8208)
8880 (LAN)
8881 (X.25 on LANs)
7776 (LAPB)
3309 (HOLC)
8802.2-.7 (LAN)
(IEEE 802.2-.7)
9314 (FOOl)
2110 (EIA-2320)
4902 (EIA-449)
2593
4903

CCITT

ANSI

ECMA

X.400
X.500
T.410 Series, T.73

ECMA-101

X.226
X.225

X3.153

ECMA-75

X.224

X3.140

ECMA-72

X.25
X.213
ECMA-92
(X.25)
X.25
X3.66

ECMA-40
ECMA-82, -81, -90, -89

X3.148, X3.139, X3.166
V.24, V.28
V.24, V.28
V.35
X-Series interfaces,
Other V-Series

at this layer. Aspects of Layer 6 include data syntax, which is the data to be transferred between
layers, and the presentation image syntax, which is
the data structure that application entities refer to
in their dialog, or the set of actions that may be
performed on the data structure.
Services provided to the Presentation Layer
include the following:
• Transforming data syntax, primarily code and
character set conversion
• Transforming and selecting the presentation
image syntax, the adaptation and modification
of the presentation image (the OSI view of the
data structure)

The Session Layer
The Session Layer (Layer 5) allows cooperating
presentation entities to organize and synchronize
their dialog and to manage data exchange. It provides the following services:
•

Session-connection establishment-creation of
an exchange between presentation entities

• Session-connection release
•

Normal data exchange

•

Quarantine service-in which data units sent
by a presentation entity are withheld from the
receiving presentation entity until released by
the sending presentation entity

• Expedited data exchange
Functions within the Presentation Layer include
session establishment request; data transfer; negotiation and renegotiation of data syntax and presentation image syntax; special data transformations, such as compression; and session
termination request.

1991 McGraw-HiII,lncorporated. Reproduction Prohibited.
Datapro Information Services Group. Delran NJ 08075 USA

@

•

Interaction management-allowing presentation entities to take turns exercising control
functions

•

Session-connection synchronization

AUGUST 1991

8

2783
Standards

ISO Reference Model for
Open System.
Interconnection (OSI)

Data Networking

Table 3. OSI Network Management Standards
Current Status

Finalization Date

Common Management Information Service (CMIS) (IS 9595)

International Standard

Final 11/89

CMIS CancelGet Addendum (AD 9595-1)

Addendum

Final 11/90

CMIS Add/Remove Addendum (AD 9595-2)

Addendum

Final 11/90

Support for Allomorphism (Amendment to CMIS) (CD 9595)

New Work Items

DIS expected in 11/91; IS expected in 11/92

Access Control (Amendment to CMIS) (CD 9595)

New Work Items

DIS expected in 11/91; IS expected in 11/92

Common Management Information Protocol (CMIP) (IS 9596)

International Standard

Final 11/89

CMIP CancelGet Addendum (AD 9596-1)

Addendum

Final 11/90

CMIP Add/Remove Addendum (AD 9596-2)

Addendum

Final 11/90

Support for Allomorphism (Amendment to CMIP) (CD 9596)

New Work Items

DIS expected in 11/91; IS expected in 11/92

PICS Proforma (Amendment to CMIP) (CD 9596)

New Work Items

DIS expected in 11/91; IS expected in 11/92

OSI Systems Management Overview (DIS 10040)

Draft International Standard

IS 5/91

Object Management Function (DIS 10164-1)

Draft International Standard

IS 5/91

State Management Function (DIS 10164-2)

Draft International Standard

IS 5/91

Attributes for Representing Relationships (DIS 10164-3)

Draft International Standard

IS 5/91

Alarm Reporting Function (DIS 10164-4)

Draft International Standard

IS 5/91

Event Management Function (DIS 10164-5)

Draft International Standard

IS 5/91

Log Control Function (DIS 10164-6)

Draft International Standard

IS 5/91

Security Alarm Reporting Function (DIS 10164-7)

Draft International Standard

IS 5/91

Title
CMIS/CMIP

OSI Systems Management Functions

Security Audit Trail Function (CD 10164-8)

Committee Draft·

DIS 4/91

Objects and Attributes for Access Control (CD 10164-9)

Committee Draft·

DIS 4/91

Accounting Meter Function (CD 10164-10)

Committee Draft"

DIS 4/91

Workload Monitoring Function (CD 10164-11)

Committee Draft·

DIS 4/91

Confidence and Diagnostic Testing Classes.
Test Management Function (N4078. 10164-X)

Committee Draft·

DIS expected 8/91; IS expected
8/92

Measurement Summarization (N4081. 10164-X)

Committee Draft·

DIS expected 8/91; IS expected
8/92

Response Time Monitoring (N4079. 10164-X)

Committee Draft·

DIS expected 8/91; IS expected
8/92

Software Management Function (10164-X)

New Work Item

DIS expected 7/92; IS expected
7/93

Time Management Function (10164-X)

New Work Item

DIS expected 8/92; IS expected
8/93

Structure of Management Information (SMI)
Management Information Model (DIS 10165-1)

Draft International Standard

IS 5/91

Definition of Management Information (DIS 10165-2)

Draft International Standard

IS 5/91

Guidelines for Definition of Managed Objects (DIS 10165-4·')

Draft International Standard

IS 5/91

Generic Managed Objects (N4075)

Working Draft

DIS registration dates to be
determined

·Draft proposals (DPs) are now referred to as Committee Drafts (CDs).

* ·Document DIS 10165-3 was merged with DIS 10165-2 and will not appear in future standards listings.

• Exception reporting-permitting the presentation entities to be notified of exceptional situations

An example of a working Layer 5 protocol outside
the scope of OSI is the Department of Defense
Transmission Control Protocol (TCP).

AUGUST 1991

@

1991 McGraw-HiII,lncorporated. Reproduction Prohibited.
Datapro Information Services Group. Delran NJ 08075 USA

D,ata Networking

(

ISO Reterence Model for
Open Systems
Interconnection (OSI)

2783

9

Standards

Table 3. OSI Network Management Standards (Continued)
Title

Current Status

Finalization Date

Performance Management (N4981)

Working Draft

Next milestone to be
determined

Accounting Management (N875R)

Working Draft

Next milestone to be
determined

Security Management (N4091)

Working Draft

Next milestone to be
determined

Fault Management (N4077)

Working Draft

Next milestone to be
determined

Configuration Management (N3311)

Working Draft

Next milestone to be
determined

OSI Management Framework (IS 7498/4)

International Standard

Final 4/89

File Transfer, Access and Management (FTAM) (ISO 8571)

International Standard

Final 10/88

Association Control Service Element (ACSE) (ISO 8649, plus
addendums)

International Standard

Final 12/88

Remote Operations Service Element (ROSE) (IS 9072-1 &2)

International Standard

Final 11/89

Specific Management Functional Areas (SMFAs)

