0% found this document useful (0 votes)
9 views13 pages

Lesson 4 - OSI Model

Uploaded by

emanuelokala5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views13 pages

Lesson 4 - OSI Model

Uploaded by

emanuelokala5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

NETWORK &

SYSTEM
ADMINISTRATION
MCIT 06103

C.M.N
The OSI Model
• OSI (Open Systems Interconnection) model - describes seven layers
that computer systems use to communicate over a network.

• It was first developed by the International Organization for


Standardization, also called the ISO. (Its shortened name, ISO, is
derived from a Greek word meaning equal.) Network engineers,
hardware technicians, programmers, and network administrators still
use the layers of the OSI model to communicate about networking
technologies.
OSI Model
• You need to memorize the seven layers of the OSI model. Here’s a
seven-word mnemonic that can help, or you can write your own:
All People Seem To Need Data Processing

Now let’s take a look at each layer in the OSI model.


The layers are numbered in descending order, starting
with Layer 7, the Application layer, at the top.
Layer 7: Application Layer
• Describes the interface between two
applications, each on separate computers.
• It is the Human-computer interaction layer,
where apps can access network services.
• includes protocols like HTTP, SMTP, POP3,
IMAP4, FTP, and Telnet.
Layer 6: Presentation Layer
• Is responsible for reformatting, compressing,
and/or encrypting data in a way that the
application on the receiving end can read.
• For example, an email message can be
encrypted at the Presentation layer by the
email client or by the operating system.
• It ensures data is in a usable format and it is
where encryption of data occurs
Layer 5: Session Layer
• Describes how data between applications is synced
and recovered if messages don’t arrive intact at the
receiving application.

• For example, the Skype application works with the


operating system to establish and maintain a session
between two end points for as long as a voice
conversation or video conference is in progress.

• How are session interruptions handled in the session


layer.
Layer 4: Transport Layer
• Is responsible for transporting Application layer
payloads from one application to another

• It takes data transferred in the session layer and


breaks it into segments on the transmitting end.

• It reassembles the segments on the receiving


end, turning it back into data that can be used in
the session layer.
• Eg. UDP and TCP
UDP vs TCP
• UDP (User Datagram Protocol) TCP (Transmission Control
• Is a connection-less or best- Protocol)
effort protocol. Why? • Is a connection-oriented
• Does not guarantee delivery by protocol, it makes a connection
first connecting and checking with the end host, checks
whether data is received whether the data is received,
and resends it if it is not.
• It guarantees delivery (It takes
longer)
Layer 3: Network Layer
• Is responsible for moving messages from one
node to another until they reach the destination
host.
• Also known as the Internet Layer
• The principal protocol used by the Network layer is
IP (Internet Protocol).
• Has two main functions:
1. Breaking segments into packets & reassembling
the packets
2. Routing packets by discovering the best path
across a physical network
Layer 2: Data Link Layer
• Is responsible for establishing and terminating a
connection btn two physically-connected nodes on a
network.
• It breaks up packets into frames and sends them from
source to destination.
• The protocols at these layers are programmed into the
firmware of a computer’s NIC and other networking
hardware.

• It is composed of two parts:


1. LLC (Logical Link Control)
2. MAC(Media Access Control)
Layer 1: Physical Layer
• Is responsible for the physical cable or
wireless connection btn network nodes.
• It defines the connector, the electrical cable or
wireless technology connecting the devices
• Also transmits raw data (0s and 1s)
End of Lesson

You might also like