SlideShare uma empresa Scribd logo
1 de 33
OSI Reference ModelOSI Reference Model
Sayyed sabir shahSayyed sabir shah
Department of technologyDepartment of technology
Sarhad university of information technologySarhad university of information technology
PeshawarPeshawar
The Need For Standards.The Need For Standards.
• Over the past couple of decades many of the networks that
were built used different hardware and software
implementations, as a result:
– They were incompatible and it became difficult for networks using
different specifications to communicate with each other.
• The companies involved in networks development realized
that they needed to move from proprietary networking
system into open system.
• Proprietary systems are privately developed, owned and
controlled.
– Disadvantages are:
• Leads to monopolistic environment.
• Slows down the development of networking products.
• Open system is the opposite of proprietary systems.
– Advantages are:
• Leads to competitive environment.
• Accelerates the development of networking products.
The Need for Standards.The Need for Standards.
• To address the problem of networks being
incompatible and unable to communicate with each
other, the International Organisation for
Standardisation (ISO) created a NETWORK
MODEL.
• This NETWORK MODEL would help the vendor to
create interoperable network implementations.
• This NETWORK MODEL is called OSI Reference
Model.
Layered Tasks.Layered Tasks.
• We use the concept of layerslayers in our daily life.
• As an example, let us consider two friends who
communicate through postal mail.
• The process of sending a letter to a friend would be
complex if there were no services available from the post
office.
• This process of sending mail can be divided into several
phases/activities and each phase/activities is called layer.
Figure.Figure. Tasks involved in sending a letterTasks involved in sending a letter
Hierarchy.Hierarchy.
• In the previous mail communication example, we saw that
three activities were performed at the sender side and
another three activities were preformed at the receiver side.
• The task of transporting the mail between the sender and
receiver is done by the carrier.
• On important thing is that tasks must be done in the order
given in the hierarchy.
– At the sender side, the letter must be written and dropped into the
mailbox before being picked up by the mail carrier and delivered to
the post office.
– At the receiver side, the letter must be dropped in the recipient
mailbox before being picked up and read by the recipient.
The OSI Reference Model.The OSI Reference Model.
• The model was developed by the International Organisation
for Standardisation (ISO) in 1984. It is now considered the
primary architectural model for inter-computer
communications.
• The Open Systems Interconnection (OSI) reference model is
a descriptive network scheme. It ensures greater
compatibility and interoperability between various types of
network technologies.
• The OSI model describes how information or data makes its
way from application programmes (such as spreadsheets)
through a network medium (such as wire) to another
application programme located on another network.
• The OSI reference model divides the problem of moving
information between computers over a network medium into
SEVEN smaller and more manageable problems .
• This separation into smaller more manageable functions is
known as layering.
A Layered Network Model.A Layered Network Model.
• The OSI Reference Model is composed of seven
layers, each specifying particular network functions.
– The process of breaking up the functions or tasks of
networking into layers reduces complexity and makes
learning easier to understand.
– It breaks the network communication into smaller,
simpler parts that are easier to develop.
– It allows different types of hardware and software to
communicate with each other.
– It prevents changes in one layer from affecting the other
layers.
Layers of OSI Reference Model.Layers of OSI Reference Model.
Encapsulation.Encapsulation.
• As the data flows down through the layers in the hierarchy,
each layer adds some extra information to the data in the
form of headers or tailors.
• This process of wrapping data with headers and tailors is
called encapsulation.
• These extra information are added for:
– To enable the opposite corresponding layer to take the right
operation on the data (to facilitate his work).
– To enable the network to transfer the data accurately from the
source to the destination.
• Through these information each layer actually
communicates with the opposite corresponding layer and
this is called peer-to-peer communication.
• At the receiver side De-Encapsulation take place.
Encapsulation.Encapsulation.
Physical Layer.Physical Layer.
• The physical layer performs the functions required to transmit a bit stream
over a physical medium.
• It deals with the mechanical and electrical specification of the transmission
media.
• The major duties performed by physical layer are:
– Physical characteristics of interface and media.
• Defines the characteristics of the interface between the devices and the
transmission media.
• It also defines the type of transmission medium.
– Representation of bits:
• Physical layer receives a steam of bits (sequence of 0s and 1s) without any
interruption.
• To be transmitted, bits must be encoded into a signals – electrical or optical.
• The physical layer defined the type of representation ( how 0s and 1s are changed
into signals).
– Data rate:
• The transmission rate – the number of bit per second- is also defined by the
physical layer.
• Repeater is a device of the physical layer.
• Physical layer protocols are encoding techniques (RZ, NRZ, Manchester etc).
Physical Layer.
Data Link Layer.Data Link Layer.
• The data link layer is responsible for moving frames from
one hop (node) to the next.
• The major duties of the data link layer are:
– Framing:
• The data link layer divides the stream of bits steam from the network
layer into manageable data units called frames.
– Physical addressing:
• If frame is to be distributed to different systems on the network, the
data link layer adds a header to the frame to define the sender and
receiver of the frame.
• Physical address is the MAC address, which is hard coded into NIC
and is of 48-bit represented by Hexadecimal format.
– Flow control:
• If the rate at which the data are absorbed by the receiver is less than the
rate produced in the sender, the data link layer imposes a flow control
mechanism to prevent overwhelming the receiver.
Data Link Layer.Data Link Layer.
– Error control:
