Fact-checked by Grok 2 weeks ago

Introduction

Definition and Scope

The OSI protocols constitute a comprehensive suite of international standards for , developed collaboratively by the (ISO) and the Telecommunication Standardization Sector of the [International Telecommunication Union](/page/International_Telecommunication Union) (ITU-T) during the to enable open systems interconnection (OSI). These standards establish a structured framework for coordinating the development of protocols that allow disparate computer systems to communicate effectively, focusing on the external interfaces rather than internal system operations. Central to the OSI protocols are their support for both connection-oriented services, which involve establishing and maintaining a logical connection prior to data transfer for reliable delivery, and connectionless services, which enable independent transmission without setup overhead. This dual approach underscores the suite's emphasis on , permitting seamless integration and data exchange across heterogeneous systems from different vendors and architectures. Unlike the suite, which emerged descriptively from implemented protocols to address practical needs, OSI protocols follow a prescriptive design that rigidly specifies interactions across a seven-layer to achieve universal . Their scope thus spans these layers—from physical transmission to application-level services—with dedicated protocols for each, though the suite's inherent complexity and delayed contributed to limited in favor of more pragmatic alternatives like .

Historical Development

The development of OSI protocols began in 1977 when the (ISO) established Technical Committee 97, Subcommittee 16 (TC97/SC16) to address the need for standardized open systems interconnection amid growing proprietary networking technologies. This initiative aimed to create a framework for interoperable computer networks, culminating in the OSI formalized as ISO 7498 in 1984, which outlined the seven-layer architecture. Earlier milestones included the 1980 publication of the Basic as a draft , providing the foundational structure for subsequent protocol development. Key events in the advanced the protocols themselves, with joint efforts between ISO and the (ITU-T) under the X.200 series of recommendations harmonizing the . By 1988, core protocols such as the Connectionless Network Protocol (CLNP, ISO 8473) and Transport Protocol Class 4 (TP4, part of ISO 8073) received approval, enabling implementation of and functions. These developments positioned OSI as an for open networking, though full protocol suites emerged primarily in the late and early 1990s. Despite these achievements, OSI protocols saw limited adoption due to their high complexity, which involved intricate layering and multiple protocol options that complicated compared to simpler alternatives. Late and deployment in the 1990s allowed the TCP/IP suite to dominate, as it was already widely implemented in academic and military networks by the mid-1980s. Political and economic factors further hindered uptake, including initial U.S. government mandates for OSI compliance that conflicted with ongoing TCP/IP investments by the Department of Defense, ultimately favoring the latter for its proven interoperability. As of 2025, OSI protocols persist in legacy applications within niche environments, such as certain ITU-T-defined signaling systems and interoperability gateways for older infrastructure. However, their practical use has largely diminished, while the OSI endures as an educational tool for conceptualizing network layering and protocol interactions.

The OSI Reference Model

Layer Functions and Architecture

The OSI Reference Model divides network communication into seven distinct layers, each responsible for specific functions that collectively enable open systems interconnection. The (Layer 1) handles the transmission and reception of raw bit streams over a physical medium, defining electrical, mechanical, and optical characteristics. The (Layer 2) provides node-to-node data transfer, including framing, , and . The Network Layer (Layer 3) manages logical addressing, , and delivery across interconnected networks. The (Layer 4) ensures end-to-end data delivery, reliability, flow control, and error recovery. The (Layer 5) establishes, manages, and terminates communication sessions between applications, including dialog control and synchronization. The (Layer 6) translates data between application-specific formats and network formats, handling syntax, , and . Finally, the (Layer 7) provides network services directly to end-user applications, such as and resource sharing. The model's architecture is built on principles of layered abstraction, where each layer offers services to the layer above it while hiding the complexities of the layer below, promoting modularity and interoperability. Communication occurs on a peer-to-peer basis, with corresponding layers on different systems exchanging information transparently through protocol data units (PDUs). Services between layers are invoked using four standard primitives: request (issued by the upper layer to initiate a service), indication (generated by the lower layer to notify the upper layer of an event), response (sent by the upper layer to acknowledge an indication), and confirm (delivered by the lower layer to complete a requested service). This service-oriented design facilitates standardized development and troubleshooting. Data units vary by layer to reflect their functional scope: bits at the , frames at the , packets at the Network Layer, segments at the , and generic PDUs for the upper layers (Session, , and Application). During transmission, the encapsulation process occurs as data descends the stack: each layer adds its own header (and sometimes trailer) to the data unit from the layer above, forming a new PDU for the next lower layer. On the receiving system, the process reverses, with each layer stripping its header/trailer to recover the original data unit and pass it upward, ensuring reliable and structured information flow.

