SlideShare a Scribd company logo
1 of 15
Download to read offline
OSI model layers | 7 Types
of OSI Model | Edifyclue
The international standard organization (ISO) is a multinational body
dedicated to a worldwide agreement on international standards.
An ISO standard that covers all aspects of network communications is the
Open Systems Interconnection OSI model layers.
An open system may be a model that permits any two different systems to
speak no matter their underlying architecture.
The purpose of the OSI model layers is to open communication between
different systems without requiring changes to the logic of the underlying
computer hardware and software.
The OSI model is not a protocol it is a model for understanding and designing
a data network architecture that is flexible, robust, and interoperable.
The Open System Interconnection (OSI model layers) is a framework for
the design of network systems that allow for communication across all types of
computer systems.
It consists of 7 separate but related layers, each of which defines a segment of
the process of moving information across a network.
Function Of The OSI model layers
In this section, we briefly describe the functions of each seven-layer
in the OSI model:-
● Application layer
● Presentation layer
● Session layer
● Transport layer
● Network layer
● Data Link layer
● Physical Layer
Physical Layer:-
The physical layer coordinates the functions needed to transmit a bitstream
over a physical medium. It deals with the mechanical and electrical
specifications of the interface and transmission medium.
It conjointly defines the procedures and functions that physical devices and
interfaces got to perform for transmission to occur. The position of the
physical layer is relevant to the transmission medium and also the electrical
circuit layer.
The responsibilities of the physical layer include the following:-
● Physical characteristics of interface and media – The
physical layer defines the characteristics of the interface between
the devices and also the transmission medium.
● Representation of bits:- The physical layer information
incorporates a stream of bits (sequence of 0s and 1s) with no
interpretation. To be transmitted, bits should be encoded into
signals electrical and optical. The physical layer defines the kind
of coding.
● Data rate:- The transmission rate of the number of bits sent
every second is additionally outlined by the physical layer. The
physical layer defines the period of touch, that is however long it
lasts.
● Synchronization of bits:- The sender and receiver should be
synchronous at the bit level. The sender and also the receiver
clocks should be synchronous.
● Line configuration:- The physical layer cares about the
affiliation of devices to the medium. in an exceeding
purpose-to-purpose configuration, 2 devices square measure
connected along through an obsessive link. in an exceedingly
multipoint configuration, a link is shared between many devices.
● Physical topology:- The topology defines however devices
square measure connected to form to network. Devices are often
connected employing a mesh (every device connected to each
alternative device), a topology (devices square measure
connected through central devices), a hoop topology (every
device is connected to successive, forming a ring), or a topology
(every device on a standard link).
● Transmission mode:- The physical layer conjointly defines the
transmission mechanism between 2 devices simplex, half-duplex,
or full-duplex. within the simplex mode, just one device will send
the opposite will solely receive. The simplex mode could be
unidirectional communication. within the half-duplex mode, 2
devices will send and receive, however not at the same time. in an
exceedingly full-duplex mode, 2 devices send and receive at
identical times.
Datalink Layer:-
The data link layer transforms the physical layer, a raw transmission facility,
into a reliable link and is responsible for node to node delivery.
It makes the physical layer appear error-free to the upper layer (Network
layer) and the relationship of the data link layer to the network and physical
layers.
The responsibilities of the data link layer include the following:-
● Framing:- the info link layer divides the stream of bits received
from the network layer into manageable data units called frames.
● Physical addressing:- If frames are to be distributed to a
different system on the network, the data link layer adds a header
to the frame to define the physical address of the sender (source
address) and receiver (destination address) of the frame. If the
frame is intended for a system outside the sender network, the
receiver address is the address of the device that connects one
network to the next.
● Flow control:- Data absorbed by the receiver is less than the
rate produced in the sender, the data link layer imposes a flow
control mechanism to prevent massive the receiver.
● Error control:- The data link layer adds reliability to the
physical layer by adding a mechanism to direct and transmit
damaged or lost frames. It also uses a mechanism to stop the
duplication of frames. Error control is generally achieved through
a trailer added to the top of the frame.
● Access control:- When 2 or more devices are connected to an
equivalent link, link-layer protocols are necessary to work out
which device has control over the link at any given time.
Network Layer:-
The network layer is responsible for the source to destination delivery of a
packet possibly across multiple network links.
The data link layer oversees the delivery of the packet between 2 systems on
the same network links, and the network later ensures that each packet gets
from its point of origin to its final destination.
If 2 systems are connected to the same link, there is usually no need for a
network layer. If the 2 systems are connected to different network links with
attached devices between the network links, there is often a need for the
network layer to accomplish source-to-destination delivery.
The relationship of the network layer o the data link and transport layer.
The responsibilities of the network layer include the following:-
● Logical addressing:- The physical addressing implemented by
the info link layer handles the addressing problem locally. If a
packet passes the network boundary, we’d like another
addressing system to assist distinguish the source and
destination systems. The network layer adds a header to the
packet coming from the upper layer that, among other things,
involves the logical addresses of the sender and receiver.
