0% found this document useful (0 votes)
30 views6 pages

Hero Abdi

Uploaded by

moh cismaan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views6 pages

Hero Abdi

Uploaded by

moh cismaan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

OSI Model

The OSI model, or Open Systems Interconnection model, is a conceptual framework that defines
how communication between different computer systems should be structured. It consists of
seven layers, each with its own specific functions and protocols.
7 layers of OSI model
1-The Physical Layer of the OSI model: is the first layer and is responsible for the physical
infrastructure of the internet. It involves the development of standards for how to operate the
internet, including the hardware and cabling required to establish connections between devices.
The Physical Layer also defines the transmission rate and encoding methods used to transmit
data across the internet.
This layer is responsible for converting digital data into a physical signal that can be transmitted
over a physical medium such as copper wires, fiber optic cables, or wireless signals. It also
includes the physical components of network devices such as connectors, cables, and hubs.
The Physical Layer is critical to the functioning of the internet, as it provides the foundation for
all other layers of the OSI model. Without a reliable and efficient physical infrastructure, data
cannot be transmitted effectively, and the higher layers of the OSI model cannot function
properly.

2. The Data Link Layer: is the second layer of the OSI model and is responsible for providing
reliable transmission of data between devices on the same network. It ensures that data is
transmitted without errors and in the correct order, and also manages access to the physical
network medium.
The Data Link Layer is divided into two sublayers: the Logical Link Control (LLC) sublayer and
the Media Access Control (MAC) sublayer. The LLC sublayer provides a common interface for
upper-layer protocols and manages error control and flow control. The MAC sublayer is
responsible for controlling access to the physical network medium and includes protocols such as
Ethernet and Wi-Fi.
The Data Link Layer also includes addressing schemes, such as MAC addresses, which are used
to uniquely identify devices on a network. It is responsible for encapsulating data into frames,
which include header and trailer information that contains control information, such as source
and destination addresses.
Overall, the Data Link Layer plays a crucial role in ensuring reliable communication between
devices on a network and is essential for the proper functioning of higher layers in the OSI
model.
3.The Network Layer : is the third layer of the OSI model and is responsible for providing
logical addressing and routing services for data packets between devices in different networks. It
ensures that data is delivered to the correct destination by selecting the best path through the
network.
The Network Layer uses Internet Protocol (IP) as its main protocol. IP provides logical
addressing through IP addresses, which are unique identifiers assigned to each device on a
network. The Network Layer also uses routing protocols, such as Border Gateway Protocol
(BGP) and Open Shortest Path First (OSPF), to determine the best path for data packets to travel
through the network.
The Network Layer also provides fragmentation and reassembly services to ensure that data
packets are transmitted efficiently across networks with different maximum transmission unit
(MTU) sizes.
Overall, the Network Layer plays a critical role in ensuring that data is delivered to the correct
destination through the most efficient path possible. It is essential for the proper functioning of
higher layers in the OSI model, such as the Transport Layer.

4. The Transport Layer: is the fourth layer of the OSI model and is responsible for providing
reliable and efficient end-to-end data transport services between devices. It ensures that data is
transmitted correctly, without errors, and in the correct order.
The Transport Layer provides two main protocols: Transmission Control Protocol (TCP) and
User Datagram Protocol (UDP). TCP is a connection-oriented protocol that establishes a reliable
connection between two devices before transmitting data. It provides error detection, flow
control, and congestion control mechanisms to ensure that data is transmitted reliably. UDP is a
connectionless protocol that does not establish a connection before transmitting data. It is used
for applications that require fast and efficient data transmission, such as video streaming and
online gaming.
The Transport Layer also provides port numbers to identify different applications running on a
device. This allows multiple applications to use the same network connection without interfering
with each other.
Overall, the Transport Layer plays a critical role in ensuring that data is transmitted reliably and
efficiently between devices. It is essential for the proper functioning of higher layers in the OSI
model.