Protocol Encapsulation and Interaction

In the OSI reference model, protocol encapsulation enables the structured exchange of data across layers by treating the output of one layer as input to the layer below. Specifically, each layer receives a (SDU) from the upper layer, prepends its own (PCI)—which includes headers or trailers for control, addressing, and error detection—and forms a (PDU) to pass downward. This process ensures that upper-layer data is progressively wrapped with necessary for transmission, while the reverse occurs on reception, where PDUs are unwrapped layer by layer to recover the original SDU. Service access points (SAPs) serve as the conceptual interfaces between adjacent layers, defining the points where an upper-layer entity requests or receives services from the lower layer. These points encapsulate the boundaries of service provision, allowing independent layer operations while maintaining modularity. A prominent example is the (NSAP), which identifies the interface between the network layer and the , facilitating addressing and service invocation in OSI networks. OSI protocols support various connection modes to manage data flow, including full-duplex (simultaneous bidirectional communication) and half-duplex (alternating bidirectional communication), depending on the service type and layer requirements. Associations between peer entities are established, maintained, and terminated using standardized service primitives, such as for initiating a and for terminating it, which abstract the underlying operations into user-visible commands. Inter-layer dependencies in the OSI model ensure seamless operation, with lower layers providing transparent transport services—delivering data without interpretation of its content—to the layers above. Upper layers, in turn, rely on these services assuming reliability, error correction, and sequencing where provided, allowing each layer to focus on its specific functions without direct involvement in lower-layer details.

Lower Layer Protocols

Physical Layer Protocols

The Physical Layer, or Layer 1 of the OSI model, encompasses protocols and standards that define the physical transmission of raw bit streams over a communication medium, including electrical, , and functional specifications for interfaces and signaling. These protocols ensure the reliable transport of bits without regard to their meaning, focusing solely on the hardware aspects of data movement between devices. Core standards in this layer include ISO 2110, which specifies the 25-pole connector and contact assignments for (DTE) to (DCE) interfaces, serving as the physical basis for serial communications related to ITU-T V.24 and EIA RS-232. Similarly, ISO 8802 series standards, such as ISO/IEC/IEEE 8802-3, outline physical layer specifications for local area networks (LANs), including with (CSMA/CD) mechanisms and media access for Ethernet at various speeds. Key functions of Physical Layer protocols involve bit synchronization to align sender and receiver clocks for accurate data timing. In standards like X.21 for public data networks, this is achieved through separate clock signals provided via dedicated interface pins. Embedded clock signals in the bit stream, such as in encoding, aid synchronization in other contexts. Transmission modes supported include (unidirectional), half-duplex (bidirectional but alternating), and full-duplex (simultaneous bidirectional), depending on the interface, with synchronous operations emphasized in standards like X.21 for public data networks. Signal encoding techniques, such as (NRZ) for simple binary representation where a high voltage denotes a 1 and low a 0, and encoding for self-clocking bits with mid-bit transitions to aid synchronization, are integral to maintaining over the medium. Supported media types range from electrical conductors like and coaxial cables to for higher bandwidths, enabling diverse applications in wired networks. For instance, the ISDN , defined by I.430, utilizes twisted pair wiring to provide 2B+D channels (144 kbit/s total) at the user-network , specifying layer 1 characteristics including line and activation/deactivation procedures. These protocols are inherently hardware-oriented, concentrating on physical signaling and without incorporating error detection or correction mechanisms, which are deferred to higher layers like the for frame-level integrity. Their adoption persists primarily in legacy systems, such as serial ports and early infrastructures, where compatibility with older equipment remains essential despite the shift toward modern Ethernet and optical standards. The Data Link Layer of the OSI reference model provides node-to-node data transfer services, ensuring reliable communication between adjacent devices on a single physical link by organizing bits into frames and detecting transmission errors. This layer operates on a hop-by-hop basis, abstracting the physical medium's characteristics while preparing data for the Network Layer above. Key OSI standards for this layer emphasize bit-oriented framing, error detection via cyclic redundancy checks (), and flow control mechanisms to manage data exchange over point-to-point or shared media links. The is divided into two sublayers: the (LLC) sublayer and the Media Access Control (MAC) sublayer. The LLC sublayer, defined in ISO/IEC 8802-2 (last reviewed and confirmed in 2009), serves as the interface to the Network Layer, providing multiplexing, flow control, and error recovery services through three types of operations: Type 1 for unacknowledged connectionless service, Type 2 for connection-oriented service with reliable delivery, and Type 3 for acknowledged connectionless service. It uses protocol data units (PDUs) to encapsulate higher-layer data and manage logical links, enabling multiple network protocols to share the same physical medium. The MAC sublayer handles medium access and frame transmission, as specified in ISO/IEC/IEEE 8802-3 for Ethernet networks, where it employs the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol to arbitrate access on shared half-duplex media while supporting full-duplex operations in modern variants. Central to Data Link Layer protocols are framing and error detection functions, primarily through (HDLC) derivatives. The HDLC frame structure, originally defined in the withdrawn ISO/IEC 3309:1993 and now incorporated in ISO/IEC 13239:2002, delimits frames using a flag sequence (01111110 ) at the beginning and end, ensures via bit stuffing to avoid flag emulation in data, and includes a Frame Check Sequence (FCS) field using either a 16-bit or 32-bit for error detection. This structure supports information, supervisory, and unnumbered frames for data transfer, link management, and control. A key derivative is the Link Access Procedure, Balanced (LAPB), standardized in ISO/IEC 7776:1995 as the protocol for X.25 networks, which adopts HDLC framing and for reliable bit-oriented communication over synchronous duplex links between (DTE) and (DCE). LAPB frames include address, control, and data fields, with procedures for in sequence numbering to detect errors. Flow control in these protocols prevents and ensures orderly delivery, typically via a sliding mechanism as outlined in HDLC procedures (now in ISO/IEC 13239:2002, incorporating withdrawn ISO 4335). This allows multiple frames to be transmitted before acknowledgment, with the window size limiting outstanding unacknowledged frames to maintain link efficiency on point-to-point . In LAPB and LLC Type 2 operations, the sliding window supports establishment, , and disconnection phases, using supervisory frames for acknowledgments and retransmissions. These protocols find primary use in point-to-point (WAN) links, such as those in legacy X.25 packet-switched networks where LAPB ensures reliable frame delivery over leased lines or public data networks. In local area networks, ISO 8802-3's sublayer with CSMA/CD facilitates shared medium access in early Ethernet implementations, though modern Ethernet deployments predominantly leverage TCP/IP for end-to-end functionality, rendering full OSI adherence incomplete as upper-layer OSI protocols are rarely used.