• The data link layer adds reliability to the physical layer by adding
mechanism to detect and retransmit damaged or lost frames.
• It also uses a mechanism to prevent duplication of frames.
• Error control is normally achieved through a trailer added to the end of
the frame.
– Access control:
• The data link layer protocol has to determine that how to get access to
the link in case when two or more devices are connected to the same
link.
• The PDU of the data link layer is called frame.
• Data Link layer protocols are CSMA/CD, CSMA/CA,
Token Passing etc.
Node-to-Node Delivery.
Data Link Layer.
Network Layer.Network Layer.
• The network layer is responsible for the source -to-
destination delivery of a packet possibly across
multiple networks.
– It two systems are connected to the same link, there is
usually no need for a network layer.
– However, if the two systems are attached to different
networks with connecting devices between the networks,
there is need for the network layer to accomplish the
delivery.
• The major duties performed by the network layer
are:
Network Layer.Network Layer.
– Logical addressing:
• The physical addressing implemented by the data link layer handles the
addressing problem locally.
• If a packet passes the network boundary, we need another addressing
system to perform the source and destination delivery.
• The network layer adds a header to the segment received from the
transport layer containing the logical addresses of the sender and
receiver.
• Logical address is also called IP address which is of 32-bits and
represented in decimal format.
– Routing:
• To route the packets from the source to destination in an internetwork,
the router uses network layer information.
• The PDU of network layer is called packet.
• Network layer protocols are IP, IPX, AppleTalk.
Network Layer.Network Layer.
Source-to-Destination Delivery.Source-to-Destination Delivery.
Transport Layer.Transport Layer.
• The transport layer is responsible for process-to-process
delivery of the entire message.
• The major duties performed by the transport layer are:
– Port address:
• Computers often running several processes (running programs) at the
same time:
• Each running process open a logical port on the computer.
• The transport layer header must therefore include a type of address
called port address.
• The network layer gets each packet to the correct computer, the
transport layer get the entire message to the correct process on that
computer.
– Segmentation and reassembly:
• A message received form the upper layers is divided into transmittable
segments, each segment contains a sequence number.
• These number enables the transport layer to reassemble the message
correctly upon arrival at the destination and to identify and replace
packets that were lost in the transmission.
Transport Layer.Transport Layer.
– Connection Control:
• The transport layer can be either connectionless or connection
oriented.
• A connection oriented transport layer makes a logical connection with
the transport layer at the destination machine first before delivering the
packets.
• After all the data are transferred, the connection is terminated.
– Flow control:
• Like data link layer, the transport layer is resposnsible for flow control.
• However, flow control at this layer is performed end to end rather than
across a single link (Hop-to-Hop).
– Error control:
• Like data link layer, the transport layer is responsible for error control.
• However, error control at this layer is performed end to end rather than
across a single link (Hop-to-Hop).
• Transport layer 4 protocols include TCP (Transmission
Control Protocol) and UDP (User Datagram Protocol).
Transport Layer.Transport Layer.
Reliable Process-to-Process Delivery.Reliable Process-to-Process Delivery.
Session Layer.Session Layer.
• The session layer defines how to establish, maintaining and
terminates session between two communication hosts.
• The major duties of the session layer are:
– Synchronization:
• For lengthy transaction (file transfer), the user may choose to establish
synchronization points associated with the transfer. If a fault develops
during a transaction, the dialog may be restarted at an agreed
synchronization point.
– Dialog control:
• Session layer determines that which role is to be played at any given
time by a host.
– Duplex: Two-way simultaneous.
– Half-Duplex: Two-way alternate.
– Simplex: One-way.
• Session layer protocols are SQL, ASP(AppleTalk Session
Protocol), Remote Procedure Call (RPC), X Window
System.
Session Layer.Session Layer.
Presentation Layer.Presentation Layer.
• The presentation layer ensures that the information that the
application layer of one system sends out is readable by the
application layer of another system.
• The major duties of the presentation layer are:
– Format conversion:
• Convert message from one format into another format .i.e. for ASCII
to EBCEDIC or vice versa.
– Compression.
• Compress the message to take less bandwidth on the transmission
media and less time for transmission.
– Encryption:
• Convert the message into a form that will not be readable by others.
• Provides security to the message.
• Protocols of the presentation layer are JPEG, MPEG, ASCII,
EBCDIC etc.
Presentation Layer.Presentation Layer.
Application Layer.Application Layer.
• The application layer is the OSI layer that is closest to the
user.
• It provides network services to the user’s applications (.i.e.
spreadsheet etc).
• The major duties are:
– Mail service:
• It provides network services for the email application.
– File transfer and Access:
• It provides network services for a user to access files on a remote
computer, to retrieve files from a remote computer for use in the local
computer and to manage or control files in a remote computer locally.
– World Wide Web:
• It provides network services to access the World Wide Web.
Application Layer.Application Layer.
Summary.Summary.
• There was no standard for networks in the early days and as a result it was
difficult for networks to communicate with each other.
• The International Organisation for Standardisation (ISO) recognised this.
and researched various network schemes, and in 1984 introduced the Open
Systems Interconnection (OSI) reference model.
• The OSI reference model has standards which ensure vendors greater
compatibility and interoperability between various types of network
technologies.
• The OSI reference model organizes network functions into seven
numbered layers.
• Each layer provides a service to the layer above it in the protocol
specification and communicates with the same layer’s software or
hardware on other computers.
Summary of the Layers.Summary of the Layers.