● Routing:- When independent networks or links are connected
together to create an internetwork or a large network, the
connecting devices called routers and gateways route the packets
to their final destination. One of the functions of the network
layer is to give this mechanism.
Transport Layer:-
The transport layer is accountable for the supply to destination (end-to-end)
delivery of the entire message.
The network layer oversees the finish to complete delivery of individual
packets, it does not acknowledge any relationship between those packets.
It treats all severally as if every bit belonged to a separate message. The
transport layer, on the other hand, ensures that the whole message arrives
intact and then as, overseeing each error management and flow management
at the supply to destination level.
The connection of the transport layer to the network and session layers. The
transport layer mat creates an affiliation between the two finish ports. An
affiliation could be a single logical path between the supply and destination
that go with all packets in a very message.
making an affiliation involves 3 steps: affiliation institution, knowledge
transfer, and affiliation unharness.
Transmission of all packets to 1 pathway, the transport layer has a lot of
management over sequencing, flow, and error detection and correction.
The responsibilities of the transport layer include the following:-
● Service purpose addressing:- Computers usually run many
programs at identical times. supply to destination delivery
suggests that delivery not solely from one pc to the next but
conjointly from a specific method on one pc to a specific method
on the other. The transport layer header so should embody a sort
of address referred to as a service purpose address. The network
layer gets every packet to the correct pc the transport layer gets
the entire message to the correct method on its pc.
● Segmentation and reconstruction:- A message divided into
communicable segments, every phase containing a sequence
variety. These numbers modify the transport layer to put together
the message properly upon inward at the destination and to
identify and replace packets that were lost inside the
transmission.
● Connection management:- A connectionless transport layer
treats every phase as AN freelance packet and delivers it to the
transport layer at the destination machine. A
connection-oriented transport layer makes respect to the
transport layer at the destination machine initial before
delivering the packets. in the end, the information is transferred,
and the affiliation is terminated.
● Flow management:- The transport layer is accountable for
flow management. However, flow management at this layer is
performed finish to complete rather than across one link.
● Error management:- The transport layer is accountable for
flow management. However, flow management at this layer is
performed finish to complete rather than across one link. The
causing transport layer makes positive that the entire message
arrives at the receiving transport layer while not an error.
Session layer:-
The service provided by the primary three-layer (physical, data link, and
network) is not adequate for a few processes. The session layer is the network
dialog controller. it establishes, maintains, and synchronizes the interaction
between the communication system.
Specific responsibilities of the session layer include the following:-
● Dialog management:- The session layer permits 2 systems to
enter into a dialog. It permits the communication between 2
processes to require place either in half-duplex (one approach at
a time) or full-duplex (two-approach at a time).
Presentation Layer:-
The presentation layer is bothered with the syntax and linguistics of the
knowledge changed between the two systems. the connection between the
presentation layer and thus the applying and session layer.
Specific responsibilities of the presentation layer include the
following:-
● Translation:- The method (running program) in 2 systems is
typically exchanging data within the kind of character string,
numbers, and so on. the knowledge ought to be modified to
bitstreams before being transmitted. as a result of totally
different|completely different} computers using different
cryptography systems, the presentation layer is chargeable for
ability between these totally different cryptography ways.
The presentation layer at the sender changes the information from its
sender-dependent format into a regular format. the presentation layer at the
receiving machine changes the same format into its receiver-dependent
format.
OSI Model –Wikipedia
● Encryption:- To carry sensitive data, a system should be able to
assure privacy. cryptography implies that the sender transforms
the first data to a different kind and sends that ensuing message
out over the network. cryptography reverses the first method to
rework the messages back to their original kind.
● Compression:- Information compression reduces the amount
of bits t be transmitted. information compression becomes
significantly necessary in the transmission of transmissions like
text, audio, and video.
Application Layer:-
The appliance layer allows the user, whether or not human or computer code,
to access the network. It provides user interfaces and support for services like
email correspondence, remote file access and transfer, shared management,
and alternative forms of distributed info services.
Specific services provided by the appliance layer include the
following:-
● Network virtual terminals:- A network virtual terminal may
be a computer code version of a physically terminal and permits a
user to go surfing in a foreign host. the appliance creates a
computer code emulation of a terminal at the remote host. That
user’s laptop talks to the computer code terminal. The remote
host believes it’s a human activity with one amongst its own
terminals and permits you to brand on. File transfer, access, and
management (FTAM) – This application permits a user to access
files in an exceedingly remote laptop, and to manage or manage
files in an exceedingly remote laptop.
● Mails services:- This application provides the premise for
email forwarding and storage.
● Directory services:- This application provides distributed info
sources and access to world info regarding varied objects and
services.
Conclusion:-
I hope you have understood this article’s OSI model layers. Share this article
with your friends and if you want to get some information about it, then you
can subscribe.