Core Layer Protocols

Network Layer Protocols

The in the OSI reference model is responsible for providing services, enabling the transfer of data between end systems across multiple subnetworks through logical addressing, delivery, and mechanisms for management. This layer operates on a best-effort basis, fragmenting and reassembling packets as needed while handling decisions at intermediate systems. Key functions include the assignment of unique logical addresses to network service access points (NSAPs), as defined in ISO/IEC 8348/Add.2, which supports hierarchical addressing schemes for global identification of endpoints. delivery ensures connectionless transport of protocol data units (PDUs) without establishing virtual circuits, while control is facilitated through priority fields and discard eligibility indicators in PDUs to manage network load. The primary OSI Network Layer protocols are the Connectionless Network Protocol (CLNP), specified in ISO/IEC 8473-1, and the Connection-Oriented Network Service (), defined in ISO/IEC 8878. CLNP provides a datagram-based service for unreliable, connectionless delivery of data across internetworks, supporting both intra-domain and inter-domain . It includes options for , recording route information, and specification to optimize delivery paths. In contrast, CONS establishes virtual circuits for reliable, sequenced delivery, mapping OSI service primitives to underlying subnetwork protocols. Both protocols rely on NSAP addressing for endpoint identification, where addresses consist of an initial domain part () for and a domain-specific part () for local resolution, ensuring scalability in large networks. CLNP PDUs feature a variable-length header with a fixed part of 9 octets that includes essential fields such as the network layer identifier, indicator, lifetime (to prevent indefinite looping), PDU type (e.g., or ), and segmentation parameters for handling large payloads across subnetworks with varying maximum units, followed by optional variable parts for addresses, checksums, and security, with segmentation supported via offset and fields to fragment and reassemble datagrams. reporting in CLNP is managed through dedicated Error Report PDUs (ERPDUs), which notify source systems of issues like unrecognized options or delivery failures, including diagnostic codes and partial from the discarded PDU. CONS integrates closely with X.25 packet-switched networks, where ISO/IEC 8878 specifies the mapping of connection-oriented services onto X.25's packet layer protocol, enabling establishment, data transfer, and teardown over public data networks. This allows OSI end systems to leverage existing X.25 infrastructure for reliable internetworking, with convergence functions handling subnetwork dependencies like flow control. Despite their standardization, CLNP and CONS saw limited adoption outside and military sectors, primarily through profiles like the U.S. Government OSI Profile (GOSIP), which mandated their use in federal procurements but struggled against the widespread dominance of TCP/IP protocols.