Related Upper Layer Standards

The Transport Layer
The Transport Layer (Layer 4) provides transparent data flow between session entities, freeing the
Session Layer from responsibility for cost-effective
and reliable data transfer. Layer 4 provides information interchange according to a user-specified
reliability level and end-to-end control. Transport
protocols transfer information from one end of a
physical connection to another and ensure that it is
delivered correctly. Layer 4 protocols are used after
a route has been established through the network
by the network-layer protocol.
The services provided by this layer include
the following:

(-

The Network Layer
The Network Layer (Layer 3) provides the means
to establish, maintain, and terminate connections
between systems. Its basic service is providing
transparent data transfer between transport entities.
The services provided by this layer encompass the following:
• Establishing network connections for transporting data between transport entities through network addresses
•

Identifying connection endpoints

• Transferring network service data units

•

Transport-connection establishment to complete a connection between session entities

• Noting errors for reporting unrecoverable errors
to the transport layer

•

Data transfer, in accordance with the agreed
quality of service

• Sequencing network control data units

•

Transport-connection release

•

The Transport Layer is the most defined of the upper four layers. The European Computer Manufacturers Association (ECMA) has defined this layer
in its Transport Protocol standard, ECMA-72. This
standard has gained the support of a number of
North American and European computer manufacturers. An end-ta-end data transport protocol outside the scope of OSI is the Department of Defense
Internet Protocol (IP).

1991 McGraw·HIII,lncorporated. Reproduction Prohibited.
Datapro Information Services Group. Delran NJ 08075 USA

@

• Flow control
Releasing the network connection

The Data Link Layer
Data Link Layer 2 provides the procedural and
functional means to establish, maintain, and release data link connections between two network
nodes or network entities and to transfer data
frames (or packets). This layer also detects and
may correct errors that occur in the physical layer.

AUGUST 1991

10

2783
Standards

Services provided by the Data Link Layer to
the Network Layer include data link connection,
sequencing, error notification, flow control, and
data unit transfer.
The Physical Layer
The lowest of the OSI layers is Physical Layer 1. It
provides the electrical, mechanical, functional, and
procedural characteristics for activation, maintenance, and deactivation of a physical connection.
Physical Layer standards specify physical interfaces (connectors) connected by a physical medium.
Services provided by this layer include the
following:
• Activating and deactivating physical connections
• Data circuit identification
• Sequencing
• Transmitting physical service data units either
synchronously or asynchronously
• Fault condition notification
Abstract Syntax Notation One (ASN.1)

ASN.l is a specification language adopted for the
OSI Reference Model, giving standards developers
a common method for defining protocols and related standards. ASN.l is somewhat analogous to
grammatical rules defining the English language.
Just as English grammar specifies notation (punctuation symbols) and word classifications (such as
nouns and verbs), ASN.l specifies a "grammar"
and rules that help standards developers define
complex data types in terms of simple building
blocks.
ASN.l was derived from the Backus-Naur
Form, used to describe programming languages
such as Pascal and Ada. ASN.l was first formally
described and published in 1984, in the CCITT
X.409 standard entitled "Message Handling Systems: Presentation Syntax and Notation." It is now
described (in less readable fashion) in two later
documents: CCITT X.208 (ISO 8824), entitled
"Specification of Abstract Syntax Notation One
(ASN.l)," and X.209 (ISO 8825), "Basic Encoding
Rules for Abstract Syntax Notation One (ASN.l)."
According to ASN.l, each fragment of information must possess a type and a value. For example:

AUGUST 1991

ISO Reference Model for
Open S,"ems
Interconnection (OSI)

Data Networking

• Device-Status could be a type (in this case, it is
a Boolean type)
• Zero or One are the possible values
This is specified in ASN.l notation as such:
Device-Status :: = Boolean
Boolean :: = 011
This is a very simple example; ASN.l is a powerful
grammar, capable of specifying very complex data
types. Hence, it will continue to be the grammar of
choice for specifying open systems standards and
protocols.

051 Standards Progress
The primary responsibility for developing OSI
management standards in the United States rests
with American Standards Committee (ASC)
X3T5.4. There are four stages in the development
cycle: working paper, committee draft (CD), previously known as a draft proposal), draft international standard (DIS), and international standard
(IS). A working paper is developed in the first
stage. When it matures and contains welldeveloped technical concepts, it is registered as a
CD. Passage advances the CD to the DIS level, and
the document is considered sufficiently stable to
serve as the basis of initial implementations. At the
DIS level, the document is distributed for a 180day ballot. The DIS may require multiple ballots.
A successful ballot elevates the DIS to the level of
IS and completes ISO's process.
The entire process usually takes between four
and eight years. A list of standards organizations
associated with the OSI Reference Model is given
at the end of this report.
The Evolution of 051 Committees

In the spring of 1977, ISO Technical Committee 97
(TC97) formed a special subcommittee (SC 16)
charged with developing an architectural model
that would extend from applications-layer communications clear down to the connection with the
physical interface. The first draft of the seven-layer
OSI Reference Model was completed in 1978. Between 1978 and 1983, the Basic Reference Model
and many of the standards for the individual layers

1991 McGraw-Hili, Incorporated. Reproduction Prohibited.
Datapro Information Services Group. Delran NJ 08075 USA

@

Data Networking

ISO Reference Model for
Open Syatema
Interconnection (OSI)

approached or attained draft international standard status. By the end of 1984, SC16 was reorganized to form Subcommittee 21 (SC21). Working
groups within SC16 were also realigned.
The OSI Basic Reference Model became an
international standard in 1984. During 1985, a
number of vendors demonstrated products that
implemented these standards and, by the end of
1986, many of these products were commercially
introduced.
In July 1987, the Joint Technical Committee
for Information Technology (JTC1) was formed
when ISO/TC97 joined forces with Technical
Committee 83 (TC83) of the International Electrotechnical Commission (1EC). The IEC is a coalition of industrial standards bodies that is colocated with the ISO in Geneva, Switzerland. The
new JTCI held its first meeting in 1987. The standardization activities ofSC21 report to JTCI.
SC21 is composed of member bodies (MBs)
from 23 different countries. Each MB has its own
national standards organization; for example,
ANSI represents the United States in JTCI. The
individuals or "national correspondents" comprising the MB delegations come from different groups
including user organizations, manufacturing firms,
government agencies, and common carriers or
PITs. As such, they bring varying perspectives and
concerns to the committee sessions.
When an OSI committee or working group
produces a document such as a CD, the document
is circulated among the MBs for a vote and to the
liaison organizations (Las) for review. Las are independent organizations which also have a vested
interest in OSI development. Las provide comments on the content of OSI documents but do not
have voting privileges.
Status of OSI Protocols