More Related Content

Similar to OSI model layers 7 Types of OSI Model Edifyclue.pdf

Similar to OSI model layers 7 Types of OSI Model Edifyclue.pdf (20)

OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Osi model
Osi modelOsi model
Osi model
 
Chap 1 introduction
Chap 1 introductionChap 1 introduction
Chap 1 introduction
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
Class work 6,computer_network_317
Class work 6,computer_network_317Class work 6,computer_network_317
Class work 6,computer_network_317
 
The OSI model
 The OSI model The OSI model
The OSI model
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
Osi model
Osi modelOsi model
Osi model
 
Basics of Ethernet
Basics of Ethernet Basics of Ethernet
Basics of Ethernet
 
The Osi Model
The Osi ModelThe Osi Model
The Osi Model
 
Lecture 05
Lecture 05Lecture 05
Lecture 05
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
The ISO_OSI Reference Model
The ISO_OSI Reference ModelThe ISO_OSI Reference Model
The ISO_OSI Reference Model
 
Osi model
Osi model Osi model
Osi model
 
Osi model
Osi modelOsi model
Osi model
 
Osi model
Osi modelOsi model
Osi model
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 

More from sunil shukla

What is modem Types of modem How does the Modem work.pdf
What is modem  Types of modem  How does the Modem work.pdfWhat is modem  Types of modem  How does the Modem work.pdf
What is modem Types of modem How does the Modem work.pdfsunil shukla
 
Network Topology In Computer Network 6-Types of topologies.pdf
Network Topology In Computer Network  6-Types of topologies.pdfNetwork Topology In Computer Network  6-Types of topologies.pdf
Network Topology In Computer Network 6-Types of topologies.pdfsunil shukla
 
Benefits of ICT in 7 different sectors Edifyclue.pdf
Benefits of ICT in 7 different sectors Edifyclue.pdfBenefits of ICT in 7 different sectors Edifyclue.pdf
Benefits of ICT in 7 different sectors Edifyclue.pdfsunil shukla
 
Types of Routers What is a Router How Routers Work, and Uses of routers.pdf
Types of Routers What is a Router How Routers Work, and Uses of routers.pdfTypes of Routers What is a Router How Routers Work, and Uses of routers.pdf
Types of Routers What is a Router How Routers Work, and Uses of routers.pdfsunil shukla
 
Unguided Media in Computer Network Advantages and Disadvantages Edifyclue.in.pdf
Unguided Media in Computer Network Advantages and Disadvantages Edifyclue.in.pdfUnguided Media in Computer Network Advantages and Disadvantages Edifyclue.in.pdf
Unguided Media in Computer Network Advantages and Disadvantages Edifyclue.in.pdfsunil shukla
 
Computer Hardware And Software Types, Functions, Difference between Hardware ...
Computer Hardware And Software Types, Functions, Difference between Hardware ...Computer Hardware And Software Types, Functions, Difference between Hardware ...
Computer Hardware And Software Types, Functions, Difference between Hardware ...sunil shukla
 