Transport Layer Protocols

The OSI transport layer provides end-to-end transfer services, ensuring reliable communication between hosts atop the layer, which handles and addressing. The primary connection-oriented protocol is Transport Protocol Class 4 (TP4), specified in ISO/IEC 8073 (equivalent to ITU-T Recommendation X.224), which supports both connection-oriented and connectionless services for versatile deployment. TP4 implements key functions including segmentation and reassembly of units to manage varying packet sizes, flow control to prevent through mechanisms like credit-based windowing, and /demultiplexing via Transport Service Access Points (TSAPs) that identify specific processes on remote hosts. Error recovery in TP4 relies on checksums for integrity verification and selective retransmissions to handle lost or corrupted data units, enabling robust operation over unreliable paths. The protocol defines five classes of service to balance functionality and overhead: Class 0 (TP0) offers basic segmentation/reassembly for error-free, connection-oriented networks with minimal features; Class 1 (TP1) adds simple error recovery via acknowledgments and retransmissions; Class 2 (TP2) emphasizes multiplexing over a single connection without error recovery; Class 3 (TP3) combines multiplexing with basic error recovery; and Class 4 (TP4) provides comprehensive reliability, including advanced flow control, expedited data for priority transmission, and inactivity detection to terminate idle connections, making it suitable for error-prone environments using either connection-oriented network service (CONS) or connectionless network service (CLNS). These classes allow adaptation to network quality, with TP4 being the most feature-rich and widely referenced for demanding applications. (Note: Adapted from Cisco Internetworking Technology Handbook, Chapter on OSI Protocols) For connectionless operations, the Connectionless Transport Protocol (CLTP), defined in ISO/IEC 8602 (ITU-T Recommendation X.234), enables datagram-style transmission without prior connection setup, integrating seamlessly with the connectionless by appending TSAP identifiers to network addresses for process-level delivery. CLTP includes minimal error detection via checksums but forgoes retransmissions, prioritizing low over guaranteed delivery, and supports extensions for group communications when paired with compatible network services. This protocol complements TP4 by offering lightweight alternatives for applications like transfer, while relying on the underlying for basic addressing and routing.

Upper Layer Protocols

Session Layer Protocols

The session layer in the OSI reference model manages communication sessions between applications, establishing, maintaining, and terminating dialogues while ensuring synchronization and recovery mechanisms. The core protocol defining these capabilities is the Connection-oriented Session Protocol, standardized as ISO/IEC 8327-1, which specifies procedures for the transfer of data and control information between peer session entities through the exchange of session protocol data units (SPDUs). This protocol supports both full-duplex and half-duplex operations, allowing flexible data exchange modes depending on the application's requirements. Identical to ITU-T Recommendation X.225, it emphasizes a general-purpose design for in open systems interconnection environments. Key functions of the ISO 8327 protocol include dialog control, which manages turn-taking between communicating entities to prevent conflicts in multi-party interactions; activity management, which structures sessions into discrete activities for organized data exchange; checkpointing and resynchronization, enabling recovery from interruptions by defining synchronization points; and exception handling, which reports and addresses errors during session operations. Dialog control is achieved through token-based mechanisms that regulate who may transmit data at any given time, supporting structured conversations. Activity management delimits logical units of work within a session, while checkpointing inserts minor or major sync points to allow resumption from the last valid state after failures. Exception handling facilitates the reporting of issues like protocol violations or connection losses, ensuring graceful degradation. The protocol defines specific for session , including CONNECT and ACCEPT SPDUs for establishing sessions, REFUSE SPDUs for denial, and RELEASE or ABORT SPDUs for termination, which collectively handle and unbinding of sessions between entities. Tokens for are managed via GIVE TOKENS and PLEASE TOKENS SPDUs, which control access to shared resources and maintain order in dialogues. These primitives operate atop connections, providing higher-level coordination without altering underlying . In practice, the ISO 8327 protocol coordinates multi-turn interactions in applications requiring extended dialogues, such as , where it underpins the File Transfer, Access, and Management (FTAM) protocol defined in ISO 8571 by managing session activities and resynchronization during large data transfers. For instance, FTAM leverages session tokens and checkpoints to ensure reliable, ordered exchange of file segments across distributed systems. This integration highlights the protocol's role in enabling robust, application-specific communication flows.