Protocol standards for all seven layers of the OSI
model have been approved; however, OSI committees are refining and extending some standards as
required and may add new standards at specific
layers (particularly Layer 7). Additionally, other
standards groups-such as the CCITT, ANSI, and
IEEE-may adopt OSI protocol standards as their
own and vice versa. Consequently, many OSI standards are known by more than one standard designation. Table 2 shows some major ISO protocols
approved for each OSI layer and lists corresponding appellations from ANSI, the CCITT, and the

@ 1991 McGraw-Hili. Incorporated. Reproduction Prohib"ed.
Datepro Information Services Group. Delran NJ 08075 USA

2783

11

Standards

European Computer Manufacturers Association
(ECMA), where applicable.
OSI Applications Standards
ISO committees are working hard at Layer 7, the
Application Layer. In fact, OSI application standards are perceived as potentially powerful and
versatile and are the driving force for OSI market
acceptance. We devote considerable space reviewing some of the most important ones here.
In particular, the ISO electronic mail standard for message handling systems (MHSs)-or
CCITT X.400-is becoming popular in commercial implementations. Two versions, one in 1984,
and another in 1988, are draft international standards that have not been ratified. The standard
was given a big boost in 1989, when the Aerospace
Industry Association (AlA) adopted X.400 to interconnect its diverse electronic mail networks. Gateways to proprietary E-Mail systems were also
developed that year, and dozens of vendors have
rolled out X.400-based products. Most public
E-Mail carriers have also adopted the standard and
are migrating to the 1988 version.
In addition, the ISO is adapting X.400 as the
message medium for electronic data interchange
(EDI). In this context, X.400 would be used as the
communications method to store and forward
trade documents and business forms conforming to
ANSI X12, the European EDIFACT, and de facto
EDI standards.
One component of successful E-Mail internetworking is directory services (OS), commonly
known as CCITT X.500. X.500 specifies an online
directory for message communications, ultimately
allowing network providers to map a common, interconnected directory of worldwide users. X.500
dictates naming conventions, how users access directory information, and what services are available.
Since the 1988 standard is not flexible, SC21
WG4 is working to ease the transition to the new
1992 version. Older 1988 X.500 systems will require a software modification to work with the
1992 version. Realistically, the vision of a worldwide messaging directory probably will not be realized until the late 1990s.
The OSI protocol pair for office automation,
Office Document Architecture (aDA) and Office
Document Interchange Format (ODIF), has been
an international standard since 1988 (ISO 8613). It

AUGUST 1991

Data Networking

'SO Reference Model for
Open Spteme
.
.nterconnecUon (OS')

2783

12

Standards

Figure 3.
ISDN through OSI Eyes

'-.

7

Application-related functions

UJ

c:

.2
ti

6

c:

Encryption/decryption

Compression/expansion

Session
connection
establishment

Session
Session
Session
transport conCQnnection
management
synchronization nection mapping

etc.

.2

m

~
....
Q)

5

..c:

Session
connection
release

etc.

Cl

:E

Layer 4
connection
multiplexing

4

3
UJ

c:

.2
ti
c:

::l

.Q)...

~
....
~
0

...J

2

Routingl
relaying

Layer 4
connection
establishment

Network
connection
establishment

Data link
connection
establishment

Data link
congestion
release

Physical
layer connection
activation

Physical layer
connection
deactivation

Layer 4
connection
release

Error
detectionl

recovery

Flow
control

Segmenting
blocking

etc.

Network
Network
connection connection
release
multiplexing

Congestion
control

Addressing

etc.

Flow
control

Error
control

Sequence
control

Framing
synchronization

etc.

Bit transmission

Channel
structure
multiplex

etc.

ISDN junctions allocated according to layering principles ofRecommendation X.200.

The Layer 7 protocol for network manageis also specified in the U.S. government's GOSIP
ment, Common Management Information Protostandard. aDA and ODIF facilitate the exchange
col (CMIP), was approved as a draft standard in
of office documents-such as letters, memoranda,
late 1989. CMIP itself is merely a way of commuand business reports-among dissimilar systems.
nicating between the "management process" and
Moreover, the standard specifies the formatting
management agents at each lower layer of the OSI
and exchange of compound documents-those
containing combinations of text, images, and
model. The real work of managing network prographics. Several ISO working groups are attemptcesses is located within the managed objects at ining to strengthen and extend the standard in such
dividual OSI layers; in other words, each layer
must have its own network management system,
areas as the inclusion of audio, spreadsheet data,
which OSI does not specify. CMIP allows a centralcolor graphics, document security, and various layout and presentation styles.
ized management process to either modify the
value of an attribute or request its value (read its
The OSI standard for sending and sharing
status) at each of the layers. Definitions and dedata files-File Transfer, Access, and Management
(FTAM)-is also a finalized international stanscriptions of management structures and managed
dard. It was developed from networking efforts in
information are contained in other OSI standards
the manufacturing industry and is a Layer 7 comyet to be completed. (For more information, see
ponent of the Manufacturing Automation Protocol
the OSI Management section featured later in this
(MAP). Although FTAM is spreading quickly in
report.)
Europe, it is also making some progress in domesOther Layer 7 protocols in various developtic business applications. The file protocol used
ment stages include distributed Transaction Processing (TP), currently a committee draft designed
with TCP/IP-File Transfer Protocol (FTP)-is
well established in the U.S., however, and generally . to interconnect different transaction computing
more popular than FTAM. SC21 is working on an
systems across OSI networks; Remote Database
enhancement to FTAM, and it plans to establish
conformance testing guidelines in the near future.
AUGUST 1991

1991 McGraw-Hili, Incorporated. Reproduction Prohibited.
Datapro Information Services Group. Delran NJ 08015 USA

@

Data Networking

ISO Reference Model for
Open Systems
Interconnection (051)

Access (RDA), a committee draft describing a protocol for integrating database management systems; and Manufacturing Message Specification
(MMS), ISO 9506, a manufacturing protocol that
requires extensions for specific manufacturing device types.
Middle Layer Protocols
During 1987 and 1988, the ISO finalized protocol
standards for middle layers 4, 5, and 6. These standards were based on a previous agreement that all
connections would conform to a connectionoriented method of establishing circuits.
Every layer of the OSI Reference Model, except the Physical Layer, supports connection and
connectionless mode. Connection-oriented service
requires a connection establishment phase, a data
transfer phase, and a connection termination
phase; a logical connection is set up between end
systems prior to data exchange. These phases define the necessary sequence of events for successful
data transmission. Connection-oriented service
capabilities include data sequencing, flow control,
and transparent error handling.
In a connectionless service, such as new
Switched Multi-megabit Data Service (SMDS),
each Protocol Data Unit is independently routed
to the destination; no connection establishment
activities are required, since each data unit is independent of the previous or subsequent one.
Connectionless-mode service transfers data units
without regard to establishing or maintaining connections. In connectionless mode, transmission
delivery is uncertain due to the possibility of errors. This appears contrary to the goal of network
design-users want to ensure that messages reach
their destination. In reality, connectionless-mode
communication simply shifts responsibility for
message integrity to a higher layer, which checks
integrity only once, rather than requiring checks at
each lower layer. Alternatively, each data unit
might contain the error recovery mechanism.

