0% found this document useful (0 votes)
96 views11 pages

Presentation Layer

Uploaded by

chipo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
96 views11 pages

Presentation Layer

Uploaded by

chipo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Presentation Layer


Introduction
• The presentation layer (data presentation layer, data provision level) sets
the system-dependent representation of the data into an independent
form, enabling the syntactically correct data exchange between different
systems.
• Also, functions such as data compression and encryption are guaranteed
that data to be sent by the application layer of a system that can be read by
the application layer of another system to the layer 6.
• The presentation layer. If necessary, the presentation layer acts as a
translator between different data formats, by making an understandable
for both systems data format, the ASN.1 (Abstract Syntax Notation One)
used.
Services

Data Translation: Convert data from one format to another for


compatibility.
Data Compression: Reduce the size of data for efficient
transmission.
Data Encryption: Secure data by converting it into a form unreadable
without proper decryption keys.
Data Decryption: Reverse the encryption process to retrieve the
original data.
Translation
• Data is sent from sender to receiver, but what if the sender device and receiver device
understand different formats of code?
• For example, suppose one device understands ASCII code and another device understands
EBCDIC code.
• In that case, the data must be translated into a code that the recipient understands to
determine what data has been sent.
• The presentation layer is responsible for translating ASCII codes to EBCDIC or vice versa.
• With the help of the presentation layer, the receiver understands the data effectively and
uses it efficiently.

1. Converting text from ASCII to Unicode.


2. Translating between different image formats like JPEG to PNG.
3. Changing audio formats like WAV to MP3.
Encryption and Decryption:
• Whatever data is being transmitted between the sender and the receiver, that data must
be secure because an intruder can hack the data passing between the sender and the
receiver.
• Hackers can modify the data and send the modified data to the receiver to create false
communication.
• The presentation layer is responsible for encrypting and decrypting data to avoid data
leakage and data modification.
The plaintext data at the source is encrypted into ciphertext (unreadable format), then it
is sent to the receiver, where the ciphertext is decrypted into plaintext.
• Now, if the hacker tries to hack the data, the hacker receives an encrypted, unreadable
form, and if the hacker tries to send modified data, the receiver can detect the
modification during decryption; thereby, the data remains safe.
❑ Protect sensitive data from unauthorized access.
❑ Use cryptographic algorithms to scramble data into ciphertext.
• Examples: SSL/TLS for secure web browsing, PGP for email encryption.
Compression and Decompression:
• If the file size is large, it becomes difficult to transmit the large file over the
network.
• File size can be decreased by compressing the file for easy transmission of
data.
• Compression is the method of diminishing the size of a file to transmit data
easily in less time.
• When the compressed data reaches the receiver, the data is reconstructed
back to the original size, and this process is called decompression.
• Reduce the size of data to save bandwidth and storage space.
• Mention lossy and lossless compression techniques.
• Examples: ZIP files, MPEG for video, MP3 for audio.
• Ensures compatibility and security of data exchange.
• Facilitates efficient transmission and storage of data.
Presentation Layer Protocols :
• below –
• Apple Filing Protocol (AFP): Apple Filing Protocol is the proprietary network protocol (communications protocol) that offers
services to macOS or the classic macOS. This is basically the network file control protocol specifically designed for Mac-based
platforms.
• Lightweight Presentation Protocol (LPP): Lightweight Presentation Protocol is that protocol which is used to provide ISO
presentation services on the top of TCP/IP based protocol stacks.
• NetWare Core Protocol (NCP): NetWare Core Protocol is the network protocol which is used to access file, print, directory,
clock synchronization, messaging, remote command execution and other network service functions.
• Network Data Representation (NDR): Network Data Representation is basically the implementation of the presentation layer
in the OSI model, which provides or defines various primitive data types, constructed data types and also several types of data
representations.
• External Data Representation (XDR): External Data Representation (XDR) is the standard for the description and encoding of
data. It is useful for transferring data between computer architectures and has been used to communicate data between very
diverse machines. Converting from local representation to XDR is called encoding, whereas converting XDR into local
representation is called decoding.
• Secure Socket Layer (SSL): The Secure Socket Layer protocol provides security to the data that is being transferred between
the web browser and the server. SSL encrypts the link between a web server and a browser, which ensures that all data passed
between them remains private and free from attacks.

You might also like