Presentation Layer Protocols

The Presentation Layer in the provides protocols for ensuring that data is represented in a standardized, interoperable format regardless of the underlying or software differences between communicating systems. The primary specification is the connection-oriented Presentation protocol defined in Recommendation X.226 (equivalent to ISO/IEC 8823-1), which outlines procedures for transferring data and control information between presentation entities. This supports key functions such as connection establishment, data transfer, and context alteration, enabling the negotiation of data formats during communication setup. Central to these protocols is Abstract Syntax Notation One (ASN.1), specified in ITU-T Recommendation X.680 (equivalent to ISO/IEC 8824-1), a formal notation for defining data types, values, and structures independently of specific encoding or implementation details. ASN.1 allows applications to describe abstract syntaxes, which are then mapped to transfer syntaxes for actual transmission. Transfer syntaxes include the Basic Encoding Rules (BER) and Canonical Encoding Rules (CER), detailed in ITU-T Recommendation X.690 (equivalent to ISO/IEC 8825-1), which provide rules for serializing ASN.1 structures into bit streams. These encoding rules ensure that data can be consistently interpreted across diverse systems, with BER offering a flexible, tag-length-value format and CER enforcing canonical forms for deterministic encoding. The protocol's functions emphasize syntax negotiation, where communicating entities agree on abstract and transfer syntaxes via Presentation Protocol Data Units (PPDUs), such as the Connection Request (CP) PPDU, to handle data translation. For instance, the facilitates conversion between character encodings like ASCII and , shielding applications from format incompatibilities. The layer also supports general functions such as optional and for secure and efficient data exchange, as negotiated in the context. This abstraction promotes interoperability by isolating application logic from low-level representation details, as seen in systems like the Message Handling System, which relies on these protocols for encoding and transferring messages across heterogeneous networks.

Application Layer Protocols

The OSI Application Layer, layer 7 of the reference model, provides application services and processes that enable end-user interactions with network resources, facilitating tasks such as file transfer, terminal emulation, messaging, and directory access. These services operate through autonomous application processes, which are entities that invoke network functionalities via application-protocol invocations (AP-invocations), allowing distributed applications to communicate seamlessly across heterogeneous systems. Application processes distinguish between Common Application Service Elements (CASE), which offer generic infrastructure for application-layer interactions, and Specific Application Service Elements (SASE), which implement domain-specific functionalities built upon CASE. This separation ensures modularity, where CASE handles foundational controls like association establishment, while SASE addresses specialized needs such as file management or message handling. Central to CASE is the Association Control Service Element (ACSE), defined in ISO 8649, which manages the establishment, maintenance, and release of application associations between peer processes. ACSE supports connection-mode operations, enabling secure and reliable initiation of communications by negotiating parameters like application context and user identities, thus serving as the foundational mechanism for OSI application-layer connections. Complementing ACSE, the , specified in ISO 9072, provides remote procedure call-like operations, allowing an invoking application process to request actions on a remote peer, including invoke, return result, and error handling primitives. ROSE operates in conjunction with ACSE to support interactive, distributed applications without requiring full symmetry. Among SASE protocols, the File Transfer, Access, and Management () protocol, standardized as ISO 8571, enables the transfer, , and manipulation of files in a distributed , abstracting differences through a file store model. FTAM supports operations like reading, writing, and deleting files while accommodating various file structures and rights, making it suitable for interoperable file services in OSI networks. The () protocol, outlined in ISO 9040, standardizes terminal interactions by defining a that emulates diverse real terminals, allowing users to remote applications without hardware-specific adaptations through profile-based . For messaging, the Message Handling System provides store-and-forward capabilities for electronic mail and interpersonal communications, operating as an OSI application-layer service that routes messages across message transfer agents while supporting distribution lists and receipts. Directory services are facilitated by , defined in ISO 9594, which offers a distributed for locating and retrieving about network resources, users, and services through directory user agents and servers. Additionally, the Common Management Information (CMIP), based on ISO 9595, supports application-layer access to management , though its primary role aligns with broader network oversight. These protocols collectively ensure that OSI applications deliver user-centric network interfaces, leveraging underlying presentation-layer syntax for data representation when needed.