(

Lower Layer Protocols
Lower layer OSI protocols for layers 1 through 3
are well-defined veterans and in many cases borrowed from existing EIA, IEEE, or CCITT standards. Connectionless communications at the
lower layers of the OSI model is well established
and is found, for example, in local area networks
(LANs) and metropolitan area networks (MANs).

Ill> 1991 McGraw-Hili, Incorporated. Reproduction Prohibited.
Datapro Information Services Group. Dslran NJ 08075 USA

2783

13

Standards

While the original OSI model-described in ISO
7498-was connection oriented, the ISO foresaw
the need for connectionless service and issued an
addendum to that protocol (ISO 7498/AD1). The
ISO is now working to update the Connectionless
Addendum, and CCITT SG VII pursues a parallel
process. The CCITT, however, has been reluctant
to insert connectionless-mode data transmission
concepts into CCITT X.200-its version of the
OSI model. The ISO standard for Network Layer
service, ISO 8348, contains connectionless service
(in AD1) in addition to the connection mode.
The Government's GOSIP Standard

In 1979, the National Bureau of Standards (now
the National Institute of Standards and
Technology-NIST) initiated a program to support
U.S. government standards for interoperable data
communications. It chose to develop a standard
based on the ISO's OSI Reference Model, named
the Government OSI Protocol (GO SIP). Since August 1990, NIST has mandated GOSIP as a federal
information processing standard (FIPS). All federal
agencies must conform to GOSIP in procuring networking products. According to NIST, the standard will be updated every year, and each new
version will be compatible with the preceding one.
GOSIP is also expected to accelerate the development of OSI standards and products for the
private sector. As the largest user of information
processing systems and services in the world, the
federal government greatly influences vendors in
the computer and communications industries. The
need for government GOSIP compliance will spur
the development of OSI protocols and software
products.
GOSIP Version 1 specifies the following protocols for each OSI layer:

• Application Layer 7: File Transfer, Access, and
Management (FTAM); X.400 Message Handling System (MHS); and the Association Control Service Element (ACSE)

• Presentation Layer 6: ISO 8823/CCITT X.226
• Session Layer 5: ISO 8327/CCITT X.225
• Transport Layer 4: ISO 8073, Transport Protocol Class 4 (TP4)

• Network Layer 3: ISO 8473 Connectionless Network Layer Protocol (CLNP)

AUGUST 1991

14

2783
Standards

ISO Reference Model for
Open S,atema
Interconnection (OSI)

Data Networking

• Data Link Layer 2: ISO 3309 (HDLe); ISO
8802.2-5/IEEE 802.2-5

security and open systems are antithetical; nevertheless, the ISO has taken steps to provide a secure
environment within the OSI Reference Model.
• Physical Layer 1: GOSIP does not mandate speInternational Standard 7498, Part 2 addresses
cific physical interface standards but suggests
a
security
architecture within the general OSI
standard interfaces such as EIA RS-232-C for
model.
It
describes
security measures that can be
transmission speeds up to 19.2K bps and
provided
by
specific
layers in the model. Specific
CCITT V.35 for speeds above 19.2K bps
security standards are not yet defined, however,
but are under study by working group JTC1, SubGOSIP Version 2.0 became mandatory in August
committee
27 for Information Technology Security
1991. It adds the following protocols to the existing
Standards,
plus
other subcommittees. The U.S.
GO SIP model:
participant in this process is ANSI's X3 Commit• Application Layer 7: Basic Class Virtual Termi- . tee.
nal (VT), ISO 9040, ISO 9041, ISO 9040 AD 1,
SC21, concerned with maintaining and definand ISO 9041. Office Document Architecture
ing the upper three layers of the OSI Reference
(ODA), ISO 8613-8.
Model, met in May 1991, in Arles, France, to stabi• Transport Layer 4: Connectionless Transport
lize several network management and security
Service, ISO 8602.
standards. The Security model is composed of six
frameworks
that work together across all seven lay• Network Layer 3: Connection-Oriented Neters
of
the
OSI
Reference Model: authentication,
work Service for ISDN or X.25 networks, ISO
access
control,
security audit, nonrepudiation, con8348 and 8348/ADl. Intermediate System to
fidentiality, and integrity. SC21 is working to esIntermediate System (IS-IS) intradomain routtablish
two of the six security standards as Draft
ing, ISO 9542. Integrated Services Digital NetInternational
Standards (DISs), and the remaining
work (ISDN), CCITT I.451 and Q.931.
four standards, which are working drafts, will
• Data Link Layer 2: ISDN CCITT 1.441 and
progress to CD status.
Q.921 (Link Access Protocol D-LAPD).
By supporting ISDN, Version 2.0 will also support
CCITT X.25 packet interfaces and IEEE 802.2 to
802.6 LAN networks. GOSIP Version 3.0, which
becomes mandatory in August 1992, adds OSI network management, X.500 directory services, the
Fiber Distributed Data Interface (FODI) standard,
and Open Document Architecture (ODA). Complete GOSIP details can be obtained from NIST
publications Government Open Systems Interconnection Profile Users' Guide (SP 500-163) and Government Open Systems Interconnection Profile
(FIPS PUB 146).
OSI Security

By definition, an open system is one that encourages communications between different applications or users. Unfortunately, an open system can
also encourage illegal eavesdropping and information theft or destruction. Recently, notorious examples of white-collar crime, corporate espionage,
and network intrusions by computer worms and
viruses have alarmed information processing professionals and raised a general awareness of computer security issues. The concepts of information
AUGUST 1991

OSI and Other Network Architectures
OSland ISDN

Functioning as the international voice of the telephone industry, the CCITTworked independently
of ISO to develop its Integrated Services Digital
Network (ISDN) technology. On the other hand,
CCITT and ISO efforts are closely related because
of expanding digital telephone networks and the
merging of voice and data.
Increasingly, the OSI Reference Model and
ISDN overlap. The ISO has adopted versions of
CCITT X.21 and X.25 standards for the lower layers of the OSI model. ISDN functions are described in terms of the seven-layer OSI model in
the CCITT's Recommendation X.200 (see Figure
3). Altogether, about 10 standards adopted by both
CCITT and ISO are identical, except for introductory paragraphs and identification numbers.
ISDN standards are now mapped to the OSI
Reference Model and occupy its lower layers. Specific network applications, such as network management and electronic mail, occupy the higher

1991 McGraW-Hili, Incorporated. Reproduction ProhlbHed.
Datapro Information Services Group. Delran NJ 08075 USA

@

Data Networking

ISO Reterence Model for
Open Systems
Interconnection (OSI)

