0% found this document useful (0 votes)
8 views79 pages

Lecture 3

The OSI model, established by ISO/IEC 7498-1, is a seven-layer framework that standardizes how computers communicate over a network, dividing operations into upper and lower layers. The upper layers focus on application issues while the lower layers handle data transport, with communication protocols enabling actual data exchange through these layers. Each layer has specific functions, such as data formatting, encryption, and reliable message delivery, ultimately facilitating seamless communication between different systems.

Uploaded by

hasnain.2022a
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views79 pages

Lecture 3

The OSI model, established by ISO/IEC 7498-1, is a seven-layer framework that standardizes how computers communicate over a network, dividing operations into upper and lower layers. The upper layers focus on application issues while the lower layers handle data transport, with communication protocols enabling actual data exchange through these layers. Each layer has specific functions, such as data formatting, encryption, and reliable message delivery, ultimately facilitating seamless communication between different systems.

Uploaded by

hasnain.2022a
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 79

Module 4

https://www.site24x7.com/find-ip-
address-of-web-site.html
The OSI MODEL
• Designated ISO/IEC 7498-1, the OSI model is a
standard of the International Organization for
Standardization (ISO). It is a general-purpose
paradigm for discussing or describing how
computers communicate with one another
over a network. Its seven-layered approach to
data transmission divides the many operations
up into specific related groups of actions at
each layer.
OSI Layers
OSI Layers
An Exchange Using the OSI Model
• The seven layers of the OSI reference model can be divided into
two categories: upper layers and lower layers.

• The upper layers of the OSI model deal with application issues and
generally are implemented only in software. The highest layer, the
application layer, is closest to the end user. Both users and
application layer processes interact with software applications that
contain a communications component. The term upper layer is
sometimes used to refer to any layer above another layer in the OSI
model.

• The lower layers of the OSI model handle data transport issues.
The physical layer and the data link layer are implemented in
hardware and software. The lowest layer, the physical layer, is
closest to the physical network medium (the network cabling, for
example) and is responsible for actually placing information on the
medium.
The OSI model provides a conceptual framework
for communication between computers, but the
model itself is not a method of communication.
Actual communication is made possible by using
communication protocols. In the context of data
networking, a protocol is a formal set of rules
and conventions that governs how computers
exchange information over a network medium.
A protocol implements the functions of one or
more of the OSI layers.
OSI Model and Communication Between Systems

• Information being transferred from a software application in one computer


system to a software application in another must pass through the OSI layers.
For example, if a software application in System A has information to transmit
to a software application in System B, the application program in System A will
pass its information to the application layer (Layer 7) of System A. The
application layer then passes the information to the presentation layer (Layer
6), which relays the data to the session layer (Layer 5), and so on down to the
physical layer (Layer 1). At the physical layer, the information is placed on the
physical network medium and is sent across the medium to System B. The
physical layer of System B removes the information from the physical medium,
and then its physical layer passes the information up to the data link layer (Layer
2), which passes it to the network layer (Layer 3), and so on, until it reaches the
application layer (Layer 7) of System B. Finally, the application layer of System B
passes the information to the recipient application program to complete the
communication process
• Media layers: Physical,Data-Link,Network

• Host Layers: Transport,Session,Presentation,Application

• In layers 1 to 4 data is moving. Layers 5 to 7 data is being created.

• There are 5 different encapsulation methods depending of layers:

• Bit or Data-stream in physical layer.

• Frame in Data-Link layer.

• Packet or Datagram in Network layer.

• Segment in Transport layer.

• Data in Session layer. The concept of each layer appending its header to the data
received and passing it to the next layer.
Physical Layer
Data Link Layer Example
Network Layer
Network Layer
Figure 3-8
Network Layer Example

WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998


Transport Layer
Transport Layer
Session Layer
• In the seven-layer OSI model of computer
networking, the presentation layer is layer
and serves as the data translator for the
network. It is sometimes called the syntax
layer.
• It's basically a translator and provides coding and
conversion functions. A successful data transfer
technique is to adapt the data into a standard format
before transmission. Computers are configured to receive
this generically formatted data and then convert the data
back into its native format for reading. By providing
translation services, the Presentation layer ensures that
data transferred from the Application layer of one system
can be read by the Application layer of another host.