5. The Session Layer: is the fifth layer of the OSI model and is responsible for establishing,
managing, and terminating communication sessions between devices. It provides services such
as session establishment, synchronization, and checkpointing to ensure that data is transmitted
reliably between devices.
The Session Layer also manages the flow of data between devices, ensuring that data is
transmitted in an orderly and efficient manner. It allows multiple sessions to be established
between devices simultaneously and provides mechanisms for re-establishing a session if it is
interrupted due to network failures or other issues.
One of the key functions of the Session Layer is to provide security services, such as encryption
and decryption, to protect data transmitted between devices. It also provides authentication and
authorization services to ensure that only authorized devices are allowed to participate in a
session.

6. The Presentation Layer is the sixth layer of the OSI model and is responsible for ensuring
that data is presented in a format that can be understood by the receiving device. It handles tasks
such as data encryption, compression, and formatting.
The Presentation Layer ensures that data is properly formatted before being sent to the
Application Layer. It also handles data compression, which reduces the amount of data that
needs to be transmitted over the network, improving efficiency.
Encryption is another important function of the Presentation Layer. It ensures that data is secure
during transmission by converting it into an unreadable format that can only be decrypted by the
intended recipient.
Overall, the Presentation Layer plays a critical role in ensuring that data is properly formatted,
secured, and compressed before being sent to the Application Layer. It is essential for the proper
functioning of higher layers in the OSI model, such as the Application Layer.
Overall, the Session Layer plays a critical role in managing communication sessions between
devices and ensuring that data is transmitted securely and reliably. It is essential for the proper
functioning of higher layers in the OSI model.