Specialized OSI Protocols

Routing Protocols

Routing protocols in the OSI model operate at the network layer to determine paths for data transmission across interconnected systems, primarily supporting the Connectionless Network Protocol (CLNP) defined in ISO 8473. These protocols facilitate the exchange of routing information between end systems () and intermediate systems (IS), enabling efficient packet forwarding using Network Service Access Point (NSAP) addressing as specified in ISO 8348/Add.2. The key OSI routing protocols are the End System to Intermediate System () protocol, standardized in ISO 9542, and the Intermediate System to Intermediate System () protocol, defined in ISO 10589. The ES-IS protocol, outlined in ISO 9542:1988, enables end systems and intermediate systems to discover each other and exchange basic routing information for initial connectivity in OSI networks. It operates by having end systems periodically broadcast End System Hello (ESH) protocol data units (PDUs) to announce their NSAP addresses and subnetwork point of attachment (SNPA) details to nearby intermediate systems, allowing IS to build an adjacency database of reachable ES. Conversely, intermediate systems transmit Intermediate System Hello (ISH) PDUs to inform end systems of available routing paths, supporting functions like NSAP addressing resolution and redirecting packets to optimal IS for further forwarding. This discovery mechanism ensures that ES can locate the nearest IS without maintaining a full topology view, focusing on local subnet awareness rather than global routing decisions. The protocol, specified in ISO 10589 and republished as RFC 1142 for broader reference, provides dynamic link-state among intermediate systems to construct and maintain a comprehensive database. IS exchange Link State PDUs (LSPs) that describe local , including directly connected neighbors, NSAP prefixes, and metrics, which are flooded throughout the domain to build a synchronized link-state database at each IS. Shortest path calculations within this database employ to determine optimal routes based on configurable metrics such as default cost, delay, expense, or error rates, supporting equal-cost multipath forwarding for load balancing. IS-IS integrates closely with CLNP by using the database to forward network PDUs to destination NSAPs, ensuring hierarchical addressing resolution where the area address portion of NSAPs guides intra- and inter-area decisions. IS-IS operates in a hierarchical manner with defined levels to scale in large OSI domains. Level 0 , implicitly handled via ES-IS coordination, confines end systems to local areas without direct inter-domain involvement. Level 1 occurs within an area, where IS maintain a database of intra-area LSPs and compute paths to local destinations or the nearest exit to a Level 2 router, using the attached bit in LSPs to signal boundary IS. Level 2 spans the entire domain, with participating IS forming a backbone subdomain that propagates inter-area LSPs and calculates paths between areas, preventing loops through summarization of area addresses. This level structure allows Level 1 IS to rely on Level 2 for external , reducing computational overhead in subdivided networks. Adoption of OSI routing protocols has been limited primarily to legacy environments, with ES-IS and IS-IS seeing use in early government and research networks implementing full OSI stacks. , in particular, persists in some MPLS backbones for its extensibility and multi-protocol support, though it contrasts with IP-dominant protocols like OSPF for intra-domain link-state and BGP for inter-domain path selection, rendering OSI variants mostly historical outside specialized CLNP deployments.

Network Management Protocols

Network management protocols in the provide standardized mechanisms for monitoring, configuring, and controlling network elements to ensure reliable operation and fault detection. The primary protocol is the Common Management Information Protocol (CMIP), defined in ISO/IEC 9596-1:1998, which operates at the to facilitate communication between management entities. CMIP builds on the Common Management Information Service Element (CMISE), specified in ISO/IEC 9595, enabling the exchange of management information through a structured set of operations and notifications. CMIP employs a manager-agent architecture, where a central manager initiates requests to distributed agents residing on managed network devices, allowing for centralized oversight of the network's state. Managed objects, which represent network resources such as interfaces or routers, are modeled using the Guidelines for the Definition of Managed Objects (GDMO) in ISO/IEC 10165-4:1997, providing templates for attributes, behaviors, and relationships to ensure consistent representation across systems. Key functions include basic operations like M-GET for retrieving object attributes, M-SET for modifying them, and M-ACTION for invoking specific behaviors, each typically confirmed via response PDUs to verify completion or report errors. Event reporting, such as M-EVENT-REPORT, allows agents to asynchronously notify managers of alarms or state changes, supporting proactive fault management. To enable these interactions, CMIP relies on underlying OSI application-layer services: the Association Control Service Element (ACSE, ISO/IEC 8650-1) for establishing and releasing management associations, and the Remote Operations Service Element (, ISO/IEC 9072-1) for invoking remote operations with scoping and filtering to limit queries to relevant object subsets. A variant, CMIP over TCP/IP (CMOT), adapts CMIP for use over protocols by mapping ACSE and onto /, as detailed in 1189, facilitating hybrid environments without full OSI stack dependency. Compared to the (SNMP), which dominates environments due to its simplicity, CMIP offers more comprehensive features like action-oriented operations and stronger security through association-based authentication, though its complexity has limited widespread adoption. CMIP finds primary application in the Telecommunications Management Network (TMN), an framework for managing telecom infrastructures, where it supports Q3 interfaces for element and layers as outlined in Recommendation M.3010.