Mais conteúdo relacionado

Mais procurados

Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPMukesh Chinta
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaMukesh Chinta
 
Routers.ppt
Routers.pptRouters.ppt
Routers.pptkirbadh
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocolNayan Sarma
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic conceptsrahul kapoliya
 
Computer networking
Computer networkingComputer networking
Computer networkingaslamslides
 
iso osi model
 iso osi model iso osi model
iso osi modelvishnu1204
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTNishant Goel
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 
Networking presentation
Networking presentationNetworking presentation
Networking presentationJyoti Tewari
 

Mais procurados (20)

Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
TCP IP Model | Computer Science
TCP IP Model | Computer ScienceTCP IP Model | Computer Science
TCP IP Model | Computer Science
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Wide Area Network (WAN)
Wide Area Network (WAN)Wide Area Network (WAN)
Wide Area Network (WAN)
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission Media
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Computer networking
Computer networkingComputer networking
Computer networking
 
iso osi model
 iso osi model iso osi model
iso osi model
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
 
Data link layer
Data link layer Data link layer
Data link layer
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Network software
Network softwareNetwork software
Network software
 
Switches on Networking
Switches on NetworkingSwitches on Networking
Switches on Networking
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 

Semelhante a OSI Reference Model Explained in Detail

06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.pptssuserf7cd2b
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.pptssuserf7cd2b
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx183JAIDEEP
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet ProtocoltxMosesOkumu4
 
Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Ammar Shafiq
 
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptxKaythry P
 
Client Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxClient Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxDevChaudhari17
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and modelsshahin raj
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)Tutun Juhana
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Zakirul Islam
 
osireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdfosireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdfFira253524
 

Semelhante a OSI Reference Model Explained in Detail (20)

