3 OSI Model
3 OSI Model
Computer Network
BIS Program
The Open System Interconnecting (OSI)
model
• In the beginning, computers could only communicate with other
computers made by the same company ( No standard).
• In the late 1970s, the OSI model was created to solve this problem.
• Each layer has its own tasks and responsibilities, and for smooth
operation, each layer must trust and rely on the others.
Advantages of Reference Models
• This short list depicts some of the most important advantages we gain by
using the OSI layered model:
1- The OSI model divides network communication processes into smaller and
simpler components, thus aiding component development, design, and
troubleshooting.
2- It allows multiple-vendor development through the standardization of
network components.
3- It encourages industry standardization by defining the specific functions
that occur at each layer of the model.
4- It allows various types of network hardware and software to
communicate. It prevents changes in one layer from affecting other layers,
facilitating development and making application programming much easier
The OSI Reference Model
• The OSI model has seven layers:
• Application (layer 7)
• Presentation (layer 6)
• Session (layer 5)
• Transport (layer 4)
• Network (layer 3)
• Data Link (layer 2)
• Physical (layer 1)
The OSI Model
• The OSI’s seven layers are
divided into two groups.
• The top three layers define the
rules of how the applications
working within host machines
communicate with each other
as well as with end users.
• The bottom four layers define
how the actual data is
transmitted from end to end
The Application Layer (7)
• The Application layer in the OSI model is where users communicate with
the computer. Users interact with the network stack through application
processes, interfaces, or APIs that connect the application to the
computer's operating system.
• The Application layer is only used when network access is required.
Browsers, like Chrome or Firefox, interact with the Application layer to
access remote resources.
• The Application layer also identifies and establishes communication
partners and checks for sufficient resources. It is responsible for tasks such
as file transfers, email, remote access, network management, printing, and
information location.
• The Application layer allows applications (users) to send information down
through the protocol stack.
The Presentation layer ( layer 6)
• The Presentation layer is responsible for data translation and code
formatting, ensuring that data can be read and understood by
different systems. It also handles tasks like data compression,
decompression, encryption, and decryption.
The Session layer
• The Session layer sets up, manages, and tears down sessions between
systems.
• Example of the Transport layer protocols are the TCP and UD where the
TCP is a reliable service and UDP is not.
• These two protocols give application developers more options because
they have a choice between them when they’re working with TCP/IP
protocols
The Network Layer
• The Network layer is responsible for managing logical device
addressing, keeping track of device locations on the network, and
determining the most efficient way to transfer data.
• This means that the Network layer is responsible for transporting
traffic between devices that are not directly connected.
• Routers, which are layer 3 devices, operate at the Network layer and
provide routing services within a network.
• Protocols that support data traffic are known as routed protocols,
with examples being Internet Protocol (IP) and Internet Protocol
version 6 (IPv6).
The Data Link Layer
• The Data Link layer handles the physical transmission of data, error
notification, network topology, and flow control.
• It ensures that messages are delivered to the correct device on a LAN using
hardware addresses (MAC address).
• The layer formats the message into data frames and adds a header with
the destination and source hardware addresses.
• The Data Link layer is responsible for identifying each device on a local
network using hardware addressing.
• Switch is an example of the network device that works in the Data link
layer.
• The address used to identify the devices in this layer is called MAC address
which is unique for each device
The Physical Layer
• Physical layer, which does two important things: it sends bits and
receives bits. Bits come only in values of 1 or 0