References

  1. [1]
    X.200 : Information technology - Open Systems Interconnection - Basic Reference Model: The basic model
    ### Summary of X.200: Open Systems Interconnection (OSI) Basic Reference Model
  2. [2]
    ISO/IEC 7498-1:1994
    ### Summary of ISO/IEC 7498-1:1994
  3. [3]
    The New Chips on the Block - IEEE Spectrum
    The level designations relate to the seven-layer open systems interconnection (OSI) model developed (but never adopted) as a framework for protocol standards by ...
  4. [4]
    ISO 7498:1984 - Basic Reference Model
    Status. : Withdrawn ; Publication date. : 1984-10 ; Stage. : Withdrawal of International Standard [95.99] ; Edition. : 1 ; Number of pages. : 40.
  5. [5]
  6. [6]
  7. [7]
    OSI: The Internet That Wasn't - IEEE Spectrum
    A layered approach: The OSI reference model (left column) divides computer communications into seven distinct layers, from physical media in layer 1 to ...
  8. [8]
    The Department of Defense - OSI and TCP/IP
    The 1985 NRC report was one of many indications in the mid-1980s that TCP/IP would be subsumed by OSI. To this point, the growth of TCP/IP had not been a ...
  9. [9]
    [PDF] ISO/IEC 7498-1 - Ecma International
    Jun 15, 1996 · 1.2 The term Open Systems Interconnection (OSI) qualifies standards for the exchange of information among systems that are "open" to one ...
  10. [10]
    ISO/IEC/IEEE 8802-3:2021
    In stock 2–5 day deliveryThis document defines Ethernet local area, access and metropolitan area networks. Ethernet is specified at selected speeds of operation.Missing: OSI | Show results with:OSI
  11. [11]
  12. [12]
    Transmission Media in Computer Networks - GeeksforGeeks
    Oct 3, 2025 · There are 3 major types of Guided Media: Twisted Pair, Coaxial and Optical Fiber Cables ... Physical Layer in OSI Model. 3 min read · Types of ...Missing: ISDN ITU- 430
  13. [13]
    I.430 : Basic user-network interface - Layer 1 specification
    ### Summary of ISDN Basic Rate Interface Physical Layer and Media Types (ITU-T Rec. I.430)
  14. [14]
    Physical Layer in OSI Model - GeeksforGeeks
    Sep 19, 2025 · Protocols in Physical Layer ; Ethernet (IEEE 802.3) : Widely used for wired networks. ; Wi-Fi (IEEE 802.11) : For wireless communication.Missing: 2110 X. 21
  15. [15]
  16. [16]
    ISO/IEC 3309:1993 - Frame structure
    ISO/IEC 3309:1993 specifies the frame structure for data communication systems using HDLC, defining frame components, delimiting sequences, and mechanisms for ...
  17. [17]
  18. [18]
    8802-2-1994 - ISO/IEC/IEEE International Standard - Information ...
    The functions, features, protocol, and services of the Logical Link Control (LLC) sublayer, which constitutes the top sublayer in the data link layer of the ...
  19. [19]
  20. [20]
    [PDF] International Standard @ 4335
    Dec 15, 1979 · High level data link control (HDLC) procedures are designed to permit synchronous bit sequence independent. 0 data transmission. This ...Missing: sliding window
  21. [21]
    ISO/IEC 8473-1:1998 - Information technology — Protocol for ...
    Status. : Published ; Publication date. : 1998-11 ; Stage. : International Standard confirmed [90.93] ; Edition. : 2 ; Number of pages. : 57.Missing: CLNP | Show results with:CLNP<|separator|>
  22. [22]
    [PDF] INTERNATIONAL STANDARD ISO/IEC 8348
    ISO/. IEC 8348: 1993 defines the Network service access point (NSAP) address as an identifier for a single NSAP, supporting a Network service that is ...
  23. [23]
    [PDF] ISO-IEC-8473-1-1998.pdf - iTeh Standards
    The operation of the PDU lifetime control function depends upon the lifetime field in the PDU header. This field contains, at any time, the remaining ...
  24. [24]
    ISO/IEC 8878:1992 - Information technology
    For a protocol to support the CONS, there must be a mapping between the abstract primitives and parameters of the CONS and the real elements of the protocol ...Missing: Oriented | Show results with:Oriented
  25. [25]
    RFC 941: Addendum to the network service definition covering ...
    This Addendum to the Network Service Definition Standard, ISO 8348, defines the abstract syntax and semantics of the Network Address (Network Service Access ...
  26. [26]
  27. [27]
  28. [28]
    [PDF] Ecma International
    Dec 12, 1985 · The Standard specifies a minimal set of procedures that will support the ISO Connection-Oriented Network Service, principally by the use of ...
  29. [29]
    [PDF] Government open systems interconnection profile users' guide
    In either the DOD or OSI protocol architectures, the Internet Protocol (IP) or CLNP performs thead- dress translation and routing functions required to ...
  30. [30]
    X.224 : Information technology - Open Systems Interconnection - ITU
    Dec 10, 2008 · X.224 is a protocol for providing the connection-mode transport service in Open Systems Interconnection.
  31. [31]
    RFC 905: ISO Transport Protocol specification ISO DP 8073
    Indicate the calling and called transport service access points. When either network address unambiguously defines the transport address this information ...