06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
Dc2 t1
Dc2 t1Dc2 t1
Dc2 t1
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
OSI Model.pdf
OSI Model.pdfOSI Model.pdf
OSI Model.pdf
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
 
Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)
 
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptx
 
Chap 2 network models
Chap 2 network modelsChap 2 network models
Chap 2 network models
 
Client Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxClient Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptx
 
Basics of Ethernet
Basics of Ethernet Basics of Ethernet
Basics of Ethernet
 
OSI Model.ppt
OSI Model.pptOSI Model.ppt
OSI Model.ppt
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and models
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
 
ch5-osi.pdf
ch5-osi.pdfch5-osi.pdf
ch5-osi.pdf
 
tcpiposi.pptx
tcpiposi.pptxtcpiposi.pptx
tcpiposi.pptx
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 
Osi
OsiOsi
Osi
 
osireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdfosireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdf
 

Mais de sayyed sabir (20)

Workbreakdownstructureppt 130410021152-phpapp02
Workbreakdownstructureppt 130410021152-phpapp02Workbreakdownstructureppt 130410021152-phpapp02
Workbreakdownstructureppt 130410021152-phpapp02
 
Automatic door using arduino
Automatic door using arduinoAutomatic door using arduino
Automatic door using arduino
 
Importance of coal water slurry
Importance of coal water slurryImportance of coal water slurry
Importance of coal water slurry
 
(Week 15)
(Week 15)(Week 15)
(Week 15)
 
(Week 14)
(Week 14)(Week 14)
(Week 14)
 
(Week 13)
(Week 13)(Week 13)
(Week 13)
 
(Week 12)
(Week 12)(Week 12)
(Week 12)
 
(Week 11)
(Week 11)(Week 11)
(Week 11)
 
(Week 10)
(Week 10)(Week 10)
(Week 10)
 
(Week 9)
(Week 9)(Week 9)
(Week 9)
 
(Week 8)
(Week 8)(Week 8)
(Week 8)
 
(Week 7)
(Week 7)(Week 7)
(Week 7)
 
(Week 6)
(Week 6)(Week 6)
(Week 6)
 
(Week 5)
(Week 5)(Week 5)
(Week 5)
 
(Week 4)
(Week 4)(Week 4)
(Week 4)
 
(Week 3)
(Week 3)(Week 3)
(Week 3)
 
(Week 2)
(Week 2)(Week 2)
(Week 2)
 
(Week 1)
(Week 1)(Week 1)
(Week 1)
 
Transmission modes
Transmission modesTransmission modes
Transmission modes
 
Ch3 4 v1
Ch3 4 v1Ch3 4 v1
Ch3 4 v1
 

Último

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Último (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