What is Keyboard Different Types of Keyboards Advantages, and Disadvantages.pdf
What is Keyboard Different Types of Keyboards Advantages, and Disadvantages.pdfWhat is Keyboard Different Types of Keyboards Advantages, and Disadvantages.pdf
What is Keyboard Different Types of Keyboards Advantages, and Disadvantages.pdfsunil shukla
 
Types of Computer Cables, 5 points of advantages.pdf
Types of Computer Cables,   5 points of advantages.pdfTypes of Computer Cables,   5 points of advantages.pdf
Types of Computer Cables, 5 points of advantages.pdfsunil shukla
 

More from sunil shukla (8)

What is modem Types of modem How does the Modem work.pdf
What is modem  Types of modem  How does the Modem work.pdfWhat is modem  Types of modem  How does the Modem work.pdf
What is modem Types of modem How does the Modem work.pdf
 
Network Topology In Computer Network 6-Types of topologies.pdf
Network Topology In Computer Network  6-Types of topologies.pdfNetwork Topology In Computer Network  6-Types of topologies.pdf
Network Topology In Computer Network 6-Types of topologies.pdf
 
Benefits of ICT in 7 different sectors Edifyclue.pdf
Benefits of ICT in 7 different sectors Edifyclue.pdfBenefits of ICT in 7 different sectors Edifyclue.pdf
Benefits of ICT in 7 different sectors Edifyclue.pdf
 
Types of Routers What is a Router How Routers Work, and Uses of routers.pdf
Types of Routers What is a Router How Routers Work, and Uses of routers.pdfTypes of Routers What is a Router How Routers Work, and Uses of routers.pdf
Types of Routers What is a Router How Routers Work, and Uses of routers.pdf
 
Unguided Media in Computer Network Advantages and Disadvantages Edifyclue.in.pdf
Unguided Media in Computer Network Advantages and Disadvantages Edifyclue.in.pdfUnguided Media in Computer Network Advantages and Disadvantages Edifyclue.in.pdf
Unguided Media in Computer Network Advantages and Disadvantages Edifyclue.in.pdf
 
Computer Hardware And Software Types, Functions, Difference between Hardware ...
Computer Hardware And Software Types, Functions, Difference between Hardware ...Computer Hardware And Software Types, Functions, Difference between Hardware ...
Computer Hardware And Software Types, Functions, Difference between Hardware ...
 
What is Keyboard Different Types of Keyboards Advantages, and Disadvantages.pdf
What is Keyboard Different Types of Keyboards Advantages, and Disadvantages.pdfWhat is Keyboard Different Types of Keyboards Advantages, and Disadvantages.pdf
What is Keyboard Different Types of Keyboards Advantages, and Disadvantages.pdf
 
Types of Computer Cables, 5 points of advantages.pdf
Types of Computer Cables,   5 points of advantages.pdfTypes of Computer Cables,   5 points of advantages.pdf
Types of Computer Cables, 5 points of advantages.pdf
 

Recently uploaded

Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Recently uploaded (20)

Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

OSI model layers 7 Types of OSI Model Edifyclue.pdf

  • 1. OSI model layers | 7 Types of OSI Model | Edifyclue The international standard organization (ISO) is a multinational body dedicated to a worldwide agreement on international standards. An ISO standard that covers all aspects of network communications is the Open Systems Interconnection OSI model layers. An open system may be a model that permits any two different systems to speak no matter their underlying architecture. The purpose of the OSI model layers is to open communication between different systems without requiring changes to the logic of the underlying computer hardware and software. The OSI model is not a protocol it is a model for understanding and designing a data network architecture that is flexible, robust, and interoperable.
  • 2. The Open System Interconnection (OSI model layers) is a framework for the design of network systems that allow for communication across all types of computer systems. It consists of 7 separate but related layers, each of which defines a segment of the process of moving information across a network. Function Of The OSI model layers In this section, we briefly describe the functions of each seven-layer in the OSI model:-
  • 3. ● Application layer ● Presentation layer ● Session layer ● Transport layer ● Network layer ● Data Link layer ● Physical Layer Physical Layer:- The physical layer coordinates the functions needed to transmit a bitstream over a physical medium. It deals with the mechanical and electrical specifications of the interface and transmission medium. It conjointly defines the procedures and functions that physical devices and interfaces got to perform for transmission to occur. The position of the
  • 4. physical layer is relevant to the transmission medium and also the electrical circuit layer. The responsibilities of the physical layer include the following:- ● Physical characteristics of interface and media – The physical layer defines the characteristics of the interface between the devices and also the transmission medium. ● Representation of bits:- The physical layer information incorporates a stream of bits (sequence of 0s and 1s) with no interpretation. To be transmitted, bits should be encoded into signals electrical and optical. The physical layer defines the kind of coding. ● Data rate:- The transmission rate of the number of bits sent every second is additionally outlined by the physical layer. The physical layer defines the period of touch, that is however long it lasts. ● Synchronization of bits:- The sender and receiver should be synchronous at the bit level. The sender and also the receiver clocks should be synchronous. ● Line configuration:- The physical layer cares about the affiliation of devices to the medium. in an exceeding purpose-to-purpose configuration, 2 devices square measure connected along through an obsessive link. in an exceedingly multipoint configuration, a link is shared between many devices. ● Physical topology:- The topology defines however devices square measure connected to form to network. Devices are often connected employing a mesh (every device connected to each alternative device), a topology (devices square measure connected through central devices), a hoop topology (every device is connected to successive, forming a ring), or a topology (every device on a standard link). ● Transmission mode:- The physical layer conjointly defines the transmission mechanism between 2 devices simplex, half-duplex, or full-duplex. within the simplex mode, just one device will send the opposite will solely receive. The simplex mode could be
  • 5. unidirectional communication. within the half-duplex mode, 2 devices will send and receive, however not at the same time. in an exceedingly full-duplex mode, 2 devices send and receive at identical times. Datalink Layer:- The data link layer transforms the physical layer, a raw transmission facility, into a reliable link and is responsible for node to node delivery. It makes the physical layer appear error-free to the upper layer (Network layer) and the relationship of the data link layer to the network and physical layers. The responsibilities of the data link layer include the following:-
  • 6. ● Framing:- the info link layer divides the stream of bits received from the network layer into manageable data units called frames. ● Physical addressing:- If frames are to be distributed to a different system on the network, the data link layer adds a header to the frame to define the physical address of the sender (source address) and receiver (destination address) of the frame. If the frame is intended for a system outside the sender network, the receiver address is the address of the device that connects one network to the next. ● Flow control:- Data absorbed by the receiver is less than the rate produced in the sender, the data link layer imposes a flow control mechanism to prevent massive the receiver. ● Error control:- The data link layer adds reliability to the physical layer by adding a mechanism to direct and transmit damaged or lost frames. It also uses a mechanism to stop the duplication of frames. Error control is generally achieved through a trailer added to the top of the frame. ● Access control:- When 2 or more devices are connected to an equivalent link, link-layer protocols are necessary to work out which device has control over the link at any given time. Network Layer:-
  • 7. The network layer is responsible for the source to destination delivery of a packet possibly across multiple network links. The data link layer oversees the delivery of the packet between 2 systems on the same network links, and the network later ensures that each packet gets from its point of origin to its final destination. If 2 systems are connected to the same link, there is usually no need for a network layer. If the 2 systems are connected to different network links with attached devices between the network links, there is often a need for the network layer to accomplish source-to-destination delivery. The relationship of the network layer o the data link and transport layer. The responsibilities of the network layer include the following:-
  • 8. ● Logical addressing:- The physical addressing implemented by the info link layer handles the addressing problem locally. If a packet passes the network boundary, we’d like another addressing system to assist distinguish the source and destination systems. The network layer adds a header to the packet coming from the upper layer that, among other things, involves the logical addresses of the sender and receiver. ● Routing:- When independent networks or links are connected together to create an internetwork or a large network, the connecting devices called routers and gateways route the packets to their final destination. One of the functions of the network layer is to give this mechanism. Transport Layer:-