  32. [32]
    X.234 : Information technology - Protocol for providing the OSI ... - ITU
    X.234 (07/94), Information technology - Protocol for providing the OSI connectionless-mode transport service, In force. X.234 (1994) Amendment 1 (11/95)
  33. [33]
    ISO/IEC 8602:1995 - Information technology — Protocol for ...
    Specifies procedures for the connectionless-mode transmission of data and protocol control information; procedures for the correct interpretation of transport ...Missing: CLTP | Show results with:CLTP<|separator|>
  34. [34]
    ISO/IEC 8327-1:1996 - Connection-oriented Session protocol
    Open Systems Interconnection — Connection-oriented Session protocol: Protocol specification · General information.
  35. [35]
    X.226 : Information technology - Open Systems Interconnection - ITU
    Mar 9, 2023 · X. 226 : Information technology - Open Systems Interconnection - Connection-oriented Presentation protocol: Protocol specification.
  36. [36]
    [PDF] ISO-IEC-8823-1-1994.pdf - iTeh Standards
    The functions of the Presentation Layer are described in the Reference Model, ITU-T Rec. X.200 I ISO/IEC 7498, and are further expanded in the Presentation ...
  37. [37]
    ISO/IEC 8822:1994 - Information technology
    The service defined is the connection-oriented service which is provided by the OSI connection-oriented presentation protocol and the connectionless service ...
  38. [38]
    ISO/IEC 9545:1994(en), Information technology
    This Recommendation | International Standard is a refinement of the description of the OSI Application Layer contained in ITU-T Rec. ... application-process- ...Missing: SASE | Show results with:SASE
  39. [39]
    Understanding OSI - Chapter 9 - Packetizer
    The CASE standards provide additional infrastructure in the application layer and the SASE standards provide for real applications using that infrastructure.
  40. [40]
    [PDF] STANDARD ISO/IEC 8649
    This Servic : Definition defines ACSE services for application-association control in an open systems interconnection environmei . ACSE supports two modes of ...
  41. [41]
    ISO/IEC 9072-2:1989 - Information processing systems
    The ROSE services are provided in conjunction with the Association Control Service Element (ACSE) services (ISO 8649) and the ACSE protocol (ISO 8650) ...<|separator|>
  42. [42]
    ISO 8571-1:1988(en), Information processing systems
    ISO 8571 defines a file service and specifies a file protocol available within the application layer of the Reference Model. The service defined is of the ...
  43. [43]
    File Transfer, Access and Management — Part 3: File Service ... - ISO
    This part of ISO 8571 defines in an abstract way the externally visible file transfer, access and management service within the OSI Application Layer in terms ...
  44. [44]
    [PDF] INTERNATIONAL STANDARD ISO/IEC 9040
    The Basic Class VT Service provides for the use of virtual terminal environment profiles (VTE-profiles) which are sets of. VTE-parameters and VTE-parameter ...
  45. [45]
    [PDF] Rec.ITU-T F.400/X.400 (11/1988) - MESSAGE HANDLING SYSTEM ...
    This Recommendation overviews the capabilities of an. MHS that are used by Administrations for the provision of public MH services to enable users to exchange ...
  46. [46]
    ISO/IEC 9594-1:2014(en), Information technology — Open Systems ...
    The Directory provides the directory capabilities required by OSI applications, OSI management processes, other OSI layer entities, and telecommunications ...
  47. [47]
    [PDF] ISO/IEC 9596-1 - iTeh Standards
    Oct 15, 1998 · The Common Management Information Protocol (CMIP) specifies protocol elements that may be used to provide the operation and notification ...
  48. [48]
    ISO 9542:1988 - Information processing systems
    Specifies a protocol used by Network Layer entities in End Systems (ES) and Intermediate Systems (IS) to maintain routing information.
  49. [49]
    ISO/IEC 10589:2002
    In stockThis International Standard specifies a protocol which is used by Network Layer entities operating the protocol specified in ISO 8473 in Intermediate Systems ...
  50. [50]
    ISO CLNS Configuration Guide, Cisco IOS Release 15.0S
    Mar 1, 2004 · ISO 9542—Documents the ES-IS routing exchange protocol. • ISO 8473—Documents the ISO Connectionless Network Protocol (CLNP). • ISO 8348/Ad2 ...
  51. [51]
    IP Routing: ISIS Configuration Guide - IS-IS Overview and Basic ...
    Feb 15, 2016 · This module provides a technical overview of the Integrated Intermediate System-to-Intermediate System (IS-IS) routing protocol.
  52. [52]
    IS-IS Design Considerations on MPLS backbone - OrhanErgun
    Jan 20, 2020 · Using IS-IS with MPLS require some important design considerations. IS-IS as a scalable link state routing protocol has been used in the Service Provider ...
  53. [53]
    ISO/IEC 9596-1:1998 - Information technology
    In stockThis Recommendation | International Standard specifies a protocol which is used by application layer entities to exchange management information.