OSI Reference Model Explained in Detail

  • 1. OSI Reference ModelOSI Reference Model Sayyed sabir shahSayyed sabir shah Department of technologyDepartment of technology Sarhad university of information technologySarhad university of information technology PeshawarPeshawar
  • 2. The Need For Standards.The Need For Standards. • Over the past couple of decades many of the networks that were built used different hardware and software implementations, as a result: – They were incompatible and it became difficult for networks using different specifications to communicate with each other. • The companies involved in networks development realized that they needed to move from proprietary networking system into open system. • Proprietary systems are privately developed, owned and controlled. – Disadvantages are: • Leads to monopolistic environment. • Slows down the development of networking products. • Open system is the opposite of proprietary systems. – Advantages are: • Leads to competitive environment. • Accelerates the development of networking products.
  • 3. The Need for Standards.The Need for Standards. • To address the problem of networks being incompatible and unable to communicate with each other, the International Organisation for Standardisation (ISO) created a NETWORK MODEL. • This NETWORK MODEL would help the vendor to create interoperable network implementations. • This NETWORK MODEL is called OSI Reference Model.
  • 4. Layered Tasks.Layered Tasks. • We use the concept of layerslayers in our daily life. • As an example, let us consider two friends who communicate through postal mail. • The process of sending a letter to a friend would be complex if there were no services available from the post office. • This process of sending mail can be divided into several phases/activities and each phase/activities is called layer.
  • 5. Figure.Figure. Tasks involved in sending a letterTasks involved in sending a letter
  • 6. Hierarchy.Hierarchy. • In the previous mail communication example, we saw that three activities were performed at the sender side and another three activities were preformed at the receiver side. • The task of transporting the mail between the sender and receiver is done by the carrier. • On important thing is that tasks must be done in the order given in the hierarchy. – At the sender side, the letter must be written and dropped into the mailbox before being picked up by the mail carrier and delivered to the post office. – At the receiver side, the letter must be dropped in the recipient mailbox before being picked up and read by the recipient.
  • 7. The OSI Reference Model.The OSI Reference Model. • The model was developed by the International Organisation for Standardisation (ISO) in 1984. It is now considered the primary architectural model for inter-computer communications. • The Open Systems Interconnection (OSI) reference model is a descriptive network scheme. It ensures greater compatibility and interoperability between various types of network technologies. • The OSI model describes how information or data makes its way from application programmes (such as spreadsheets) through a network medium (such as wire) to another application programme located on another network. • The OSI reference model divides the problem of moving information between computers over a network medium into SEVEN smaller and more manageable problems . • This separation into smaller more manageable functions is known as layering.
  • 8. A Layered Network Model.A Layered Network Model. • The OSI Reference Model is composed of seven layers, each specifying particular network functions. – The process of breaking up the functions or tasks of networking into layers reduces complexity and makes learning easier to understand. – It breaks the network communication into smaller, simpler parts that are easier to develop. – It allows different types of hardware and software to communicate with each other. – It prevents changes in one layer from affecting the other layers.
  • 9. Layers of OSI Reference Model.Layers of OSI Reference Model.
  • 10. Encapsulation.Encapsulation. • As the data flows down through the layers in the hierarchy, each layer adds some extra information to the data in the form of headers or tailors. • This process of wrapping data with headers and tailors is called encapsulation. • These extra information are added for: – To enable the opposite corresponding layer to take the right operation on the data (to facilitate his work). – To enable the network to transfer the data accurately from the source to the destination. • Through these information each layer actually communicates with the opposite corresponding layer and this is called peer-to-peer communication. • At the receiver side De-Encapsulation take place.
  • 12. Physical Layer.Physical Layer. • The physical layer performs the functions required to transmit a bit stream over a physical medium. • It deals with the mechanical and electrical specification of the transmission media. • The major duties performed by physical layer are: – Physical characteristics of interface and media. • Defines the characteristics of the interface between the devices and the transmission media. • It also defines the type of transmission medium. – Representation of bits: • Physical layer receives a steam of bits (sequence of 0s and 1s) without any interruption. • To be transmitted, bits must be encoded into a signals – electrical or optical. • The physical layer defined the type of representation ( how 0s and 1s are changed into signals). – Data rate: • The transmission rate – the number of bit per second- is also defined by the physical layer. • Repeater is a device of the physical layer. • Physical layer protocols are encoding techniques (RZ, NRZ, Manchester etc).
  • 14. Data Link Layer.Data Link Layer. • The data link layer is responsible for moving frames from one hop (node) to the next. • The major duties of the data link layer are: – Framing: • The data link layer divides the stream of bits steam from the network layer into manageable data units called frames. – Physical addressing: • If frame is to be distributed to different systems on the network, the data link layer adds a header to the frame to define the sender and receiver of the frame. • Physical address is the MAC address, which is hard coded into NIC and is of 48-bit represented by Hexadecimal format. – Flow control: • If the rate at which the data are absorbed by the receiver is less than the rate produced in the sender, the data link layer imposes a flow control mechanism to prevent overwhelming the receiver.