  • 9. The transport layer is accountable for the supply to destination (end-to-end) delivery of the entire message. The network layer oversees the finish to complete delivery of individual packets, it does not acknowledge any relationship between those packets. It treats all severally as if every bit belonged to a separate message. The transport layer, on the other hand, ensures that the whole message arrives intact and then as, overseeing each error management and flow management at the supply to destination level. The connection of the transport layer to the network and session layers. The transport layer mat creates an affiliation between the two finish ports. An affiliation could be a single logical path between the supply and destination that go with all packets in a very message. making an affiliation involves 3 steps: affiliation institution, knowledge transfer, and affiliation unharness. Transmission of all packets to 1 pathway, the transport layer has a lot of management over sequencing, flow, and error detection and correction. The responsibilities of the transport layer include the following:- ● Service purpose addressing:- Computers usually run many programs at identical times. supply to destination delivery suggests that delivery not solely from one pc to the next but conjointly from a specific method on one pc to a specific method on the other. The transport layer header so should embody a sort of address referred to as a service purpose address. The network layer gets every packet to the correct pc the transport layer gets the entire message to the correct method on its pc. ● Segmentation and reconstruction:- A message divided into communicable segments, every phase containing a sequence variety. These numbers modify the transport layer to put together
  • 10. the message properly upon inward at the destination and to identify and replace packets that were lost inside the transmission. ● Connection management:- A connectionless transport layer treats every phase as AN freelance packet and delivers it to the transport layer at the destination machine. A connection-oriented transport layer makes respect to the transport layer at the destination machine initial before delivering the packets. in the end, the information is transferred, and the affiliation is terminated. ● Flow management:- The transport layer is accountable for flow management. However, flow management at this layer is performed finish to complete rather than across one link. ● Error management:- The transport layer is accountable for flow management. However, flow management at this layer is performed finish to complete rather than across one link. The causing transport layer makes positive that the entire message arrives at the receiving transport layer while not an error. Session layer:-
  • 11. The service provided by the primary three-layer (physical, data link, and network) is not adequate for a few processes. The session layer is the network dialog controller. it establishes, maintains, and synchronizes the interaction between the communication system. Specific responsibilities of the session layer include the following:- ● Dialog management:- The session layer permits 2 systems to enter into a dialog. It permits the communication between 2 processes to require place either in half-duplex (one approach at a time) or full-duplex (two-approach at a time). Presentation Layer:-
  • 12. The presentation layer is bothered with the syntax and linguistics of the knowledge changed between the two systems. the connection between the presentation layer and thus the applying and session layer. Specific responsibilities of the presentation layer include the following:- ● Translation:- The method (running program) in 2 systems is typically exchanging data within the kind of character string, numbers, and so on. the knowledge ought to be modified to bitstreams before being transmitted. as a result of totally different|completely different} computers using different cryptography systems, the presentation layer is chargeable for ability between these totally different cryptography ways.
  • 13. The presentation layer at the sender changes the information from its sender-dependent format into a regular format. the presentation layer at the receiving machine changes the same format into its receiver-dependent format. OSI Model –Wikipedia ● Encryption:- To carry sensitive data, a system should be able to assure privacy. cryptography implies that the sender transforms the first data to a different kind and sends that ensuing message out over the network. cryptography reverses the first method to rework the messages back to their original kind. ● Compression:- Information compression reduces the amount of bits t be transmitted. information compression becomes significantly necessary in the transmission of transmissions like text, audio, and video. Application Layer:-
  • 14. The appliance layer allows the user, whether or not human or computer code, to access the network. It provides user interfaces and support for services like email correspondence, remote file access and transfer, shared management, and alternative forms of distributed info services. Specific services provided by the appliance layer include the following:- ● Network virtual terminals:- A network virtual terminal may be a computer code version of a physically terminal and permits a user to go surfing in a foreign host. the appliance creates a computer code emulation of a terminal at the remote host. That user’s laptop talks to the computer code terminal. The remote host believes it’s a human activity with one amongst its own terminals and permits you to brand on. File transfer, access, and
  • 15. management (FTAM) – This application permits a user to access files in an exceedingly remote laptop, and to manage or manage files in an exceedingly remote laptop. ● Mails services:- This application provides the premise for email forwarding and storage. ● Directory services:- This application provides distributed info sources and access to world info regarding varied objects and services. Conclusion:- I hope you have understood this article’s OSI model layers. Share this article with your friends and if you want to get some information about it, then you can subscribe.