0% found this document useful (0 votes)
14 views18 pages

3 OSI Model

Uploaded by

ehabsherif75
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views18 pages

3 OSI Model

Uploaded by

ehabsherif75
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

OSI Model

Computer Network
BIS Program
The Open System Interconnecting (OSI)
model
• In the beginning, computers could only communicate with other
computers made by the same company ( No standard).

• In the late 1970s, the OSI model was created to solve this problem.

• It was meant to help different vendors create network devices and


software that could work together. Although achieving complete
compatibility is unlikely, it is still a great goal.
• The OSI model is the main model for networks and it explains how data
and network information are communicated between computers.
The layered Approach
• In simple terms, a reference model is a blueprint for how
communication should happen.
• It divides the processes into logical groups called layers, similar to
how departments are organized in a company.

• Each layer has its own tasks and responsibilities, and for smooth
operation, each layer must trust and rely on the others.
Advantages of Reference Models
• This short list depicts some of the most important advantages we gain by
using the OSI layered model:
1- The OSI model divides network communication processes into smaller and
simpler components, thus aiding component development, design, and
troubleshooting.
2- It allows multiple-vendor development through the standardization of
network components.
3- It encourages industry standardization by defining the specific functions
that occur at each layer of the model.
4- It allows various types of network hardware and software to
communicate. It prevents changes in one layer from affecting other layers,
facilitating development and making application programming much easier
The OSI Reference Model
• The OSI model has seven layers:
• Application (layer 7)
• Presentation (layer 6)
• Session (layer 5)
• Transport (layer 4)
• Network (layer 3)
• Data Link (layer 2)
• Physical (layer 1)
The OSI Model
• The OSI’s seven layers are
divided into two groups.
• The top three layers define the
rules of how the applications
working within host machines
communicate with each other
as well as with end users.
• The bottom four layers define
how the actual data is
transmitted from end to end
The Application Layer (7)
• The Application layer in the OSI model is where users communicate with
the computer. Users interact with the network stack through application
processes, interfaces, or APIs that connect the application to the
computer's operating system.
• The Application layer is only used when network access is required.
Browsers, like Chrome or Firefox, interact with the Application layer to
access remote resources.
• The Application layer also identifies and establishes communication
partners and checks for sufficient resources. It is responsible for tasks such
as file transfers, email, remote access, network management, printing, and
information location.
• The Application layer allows applications (users) to send information down
through the protocol stack.
The Presentation layer ( layer 6)
• The Presentation layer is responsible for data translation and code
formatting, ensuring that data can be read and understood by
different systems. It also handles tasks like data compression,
decompression, encryption, and decryption.
The Session layer

• The Session layer sets up, manages, and tears down sessions between
systems.

• It coordinates and authenticate communication and offers different


modes of communication, such as simplex, half-duplex, and full-
duplex.

• It keeps application data separate from other applications' data.


The Transport Layer
• The Transport layer segments and reassembles data into a data stream. It
handles data from upper-layer applications and provides end-to-end data
transport services.
• It can establish a logical connection between the sending and destination
hosts on an internetwork.

• Example of the Transport layer protocols are the TCP and UD where the
TCP is a reliable service and UDP is not.
• These two protocols give application developers more options because
they have a choice between them when they’re working with TCP/IP
protocols
The Network Layer
• The Network layer is responsible for managing logical device
addressing, keeping track of device locations on the network, and
determining the most efficient way to transfer data.
• This means that the Network layer is responsible for transporting
traffic between devices that are not directly connected.
• Routers, which are layer 3 devices, operate at the Network layer and
provide routing services within a network.
• Protocols that support data traffic are known as routed protocols,
with examples being Internet Protocol (IP) and Internet Protocol
version 6 (IPv6).
The Data Link Layer
• The Data Link layer handles the physical transmission of data, error
notification, network topology, and flow control.
• It ensures that messages are delivered to the correct device on a LAN using
hardware addresses (MAC address).
• The layer formats the message into data frames and adds a header with
the destination and source hardware addresses.
• The Data Link layer is responsible for identifying each device on a local
network using hardware addressing.
• Switch is an example of the network device that works in the Data link
layer.
• The address used to identify the devices in this layer is called MAC address
which is unique for each device
The Physical Layer
• Physical layer, which does two important things: it sends bits and
receives bits. Bits come only in values of 1 or 0

• The Physical layer communicates directly with the various types of


actual communication media. Different kinds of media represent
these bit values in different ways.

• The Physical layer specifies the electrical, mechanical, procedural, and


functional requirements for activating, maintaining, and deactivating
a physical link between end systems.
THE TCP/IP PROTOCOL SUITE
• The model consists of five separate but
related layers, as shown in the figure

• TCP/IP says most about the network and


transport layers, and a lot about the
application layer.
• TCP/IP also defines how to interface the
network layer with the data link and
physical layers, but is not directly
concerned with these two layers
themselves.
Encapsulation
Encapsulation
• Each layer in the network uses
encapsulation to add necessary
information for the receiving system
except for the physical layer

• The network layer adds a header to the


information received from the transport
layer and passes it down to the data link
layer.
• At the receiver, each layer on the
receiving system unwraps the received
message.
Encapsulation
• The network layer looks at the control
information in the header of the data
received from the data link layer and
passes the rest up to the transport layer
for further processing.
• This process is called encapsulation
because each layer does not know the
structure or meaning of the Packet Data
Unit (PDU) at other layers.
• The data link layer is an exception as it
adds both a header and a trailer to the
data received from the network layer
Encapsulation
• The intermediate nodes in
the network only process
data through the first three
layers.
• The data passes network
devices between the
transmitter and receiver
process the data up to the
data link layer (switches) or
Network layer (router)

You might also like