  • 15. Data Link Layer.Data Link Layer. – Error control: • The data link layer adds reliability to the physical layer by adding mechanism to detect and retransmit damaged or lost frames. • It also uses a mechanism to prevent duplication of frames. • Error control is normally achieved through a trailer added to the end of the frame. – Access control: • The data link layer protocol has to determine that how to get access to the link in case when two or more devices are connected to the same link. • The PDU of the data link layer is called frame. • Data Link layer protocols are CSMA/CD, CSMA/CA, Token Passing etc.
  • 18. Network Layer.Network Layer. • The network layer is responsible for the source -to- destination delivery of a packet possibly across multiple networks. – It two systems are connected to the same link, there is usually no need for a network layer. – However, if the two systems are attached to different networks with connecting devices between the networks, there is need for the network layer to accomplish the delivery. • The major duties performed by the network layer are:
  • 19. Network Layer.Network Layer. – Logical addressing: • The physical addressing implemented by the data link layer handles the addressing problem locally. • If a packet passes the network boundary, we need another addressing system to perform the source and destination delivery. • The network layer adds a header to the segment received from the transport layer containing the logical addresses of the sender and receiver. • Logical address is also called IP address which is of 32-bits and represented in decimal format. – Routing: • To route the packets from the source to destination in an internetwork, the router uses network layer information. • The PDU of network layer is called packet. • Network layer protocols are IP, IPX, AppleTalk.
  • 22. Transport Layer.Transport Layer. • The transport layer is responsible for process-to-process delivery of the entire message. • The major duties performed by the transport layer are: – Port address: • Computers often running several processes (running programs) at the same time: • Each running process open a logical port on the computer. • The transport layer header must therefore include a type of address called port address. • The network layer gets each packet to the correct computer, the transport layer get the entire message to the correct process on that computer. – Segmentation and reassembly: • A message received form the upper layers is divided into transmittable segments, each segment contains a sequence number. • These number enables the transport layer to reassemble the message correctly upon arrival at the destination and to identify and replace packets that were lost in the transmission.
  • 23. Transport Layer.Transport Layer. – Connection Control: • The transport layer can be either connectionless or connection oriented. • A connection oriented transport layer makes a logical connection with the transport layer at the destination machine first before delivering the packets. • After all the data are transferred, the connection is terminated. – Flow control: • Like data link layer, the transport layer is resposnsible for flow control. • However, flow control at this layer is performed end to end rather than across a single link (Hop-to-Hop). – Error control: • Like data link layer, the transport layer is responsible for error control. • However, error control at this layer is performed end to end rather than across a single link (Hop-to-Hop). • Transport layer 4 protocols include TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).
  • 25. Reliable Process-to-Process Delivery.Reliable Process-to-Process Delivery.
  • 26. Session Layer.Session Layer. • The session layer defines how to establish, maintaining and terminates session between two communication hosts. • The major duties of the session layer are: – Synchronization: • For lengthy transaction (file transfer), the user may choose to establish synchronization points associated with the transfer. If a fault develops during a transaction, the dialog may be restarted at an agreed synchronization point. – Dialog control: • Session layer determines that which role is to be played at any given time by a host. – Duplex: Two-way simultaneous. – Half-Duplex: Two-way alternate. – Simplex: One-way. • Session layer protocols are SQL, ASP(AppleTalk Session Protocol), Remote Procedure Call (RPC), X Window System.
  • 28. Presentation Layer.Presentation Layer. • The presentation layer ensures that the information that the application layer of one system sends out is readable by the application layer of another system. • The major duties of the presentation layer are: – Format conversion: • Convert message from one format into another format .i.e. for ASCII to EBCEDIC or vice versa. – Compression. • Compress the message to take less bandwidth on the transmission media and less time for transmission. – Encryption: • Convert the message into a form that will not be readable by others. • Provides security to the message. • Protocols of the presentation layer are JPEG, MPEG, ASCII, EBCDIC etc.
  • 30. Application Layer.Application Layer. • The application layer is the OSI layer that is closest to the user. • It provides network services to the user’s applications (.i.e. spreadsheet etc). • The major duties are: – Mail service: • It provides network services for the email application. – File transfer and Access: • It provides network services for a user to access files on a remote computer, to retrieve files from a remote computer for use in the local computer and to manage or control files in a remote computer locally. – World Wide Web: • It provides network services to access the World Wide Web.
  • 32. Summary.Summary. • There was no standard for networks in the early days and as a result it was difficult for networks to communicate with each other. • The International Organisation for Standardisation (ISO) recognised this. and researched various network schemes, and in 1984 introduced the Open Systems Interconnection (OSI) reference model. • The OSI reference model has standards which ensure vendors greater compatibility and interoperability between various types of network technologies. • The OSI reference model organizes network functions into seven numbered layers. • Each layer provides a service to the layer above it in the protocol specification and communicates with the same layer’s software or hardware on other computers.
  • 33. Summary of the Layers.Summary of the Layers.