OSI layers and can be integrated on top of ISDN
protocols in telephony networks. ISDN will provide a more versatile communications medium for
integrating telephony and data processing. The
U.S. government has already specified ISDN protocol options for its GOSIP network architecture,
which is modeled on OSI. NIST has successfully
tested ISDN as a transport subnetwork for higher
layer OSI protocols. ISDN is expected to be implemented throughout the public telephone network
by late 1992. OSI and ISDN are complementary
standards that will allow effective internetworking.
OSI and Proprietary Architectures

Until 1976, the only de facto network standards
were those developed by IBM for its Systems Network Architecture (SNA). That year, however,
CCITT introduced its X.25 standard for host
interface-to-packet networks, and Digital Equipment Corp. brought out its Digital Network Architecture (DNA). When the ISO defined its OSI
Basic Reference Model (ISO 7498 and 7498/AD1)
in 1979, users had a non-IBM alternative for the
first time. The purpose of the OSI modelinteroperability in a multi vendor environmentwas fundamentally different from the proprietary
nature of SNA.
Although OSI and SNA are both seven-layer
network architectures, the layers do not match exactly and are incompatible. At first, IBM paid lip
service to customer requests for OSI functionality.
The vendor did not embrace OSI within SNA; instead, it provided an OSI gateway between SNA
and other non-SNA networks. Like most gateways,
this solution proved unwieldy and unsatisfactory.
IBM also provided partial OSI solutions at various
layers, such as X.25 connectivity at Layer 3 and
below. Another interim OSI product was the Open
Systems Message Exchange (OSME), an E-Mail
package conforming to CCITT XAOO.
Increasingly, pressure from customers demanding open, nonproprietary platforms has
forced IBM and other major companies, such as
Digital Equipment Corp. and NCR, into a mainstream OSI approach.
In 1988, IBM announced OSIICommunications Subsystem, mainframe-based (MVS) software supporting layers 3 to 6 OSI protocols in
an SNA environment. In 1989, both IBM and
Digital Equipment joined in the OSIINetwork
Management Forum, a group that was formed to

1991 McGraw-Hili, Incorporated. Reproduction Prohibited.
Datapro Information Services Group. Delran NJ 08075 USA

@

2783

15

Standards

study interoperability among network management
systems. In 1990, IBM delivered Release 1.1 of its
OSI Communications Subsystem supporting OSI
layers 3 to 6 protocols in a multi vendor environment and announced SystemView, an OSI-based
network and systems management architecture.
IBM now supports three major networking
standards: OSI, TCP/IP, and FDDI. However, in
early 1991, the company announced that full deployment of its SystemView will be delayed until
1994 or 1995.
This year, after delaying Phase V product introduction, Digital Equipment introduced a new
networking architecture for incorporating OSI into
DECnet, called Advantage-Networks. Digital designed Advantage-Networks to replace DECnet/
OSI Phase V. The new architecture enables users to
transmit data from among OSI, TCP/IP, and DECnet applications and network management is supported with Digital's Enterprise Management
Architecture (EMA).
In the past, relatively smaller vendors were
generally more amenable to adopting OSI standards. Standard Telephone and Cable/International Computers, Ltd. (STC/ICL), for
example, was one of the first European manufacturers to ensure that American and European standards efforts are coordinated. STC/ICL is a British
information systems firm that perceives adoption
of OSI standards as a way to increase the applicability of its own products on an international level.
NCR is expected to roll out its OSI-based
router in 1992, as well as its OSI-based Communications Processor software for the 56X5. The company was supposed to have made them available
last April, just before the introduction of its new
System 3600 parallel processor. However, development problems have delayed delivery until next
year. All of NCR's products are based on its Open
Cooperative Computing Architecture (OCCA),
which provides for the coexistence and information exchange among OSI, SNA, and TCP/IP networks. OCCA will be the platform used by AT&T
and NCR to achieve global networking.
OSI and MAP/TOP

The Manufacturing Automation Protocol (MAP)
and Technical Office Protocol (TOP) were originally developed by General Motors and Boeing
Computer Services, respectively, to automate manufacturing functions on the factory floor and in the

AUGUST 1991

18

2783
Standards

"back office." Both are based on the OSI Reference Model, using formal standards for each layer
where possible. MAP, in particular, is probably the
best-known exa,mple of a formal multilevel protocol and has achieved moderate industry acceptance. Many vendors now offer MAP 3.0 products,
but these compete with proprietary "shop floor"
automated factory solutions.
Today, manufacturing networking standards
are directed by the MAP/TOP users group. MAP
Version 3.0 was released in June 1988 and will remain free from major changes until 1994. Version
3.0 added a Presentation Layer to the protocol and
implemented a version of the Manufacturing Message Specification (MMS), the protocol for transferring factory and robotics information, ISO
9506. The ISO is currently working to extend
MMS in support of realtime applications. Other
Layer 7 protocols specified are FfAM, Network
Management, and Directory Service. Middle layers
implement ISO connection-oriented protocols, although these must be bypassed for time-critical
applications. At the lower transport layers, MAP
specifies the IEEE 802.4 token bus system employing a Type F coaxial connection to a 75-ohm cable.
OSI and TCP/IP

Transmission Control Protocol/Internet Protocol
(TCP/IP) was developed by the U.S. government's
Defense Advanced Research Projects Agency
(DARPA) for its research network, ARPANET. By
1986, TCP/IP had gained a following of commercial users seeking a protocol that could be used as a
common denominator for multi vendor computer
networks. TCP and IP are actually two separate
protocols, occupying middle layers number four
(transport) and number three (network), respectively, of the OSI Reference Model.
TCP/IP has been implemented on almost every type of computer and is especially successful in
commercial Ethernet LAN environments. The reason for TCP/IP's popularity is that it is a relatively
simple, proven system for intemetworking. Its handling of the connection-oriented/connectionless
dilemma, which can be problematic in OSI, is
straightforward and easy to implement. OSI provides a richer set of network options, but these may
not be compatible in different networks. Users cannot communicate across different networks if they
implement different options at these layers.

AUGUST 1991

ISO Reference Model for
Open Systems
Interconnection (OSI)

Data Networking

Already, some proprietary stripped-down versions of OSI have been developed that resemble
TCP/IP, and some pundits believe that OSI itself
will evolve to resemble TCP/IP in the future. TCP/
IP's future could have been jeopardized, since the
U.S. government mandated OSI compliance in
government procurements, had it not been for Novell's introduction earlier this year of a new version of its NetWare network operating software
that supports TCP/IP.
A majority of users still use TCP/IP networks
for LAN interconnectivity. However, the consensus is that TCP/IP is not the ultimate solution-a
feat attributed to OS1. The trend is toward a migration to OSI-based applicaions running on a TCP/IP
infratsructure. As a result, more vendors, including
Unisys and Amdahl, are introducing products that
support multiple protocols.