7. The application layer is the topmost layer in the OSI (Open Systems Interconnection) model
and it is responsible for providing services to the end-users. It is the layer where applications and
user interfaces are located, and where data is processed and presented to the user. The main
purpose of the application layer is to enable communication between different applications
across a network.
The application layer provides a number of protocols that enable different applications to
communicate with each other. These protocols include HTTP (Hypertext Transfer Protocol) for
web browsing, SMTP (Simple Mail Transfer Protocol) for email, FTP (File Transfer Protocol)
for file transfer, and Telnet for remote login.
The application layer also provides services such as authentication, encryption, and compression.
These services ensure that data is transmitted securely and efficiently across the network.
Overall, the application layer plays a crucial role in enabling communication between different
applications and end-users across a network.
TCP Model
The TCP/IP model, which is an alternative to the OSI model, also includes a network access
layer. In this model, the network access layer is responsible for providing a means for data to be
transmitted over a physical network, just like in the OSI model.
However, the TCP/IP model's network access layer also includes additional functions, such as
addressing and routing. This layer is responsible for assigning unique addresses to devices on the
network, such as IP addresses, and for determining the best path for data to travel between
devices.
5 layers of TCP model
1.The Physical layer is the first layer in the TCP/IP model, and it is responsible for transmitting
raw bit streams over physical media. This layer is concerned with the physical characteristics of
the communication channel, such as the voltage levels, the timing of signals, and the physical
connectors used to connect devices.
At this layer, data is transmitted in the form of raw bits, which are simply 1s and 0s. The
Physical layer ensures that these bits are transmitted reliably over the communication channel,
without any errors or corruption. This layer is also responsible for converting digital signals into
analog signals, and vice versa, so that they can be transmitted over analog communication
channels.
The Physical layer defines the characteristics of the physical media used for communication,
such as the types of cables, connectors, and transmission rates. It also defines the rules for
encoding and decoding data, such as the modulation schemes used to convert digital signals into
analog signals.
In addition to transmitting data, the Physical layer also handles tasks such as signal
amplification, noise reduction, and error detection. It uses techniques such as error-correcting
codes and checksums to detect and correct errors that may occur during transmission.
Overall, the Physical layer plays a crucial role in ensuring reliable communication between
devices over physical media. It provides the foundation for higher-level protocols in the TCP/IP
stack, which rely on the reliable transmission of raw bit streams over the communication
channel.
2.The Network Access layer is the second layer in the TCP/IP model, and it is responsible for
providing access to the physical network media. This layer is concerned with the protocols and
procedures used to transmit data over the physical network, such as Ethernet, Wi-Fi, or Token
Ring.
At this layer, data is transmitted in the form of frames, which are packets of data that include
both the data itself and information about how it should be transmitted over the network. The
Network Access layer is responsible for encapsulating data from higher layers into frames that
can be transmitted over the physical network.
The Network Access layer defines the rules for accessing the physical network media, such as
how devices are identified on the network, how data is addressed and routed between devices,
and how collisions are detected and resolved.
This layer also handles tasks such as flow control, error detection and correction, and
fragmentation and reassembly of data packets. It uses techniques such as checksums and cyclic
redundancy checks (CRC) to detect and correct errors that may occur during transmission.
Overall, the Network Access layer plays a critical role in providing access to the physical
network media and ensuring reliable communication between devices on the network. It provides
the foundation for higher-level protocols in the TCP/IP stack, which rely on the reliable
transmission of data over the network.
3.The Internet layer is the third layer in the TCP/IP model and is responsible for facilitating
communication between devices on different networks. This layer is also known as the network
layer in the OSI model.
The primary function of the Internet layer is to provide logical addressing and routing of data
packets between devices. It uses the Internet Protocol (IP) to assign unique IP addresses to
devices and to determine the best path for data to travel between devices on different networks.
The Internet layer breaks down data into smaller packets and adds header information to each
packet, including the source and destination IP addresses. The packets are then transmitted over
the network using routers, which use routing tables to determine the best path for each packet to
reach its destination.
The Internet layer also includes protocols such as Internet Control Message Protocol (ICMP),
which is used for error reporting and diagnostic functions, and Internet Group Management
Protocol (IGMP), which is used for multicasting.
Overall, the Internet layer plays a crucial role in enabling communication between devices on
different networks, ensuring that data is transmitted accurately and efficiently, and managing
logical addressing and routing functions.
4. The Transport layer is the fourth layer in the TCP/IP model and is responsible for providing
end-to-end communication between devices. It ensures that data is transmitted reliably,
efficiently, and in the correct order.
The Transport layer uses two protocols: Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP). TCP is a connection-oriented protocol that establishes a reliable,
error-free connection between devices before transmitting data. It breaks down data into
segments and adds a sequence number to each segment to ensure that they are received in the
correct order. TCP also includes flow control and congestion control mechanisms to prevent
network congestion and ensure efficient data transmission.
UDP, on the other hand, is a connectionless protocol that does not establish a connection before
transmitting data. It simply adds a header to each datagram and sends it to the destination device.
UDP is faster than TCP but less reliable, as it does not include error-checking or retransmission
mechanisms.
The Transport layer also includes port numbers, which identify specific applications or services
running on a device. Port numbers are used to multiplex multiple applications running on the
same device and demultiplex incoming data to the correct application
Overall, the Transport layer plays a critical role in ensuring reliable, efficient, and ordered
transmission of data between devices. It provides end-to-end communication and includes
mechanisms for error-checking, flow control, congestion control, and
multiplexing/demultiplexing.
5. The Application layer is the topmost layer in the TCP/IP model and is responsible for
providing services and applications to end-users. It includes various protocols that enable users
to access network resources and communicate with other devices.
The Application layer includes protocols such as HTTP, FTP, SMTP, DNS, Telnet, and SNMP.
These protocols define how data is transmitted and processed between applications running on
different devices.
HTTP (Hypertext Transfer Protocol) is used for accessing web pages and resources on the World
Wide Web. FTP (File Transfer Protocol) is used for transferring files between devices. SMTP
(Simple Mail Transfer Protocol) is used for sending email messages. DNS (Domain Name
System) is used for resolving domain names to IP addresses. Telnet is used for remote login to a
device, and SNMP (Simple Network Management Protocol) is used for managing network
devices.
The Application layer also includes data encoding and formatting standards such as ASCII,
Unicode, and HTML. These standards define how data is represented and transmitted between
applications.
Overall, the Application layer provides a wide range of services and applications that enable
users to access network resources and communicate with other devices. It includes various
protocols, data encoding standards, and applications that make the Internet and other networks
functional and useful for end-users.

You might also like