0% found this document useful (0 votes)
18 views2 pages

Osi Model

Uploaded by

sameerfuddi99556
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views2 pages

Osi Model

Uploaded by

sameerfuddi99556
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

OSI Model

7. Application Layer

The application layer is used by end-user software such as web browsers


and email clients. It provides protocols that allow software to send and
receive information and present meaningful data to users. A few examples
of application layer protocols are the Hypertext Transfer Protocol
(HTTP), File Transfer Protocol (FTP), Post Office Protocol (POP), Simple
Mail Transfer Protocol (SMTP), and Domain Name System (DNS).

6. Presentation Layer

The presentation layer prepares data for the application layer. It


is received correctly on the other end. The presentation layer takes any
data transmitted by the application layer and prepares it for
transmission over the session layer

5. Session Layer

The session layer creates communication channels, called sessions


between devices. It is responsible for opening sessions, ensuring they
remain open and functional while data is being transferred, and closing
them when communication ends. The session layer can also set checkpoints
during a data transfer—if the session is interrupted, devices can resume
data transfer from the last checkpoint.

4. Transport Layer

The transport layer takes data transferred in the session layer breaks it into
“segments” on the transmitting end. It is responsible for
that can be used by the session layer. The transport layer carries out
flow control, sending data at a rate that matches the connection speed
of the receiving device, and error control, checking if data was
received incorrectly and if not, requesting it again.

3. Network Layer

The network layer has two main functions. One is breaking up segments
into network packets, and reassembling the packets on the receiving end.
The other is routing packets by discovering the best path across a
physical network. The network layer uses network addresses (typically
Internet Protocol addresses) to route packets to a destination node.

2. Data Link Layer

The data link layer establishes and terminates a connection between two
physically-connected nodes on a network. It breaks up packets into frames
and sends them from source to destination. This layer is composed of two
parts—Logical Link Control (LLC), which identifies network protocols,
performs error checking and synchronizes frames, and Media Access
Control (MAC) which uses MAC addresses to connect devices and define
permissions to transmit and receive data.

1. Physical Layer

The physical layer is responsible for the physical cable or wireless


connection between network nodes. It defines the connector, the
electrical cable or wireless technology connecting the devices, and is
responsible for transmission of the raw data, which is simply a series
of 0s and 1s, while taking care of bit rate control.

You might also like