Testing and Verification Agencies
The Corporation for Open Systems (COS)

During the late 1970s and early 1980s, vendor support for the OSI model ranged from wholehearted
to indifferent. By 1985, however, it became apparent that cooperation among vendors-and userswould be critical to the success of open standards.
That year, major U.S. vendors officially announced their support and formed the Corporation
for Open Systems (COS) to promote implementation of OSI standards.
COS is a nonprofit research and development
consortium located in McLean, VA, with an annual budget of $10 million. Its stated purpose is to
work toward worldwide information systems interoperability. Its mission is to open worldwide
markets for new OSI and ISDN products through
certification, by developing conformance test products, and by cooperating with other international
organizations. COS is not in the business of reinventing standards. It works with existing standards
organizations to accelerate the implementation of
present standards by testing and certification.
COS currently lists about 60 full-fledged
member companies composed primarily of information technology vendors such as Apple Computer, AT&T, Digital Equipment Corp., HewlettPackard, IBM, Intel, Sun Microsystems, Texas

1991 McGraw-Hili, Incorporated. Reproduction Prohibited.
Datepro Information Services Group. Delran NJ 08075 USA

@

Data Networking

ISO Reference Model for
Open Systems
Interconnection (OSII

Instruments, and several software and LAN vendors. The list also includes several federal government agencies and a few large end users.
Members are committed to accelerate OSI
and related standards and to assess how vendors
can best supply end users with OSI and ISDN solutions; they are afforded several privileges not available to nonmembers. There are three types of
memberships:
1.

Regular membership, with an annual fee of
$25,000

2.

Corporate Research membership, for corporations with revenues in excess of $25 million,
with an annual fee of $25,000

3.

Senior Research membership, for corporations
with revenues in excess of $150 million, with
an annual membership fee of $25,000 and an
annual research fee of$175,000.

Besides these three categories, COS provides an
Affiliate Associate Program currently consisting of
over 40 universities, foundations, associations, and
nonprofit organizations.
COS' major activity is developing and administering the COS Mark Licensing Program, which
is crucial to the COS mission. Informally known as
the "gold dot," the COS Mark was developed with
the aid of Underwriters Laboratories (UL). It is a
"seal of approval," providing impartial verification to users that OSI and ISDN products conform
to standards and ensure multi vendor interoperability. COS awards the mark to products that meet
COS requirements and pass a set of COS conformance tests. Since OSI contains many optional
classes, subsets, and parameters, conformance tests
are conducted on a COS Stack Specification-a
specific profile of optional OSI protocols.
COS conformance tests are available through
three avenues: at an on-site COS testing lab,
through licenses issued to third-party testing organizations, and through licenses issued to vendors.
In addition to OSI, the COS Conformance Testing
Laboratory offers conformance test services for the
following protocols:
• 802.3 CSMAlCD
•

(

802.4, Layer 1 and Layer 2

• X.25 (OSI 8882)
• Internet

2783

17

Standards

• FTAM
• MRS
Testing services cost $1,000 per day. Conformance
test licenses are available for the protocols mentioned above, plus 10 specific MAP/TOP protocols, ranging from $5,500 to $135,000 per protocol
(with discounts for multiple licenses).
COS has been unsuccessful in attracting enduser members and is criticized for moving too
slowly and for not being impartial. COS members
represent diverse interests but "theoretically"
share a common vision of worldwide interoperability as well as a recognition of the potential profitability of open systems products. COS member
representatives are working together to translate
these ideals into several goals. Nevertheless, COS
members cannot always reconcile their business
interests with support of open standards.
Accordingly, COS has forged partnerships
with similar testing and conformance groups in the
U.S. and abroad. It has relationships with the
MAP/TOP Users Group, NIST, ANSI, SPAG,
POSI, and the Interoperability Technology Association for Information Processing (INTAP) of Japan. With ODA becoming mandatory for federal
information system procurements after August
1992, the need for OSI conformance testing will
increase immensely in the coming years. Recently,
COS has shifted emphasis from that of a testing
laboratory to producing a model for third-party
testers.
In 1991, COS announced an industry-wide
consensus to develop and deliver ISDN capabilities in the public switched telephone network by
late 1992. ISDN will be deployed based on standard technical specifications and implementation
agreements. Known collectively as National ISDN
1, the technical specifications were developed by.
Bellcore in conjunction with major industry eqUIpment and service providers.
National Institute of Standards and Technology
(NIST)

NIST, formerly the National Bureau of Standards
(NBS), is a branch of the U.S. Department of Commerce. It develops federal information processing
standards for ISDN and OSI and sponsors the OSI
Implementers Workshop (OIW) and several OSI
special interest groups. In 1979, NIST developed

• Transport
1991 McGraw-Hili, Incorporated. Reproduction Prohibited.
Datapro Information Services Group. Delran NJ 08075 USA

@

AUGUST 1991

18

2783
Standards

formal standards description techniques and protocol test methods. It is grappling with the government's role in standardization, and whether that
role should be increased to meet the challenges
posed by international competition. Unlike other
countries, the U.S. does not implement laws for
standards conformance-a concept vigorously opposed by u.s. industry.
NIST and IEEE

NIST helps to sponsor an experimental OSI network for OSI product vendors and users, called
OSINET. Originally formed in 1984 to test MAP
protocols, OSINET is a packet switched network
with about 40 U.S. nodes. It allows two vendors to
voluntarily perform brief interoperability tests,
modeled after OSI standards for conformance testing. Abbreviated test results are registered and
made available to end users through an online database. Complete testing details and results can be
obtained from OSINET.
OSINET costs are maintained by the participating vendors, including Digital Equipment
Corp., Hewlett-Packard, IBM, NCR, and Unisys.
NIST is a full member, and the network's chairperson is a NIST employee. In 1989, OSINET and
equivalent networks from Europe, Japan, Australia, and Singapore formed a partnership called OSlone, which tests global OSI interoperability and
demonstrates OSI internetworking at trade shows
and special events around the world.
Bell Communications Research (Bellcore)

Bellcore, the R&D arm owned jointly by the Bell
Operating Companies (BOCs), is the U.S.'s largest
research consortium. Splintered from AT&T Bell
Laboratories when AT&T was divested in 1984, its
goal is to help make it possible for people anywhere
in the world to communicate easily and securely in
any medium or combination of media. Bellcore's
domain is the public switched telephone network,
for which it devises standards and tests vendor
products for compliance. Bellcore's role is extremely important: in the absence of a regulated
telephone monopoly (the Bell system), someone or
something must maintain a homogeneous nationwide telephone network. In addition, the BOCs are
not allowed to manufacture their own equipment
and must purchase equipment from a variety of
manufacturers.

