0% found this document useful (0 votes)
8 views

Lesson 4 - OSI Model

Uploaded by

emanuelokala5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Lesson 4 - OSI Model

Uploaded by

emanuelokala5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

NETWORK &

SYSTEM
ADMINISTRATION
MCIT 06103

C.M.N
The OSI Model
• OSI (Open Systems Interconnection) model - describes seven layers
that computer systems use to communicate over a network.

• It was first developed by the International Organization for


Standardization, also called the ISO. (Its shortened name, ISO, is
derived from a Greek word meaning equal.) Network engineers,
hardware technicians, programmers, and network administrators still
use the layers of the OSI model to communicate about networking
technologies.
OSI Model
• You need to memorize the seven layers of the OSI model. Here’s a
seven-word mnemonic that can help, or you can write your own:
All People Seem To Need Data Processing

Now let’s take a look at each layer in the OSI model.


The layers are numbered in descending order, starting
with Layer 7, the Application layer, at the top.
Layer 7: Application Layer
• Describes the interface between two
applications, each on separate computers.
• It is the Human-computer interaction layer,
where apps can access network services.
• includes protocols like HTTP, SMTP, POP3,
IMAP4, FTP, and Telnet.
Layer 6: Presentation Layer
• Is responsible for reformatting, compressing,
and/or encrypting data in a way that the
application on the receiving end can read.
• For example, an email message can be
encrypted at the Presentation layer by the
email client or by the operating system.
• It ensures data is in a usable format and it is
where encryption of data occurs
Layer 5: Session Layer
• Describes how data between applications is synced
and recovered if messages don’t arrive intact at the
receiving application.

• For example, the Skype application works with the


operating system to establish and maintain a session
between two end points for as long as a voice
conversation or video conference is in progress.

• How are session interruptions handled in the session


layer.
Layer 4: Transport Layer
• Is responsible for transporting Application layer
payloads from one application to another

• It takes data transferred in the session layer and


breaks it into segments on the transmitting end.

• It reassembles the segments on the receiving


end, turning it back into data that can be used in
the session layer.
• Eg. UDP and TCP
UDP vs TCP
• UDP (User Datagram Protocol) TCP (Transmission Control
• Is a connection-less or best- Protocol)
effort protocol. Why? • Is a connection-oriented
• Does not guarantee delivery by protocol, it makes a connection
first connecting and checking with the end host, checks
whether data is received whether the data is received,
and resends it if it is not.
• It guarantees delivery (It takes
longer)
Layer 3: Network Layer
• Is responsible for moving messages from one
node to another until they reach the destination
host.
• Also known as the Internet Layer
• The principal protocol used by the Network layer is
IP (Internet Protocol).
• Has two main functions:
1. Breaking segments into packets & reassembling
the packets
2. Routing packets by discovering the best path
across a physical network
Layer 2: Data Link Layer
• Is responsible for establishing and terminating a
connection btn two physically-connected nodes on a
network.
• It breaks up packets into frames and sends them from
source to destination.
• The protocols at these layers are programmed into the
firmware of a computer’s NIC and other networking
hardware.

• It is composed of two parts:


1. LLC (Logical Link Control)
2. MAC(Media Access Control)
Layer 1: Physical Layer
• Is responsible for the physical cable or
wireless connection btn network nodes.
• It defines the connector, the electrical cable or
wireless technology connecting the devices
• Also transmits raw data (0s and 1s)
Summary
• Physical Layer (Layer 1): Defines the physical means of data transmission, such as cable
specifications, wireless transmission, and network topology.
• Data Link Layer (Layer 2): Ensures error-free transfer of data frames between two devices on the
same network, using protocols like Ethernet, Wi-Fi, and PPP.
• Network Layer (Layer 3): Routes data between different networks, using protocols like IP, ICMP,
and IGMP.
• Transport Layer (Layer 4): Provides reliable data transfer between devices, using protocols like
TCP and UDP.
• Session Layer (Layer 5): Establishes, maintains, and terminates connections between applications,
using protocols like SSH.
• Presentation Layer (Layer 6): Converts data into a format suitable for the receiving device, using
protocols like SSL and TLS.
• Application Layer (Layer 7): Supports functions like email, file transfer, and web browsing, using
protocols like HTTP, FTP, and SMTP.
PROTOCOLS & PORT NUMBERS
• TCP (Transport Layer): Connection-oriented protocol, using port
numbers 20 and 21 for FTP.
• UDP (Transport Layer): Connectionless protocol, using port numbers
53 for DNS and 67/68 for DHCP.
• ICMP (Network Layer): Error-reporting protocol, using port number 1.
• HTTP (Application Layer): Web protocol, using port number 80.
• FTP (Application Layer): File transfer protocol, using port numbers 20
and 21.
End of Lesson
What is the OSI model, and what are its layers?
What is the role of a firewall in the OSI model’s context?
How does the OSI model enhance the understanding of network protocols?
What type of model is the OSI Model?

You might also like