• The OSI has protocol standards that define how standard


data should be formatted. Tasks like data compression,
decompression, encryption and decryption are
associated with this layer
• Manages data-format information for networked communications (the
network’s translator)
• For outgoing messages, it converts data into a generic format for
network transmission; for incoming messages, it converts data from the generic
network format to a format that the receiving application can understand
• As layer six of the OSI model, the presentation layer is primarily responsible for managing
two networking characteristics: protocol and architecture. Whereas, protocol defines a
standard set of guidelines under which the network operates, the
network's architecture determines what protocol applies.
• As the translator, the presentation layer converts the data sent by the application layer of
the transmitting node into an acceptable and compatible data format based on the
applicable network protocol and architecture. Upon arrival at the receiving computer, the
presentation layer translates the data into an acceptable format usable by the application
layer. In other words, the presentation layer takes care of any issues occurring when
transmitted data must be viewed in a format different from the original format.
• As a functional part of the OSI model, the presentation layer performs a multitude of data
conversion algorithms and character translation functions. The first function is:
• Character-Code Translation: Where the presentation layer translates from the American
standard code for information interchange (ASCII) to the extended binary code decimal
interchange code (EBCDIC).
• The second function is:
• Data Conversion: This is where the presentation layer performs bit order reversal
functions, converts CR (byte code for a carriage return) to CR/LF, (byte code for a carriage
return with a line feed) and converts integer numbers to floating point numbers.
• Third, the presentation layer is responsible for:
• Data Compression, by reducing the number of bits requiring transmission, which improves
the data throughput.
• Data Encryption and Decryption: Encryption is needed for security
purposes when sending data across networks. An encryption algorithm
is used during transmission, while a decryption algorithm is used at the
receiving node. Encryption and decryption typically involves the secure
sockets layer (SSL) protocol, which has become more popular when used
by the presentation layer.
• The fifth function of the presentation layer is:
• Data Translation: Networks provide the capability of connecting different
types of computers, servers and mainframes on the same network and
may employ different character sets. The presentation layer is
responsible for fixing any irregularities while making translations
transparent between networked systems.
 The Application layer is responsible for identifying and
establishing the availability of the intended
communication partner and determining if sufficient
resources for the intended communication exist. The user
interfaces with the computer at the application layer.

 Although computer applications sometimes require only


desktop resources, applications may unite
communicating components from more than one
network application, for example, file transfers, e-mail,
remote access, network management activities,
client/server processes.

 There are various protocols which are used at this layer.


• It provides the interface between the
applications you use to communicate and the
underlying network over which your messages
are transmitted. Application layer protocols
are used to exchange data between programs
running on the source and destination hosts.
There are many application layer protocols,
and new protocols are always being
developed
Provides access to available
Layer Seven The Application Layer
resources

Translates, encrypts and


Layer Six The Presentation Layer
compresses data

Establishes, manages and


Layer Five The Session Layer terminates communicative
sessions

Provides reliable process-to-


Layer Four The Transport Layer process message delivery and
error recovery

Moves packets from source to


Layer Three The Network Layer destination by providing inter-
networking capabilities

Organizes bits into frames,


Layer Two The Data Link Layer providing node-to-node delivery

Transmits bits over a medium,


Layer One The Physical Layer establishing mechanical and
electrical specifications
• User Programs

Application programs, such as word processors, generate a stream of 'user


data' ready for transmission at the source end. Application programs
accept the data stream as input at the destination end. (Please note that
"user programs" is NOT part of the OSI, or any other communication
architecture.)

• Application Layer

• The Application Protocol provides 'utility functions', such as email and


file transfer systems, to the 'user data'. This facilitates communications
between end systems and eases the interface to the User Program.
(Please note that Application layer is part of communication protocol, is
NOT directly related to the User Programs or Application programs.)
• Application Layer - Provides services software
applications need. Provides the ability for user
applications to interact with the network.
Summary of Layers
• http://www.tcpipguide.com
• TCP/IP was developed during the 1960s as part of the
Department of Defense’s (DoD) Advanced Research
Projects Agency (ARPA) effort to build a nationwide packet
data network. It was first used in UNIX-based computers in
universities and government installations. Today, it is the
main protocol used in all Internet operations.

• TCP/IP also is a layered protocol but does not use all of the
OSI layers, though the layers are equivalent in operation
and function (Fig. 2). The network access layer is equivalent
to OSI layers 1 and 2. The Internet Protocol layer is
comparable to layer 3 in the OSI model. The host-to-host
layer is equivalent to OSI layer 4. These are the TCP and
UDP (user datagram protocol) functions. Finally, the
application layer is similar to OSI layers 5, 6, and 7
combined

You might also like