AUGUST 1991

ISO Reference Model for
Open S,stems
Interconnection (OSI)

Data Networking

Bellcore is active in public network specifications for ISDN, fiber optics, network management,
the intelligent network concept, and related topics.
Mter Bellcore drafts network standards, it allows
them to be reviewed by the industry at large. After
modifications, the standards are then published as
Technical References (TRs), which are listed in
Bellcore's annual Catalog of Technical Information. They can be ordered as complete documents
at modest prices.
Since its inception, Bellcore has been actively
engaged in ISDN research and testing. It produces
commercially available testbeds for ISDN protocol
compatibility. It also publishes books and videotapes on ISDN concepts, planning, and other
ISDN topics.
Standards Promotion & Application Group
(SPAG)

SPAG, the European equivalent of COS, was incorporated in 1986. Its stated mission is to pave
the way to an open international market for the
computer and telecommunications industry, based
on harmonized standards and testing and certification of OSI products.
Like COS, SPAG concentrates its efforts on
producing conformance testing, accrediting test
laboratories, and certifying OSI products. SPAG
has signed international agreements with COS and
POSI to harmonize tools and testing technology. In
1988, it signed a joint development agreement with
COS to produce the Integrated Tool Set (ITS). The
agreement also provided for reciprocal crosslicensing and distribution of test tools.
In response to criticism that SPAG and COS
were competing with tool developers and that testing was being conducted in a closed environment,
SPAG developed the concept of OPEN Integrated
Test Specification (OPEN ITS), an open approach
to testing open systems.

051 Management
Since the first draft of the seven-layer ISO model
was produced in 1978, extensions to the basic
model have been developed to more adequately
represent all of the functions required by largescale, multi vendor networking environments. OSI

1991 McGraw-Hili, Incorporated. Reproduction Prohiblted.
Datapro Information Services Group. Delran NJ 08075 USA

@

Data Networking

ISO Reference Model tor
Open Systems
Interconnection (OSI)

Management is an extension to the original reference model that specifies transfer of network management information in the Application Layer and
support for network management functions at Layers 4, 5, and 6.
Advantages to OS I-Based Network
Management

OSI-based network management continues to capture attention as the premier solution for multivendor network management. Vendors such as AT&T,
Digital, Hewlett-Packard, and NCR are now designing their network management architectures to
accommodate OSI Management standards and
protocols.
In addition to solving the problem ofmanaging heterogeneous environments, OSI-based network management will bring about a new
phenomenon-unbundling network management
from network products. In a proprietary environment, a given vendor's products are primarily
manageable only by products developed by that
vendor. Widespread use of OSI will split that oneto-one relationship, making it possible for any OSIbased network management system (NMS) to
manage any OSI management-conformant device.
Disadvantages to OSI-Based Network
Management

(

The market (both vendors and users) has widely
criticized ISO for moving too slowly in its efforts
to ratify OSI Management standards. Indeed, the
greatest disadvantage to OSI-based network management is that the demand for it far exceeds the
available products-and vendors are wisely unwilling to develop products based on standards that
are not yet final. In an effort to open the door to
new OSI-based network management system products, SC21 WG4 is currently working to finalize
fault, configuration, performance, accounting, and
security management specifications. These standards will assist in differentiating OSI-based systems from SNMP-based products.
Another disadvantage to standards-based network management is that OSI standards merely
provide a menu of options. There are numerous
gaps and ambiguities in OSI Management standards that could be interpreted differently, leading
to incompatible implementations. Industry consensus is the only hope for interoperable implementations. Currently, this consensus is building around

@ 1991 MCGraw-Hili, Incorporated. Reproduction Prohibited.
Datapro Information Services Group. Delran NJ 08075 USA

2783

19

Standards

the OSI/Network Management Forum and the
Network Management Special Interest Group
(NMSIG) of the OIW, sponsored by NIST and the
IEEE. The NMSIG is developing Implementation
Agreements (lAs) based on emerging network management standards. lAs are being introduced in
phases that coincide with ISO/IEC standards as
they progress from CD to international standards.
The OIW NM Phase I IA became stable in December 1990. To further simplify government procurement of network management products, NIST
introduced a new proposal in May 1991, called the
Government Network Management Profile
(GNMP). GNMP will also be introduced in phases
that will cross-reference the latest GOSIP versions.
GNMP Phase I, II, and III will address the following categories of management information:
• Phase I-IEEE 802 LAN standards, X.25,
ISDN, FOOl, modems, multiplexers, bridges,
and the physical link of the OSI model.
• Phase II-protocol software operating in layers
3 to 7, routers, terminal servers, MTAs, PBX,
and circuit switches.
• Phase III-applications, services, operating systems, computers, networks, and database management systems.
GNMP Phase I specifies CMIS/P, management
definitions in GNMP secion 4, and five systems
management functions: object management function, state management function, attributes for representing relationships, alarm reporting, and event
reporting.
Since SNMP is already widely implemented,
it is likely that SNMP will be deployed to manage
routers. Future versions of GNMP will specify a
network management architecture incorporating
both SNMP and GNMP protocols.
Standards Documents

OSI Management standards can be broadly categorized into four areas:

1.

Functions-what network management is, according to OSI

2.

Services-how network management functions
are accomplished

3.

Information Structure-terms and categories
describing what is managed (e.g., "management information")

AUGUST 1991

2783

20

Standards

4.

Protocols-describe means of transporting network management information

Taken together, these four areas describe a generic
package for network management systems, and
how these products relate to the network devices
they manage (called managed objects in OSI terminology).
A blueprint document, OSI Management
Framework (IS 7498-4), places the OSI Management environment in perspective by describing
terms and the scope of OSI network management.
OSI Management Functions

OSI Management functions are described in the
Systems Management standards (CD 10040, CD
10164-1 through 10164-7, and N 10164-8 through
10164-12). These documents are listed in Table 3
and describe the scope of OSI Management using
three models:
1.

The Organizational Model-describes ways
OSI Management can be distributed administratively

2.

The Information Model-provides guidelines
for defining managed objects and their interrelationships, classes, and names

3.

The Functional Model-describes network
management functions

ISO Reference Model for
Open S,atema
Interconnection (OSI)

Data Networking

initiate configuration changes and diagnostic testing to allow a satisfactory level of performance.
Accounting management facilities help determine
,and allocate costs for the use of a network manager's communications resources. Security Management facilities permit the management of those
services providing access protection of communications resources.
Services

Services are described, in part, in the Common
Management Information Services (CMIS) standard, IS 9595. Services use primitives, or command
types, to accomplish network management functions. Examples of primitives include INITIALIZE, EVENT-REPORT, and TERMINATE. While
service primitives are somewhat abstract, they are
important building blocks for real commands used
by network management applications to obtain
vital data on the status and activity of network devices.
CMIS includes a detailed abstract model of
open systems management services. These fall into
three categories-event notification, information
transfer, and control. Event notification allows one
system to notify another that some event of importance has occurred. Information transfer consists
of a single service element-Get. Control consists
of three elements: Set, Action, and Compare.

The Functional Model outlines how ISO has partitioned network management into five functional
areas: fault management, configuration and name
management, performance management, accounting management, and security management. ISO
originally described each of these areas in its own
standard. Further studies revealed that functions
overlapped; therefore, ISO reorganized the documents in December 1988 into their present Systems Management form.
Fault management provides the detection,
isolation, and correction of abnormalities in network operation. Configuration and Name Management facilities permit network managers to control
the configuration of the system, network, or layer
entities. Changed configurations may isolate faults,
alleviate congestion, or meet changing user needs.
Performance management enables the network
manager to monitor and evaluate the performance
of the system, network, and layer entities. Data
from performance management may be used to

The most important standards in this category are
Structure of Management Information (SMI), Parts
1,2, and 4 (CD 10165-1,2, and 4). (Part 3 is not
missing; rather, ISO merged Part 3 into Part 4.)
Included in these standards is an explanation of
the object-oriented paradigm, used to model a network in terms of object classes and attributes. In
object-oriented environments, a variable (for example, a variable called Modem) is defined both in
terms of the operations that can be performed on it
and the values of attributes it can possess. For example, Modem can have an attribute such as Status, which may have a value of Up or Down; a
network management system may obtain this value
via a Get operation or alter it via a Set operation.
Objects (including their attributes and operations) are stored in a Management Information
Base (MIB), sometimes called a Management Information Library (MIL). The SMI documents just

AUGUST 1991

@

Information Structure

1991 McGraw-Hili, Incorporated. Reproduction Prohibited.
Datapro Information Services Group. Delran NJ 08075 USA

Data Networking

ISO Reference Model for
Open Systems
Interconnection (051)

listed provide syntax and semantics for information in the MIB; however, as yet no single ISO
standard defines exactly what the OSI MIB will
contain, nor how vendors and users will register
objects in the standard MIB. SC21 WG4 is currently working to finalize the Structure of Management Information (SMI), providing guidelines that
can be used to define management objects and
their attributes. The final SMI will ensure interoperability among OSI-based network management
systems.
In the TCP/IP world, an Internet Standard
MIB exists for objects managed using SNMP. This
MIB functions in an analogous role to the proposed OSI MIB, although the administration and
rules governing the two are sure to differ.
MIB includes all information needed to make
management decisions. MIB is a conceptual repository of all OSI management data in an OSI environment. The MIB concept does not imply any
form of physical or logical storage for management
information, however, and its implementation is
outside the scope of OSI standards. Rather, the
SMI defines the abstract syntax and the semantics
of information so that it can be represented in OSI
protocol exchanges.
Protocols

Common Management Information Protocol
(CMIP), IS 9596, is the primary OSI Management
protocol. CMIP specifies procedures for the exchange of basic management information between
open systems interconnected by OSI protocols.
CMIP is intended to be a general-purpose management protocol suitable for the management of both
OSI resources and the real resources used to provide communications services.
X.SOO-The Directory
The Directory is a related standard designed to
manage name-related information concerning protocollayers and network nodes. These services connect the actual names used in the network with
names and addresses understood by human users.
The Directory is defined in CD 9594 and several
other OSI working drafts. CD 9594 attained DIS in
March 1988.

2783

21

Standards

OSI and the Future
OSl's future as the premier means of interconnecting multi vendor computer networks is almost a
certainty. Too many government agencies, vendors, trade associations, and users have staked
their futures on this architecture for it not to succeed. OSI applications protocols, such as CCITT
X.400, X.500, and EDI, are catching on and spurring OSl's adoption. The world needs a network of
computers, similar to standards for international
telephony, to link users across oceans and continents. OSI is perceived as the answer to this need.
The OSI Reference Model has some glitches
and holes, however, that prevent it from being
widely implemented. In the U.S., OSI and TCP/IP
proponents are badly divided. As an internetworking protocol, TCP/IP has proved its worth and is a
popular and commercially successful method of
linking users across diverse networks-particularly
LANs. OSI middle-layer protocols 3 through 5, the
alternatives to TCP/IP, are neither as practical nor
as simple to implement in the real world. Simple
Network Management Protocol (SNMP), the network management protocol for TCP/IP networks,
is also a proven, commercially successful solution.
As long as vendors and users require practical networking products, they will continue using TCPI
IP-based protocols-standards or not.
Although nobody can predict the future, OSI
will probably evolve to better serve user needs. A
possible scenario for wider OSI acceptance is that
OSI middle layers will migrate to resemble TCPI
IP, at least in functionality. One such implementation already exists. A product called Xpress
Transfer Protocol (XTP), a proprietary networking
scheme from Protocol Engines, Inc. (Santa Barbara, CA), is a streamlined version of OSl's middle
layers. XTP combines OSI layers 3 and 4 into one
protocol and has been officially proposed to ANSI's X3S3 Committee for adoption.
In many commercial networking applications,
however, vendors are blending different protocol
stacks from different sources to match user needs.
For instance, one vendor's network protocol might
graft together different layers from OSI, TCP/IP,
and IBM's SNA.

(
@ 1991 McGraw-Hili, Incorporated. Reproduction Prohibited.

Datepro Information Services Group. Delran NJ 08075 USA

AUGUST 1991

22

2783
Standar~s

In reality, OSI and other layered architectures
do not serve every application and are not a panacea. Proprietary architectures will continue to
thrive alongside OSI-based networks, especially for
closed user groups (where intemetworking is not a
requirement) or in time-sensitive applications intolerant oflayered protocols' high overhead.

AUOUST1991

ISO Reference Model for
Open S,.tems
Interconnection (O~IJ

Data Networking

All others who desire intemetworking must
realize that the associated protocols are still
evolving-nothing is truly cast in iron. In marketbased economies, products that do not satisfy market needs will not gain widespread favor.
Therefore, prospective users must evaluate OSI
protocols and their adoption with an eye toward
future standards developments.•

1991 McGraw-Hili. Incorporated. Reproduction Prohibited.
Oatapro Information Services Group. Delran NJ 08075 USA

4J)



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.3
Linearized                      : No
XMP Toolkit                     : Adobe XMP Core 4.2.1-c041 52.342996, 2008/05/07-21:37:19
Create Date                     : 2018:10:11 11:40:16-08:00
Modify Date                     : 2018:10:11 12:07:23-07:00
Metadata Date                   : 2018:10:11 12:07:23-07:00
Producer                        : Adobe Acrobat 9.0 Paper Capture Plug-in
Format                          : application/pdf
Document ID                     : uuid:e3e17bb4-7bb2-f94f-abe5-3ecb728e2834
Instance ID                     : uuid:e1c1f987-0851-674d-932a-e95ad6ceee68
Page Layout                     : SinglePage
Page Mode                       : UseNone
Page Count                      : 44
EXIF Metadata provided by EXIF.tools

Navigation menu