SlideShare a Scribd company logo
1 of 5
NAME- SOUMA MAITI
ROLL N0- 27500120016
REG NO.- 202750100110016
DEPARTMENT- COMPUTER SCIENCE
YEAR- 3RD YEAR(6TH SEMESTER)
SUBJECT NAME-COMPUTER NETWORKS
SUBJECT CODE- PCC-CS602
INTRODUCTION
• WHAT IS THE OSI MODEL?
• THE OPEN SYSTEMS INTERCONNECTION (OSI) MODEL
DESCRIBES SEVEN LAYERS THAT COMPUTER SYSTEMS USE TO
COMMUNICATE OVER A NETWORK. IT WAS THE FIRST
STANDARD MODEL FOR NETWORK COMMUNICATIONS,
ADOPTED BY ALL MAJOR COMPUTER AND
TELECOMMUNICATION COMPANIES IN THE EARLY 1980S
• THE MODERN INTERNET IS NOT BASED ON OSI, BUT ON THE
SIMPLER TCP/IP MODEL. HOWEVER, THE OSI 7-LAYER MODEL IS
STILL WIDELY USED, AS IT HELPS VISUALIZE AND
COMMUNICATE HOW NETWORKS OPERATE, AND HELPS
ISOLATE AND TROUBLESHOOT NETWORKING PROBLEMS.
• OSI WAS INTRODUCED IN 1983 BY REPRESENTATIVES OF THE
MAJOR COMPUTER AND TELECOM COMPANIES, AND WAS
ADOPTED BY ISO AS AN INTERNATIONAL STANDARD IN 1984.
7 LAYERS OF OSI MODEL
7. APPLICATION LAYER:
THE APPLICATION LAYER IS USED BY END-USER SOFTWARE SUCH AS WEB BROWSERS
AND EMAIL CLIENTS. IT PROVIDES PROTOCOLS THAT ALLOW SOFTWARE TO SEND AND
RECEIVE INFORMATION AND PRESENT MEANINGFUL DATA TO USERS. A FEW EXAMPLES
OF APPLICATION LAYER PROTOCOLS ARE THE HYPERTEXT TRANSFER PROTOCOL
(HTTP), FILE TRANSFER PROTOCOL (FTP), POST OFFICE PROTOCOL (POP), SIMPLE MAIL
TRANSFER PROTOCOL (SMTP), AND DOMAIN NAME SYSTEM (DNS).
6. PRESENTATION LAYER:
THE PRESENTATION LAYER PREPARES DATA FOR THE APPLICATION LAYER. IT DEFINES
HOW TWO DEVICES SHOULD ENCODE, ENCRYPT, AND COMPRESS DATA SO IT IS
RECEIVED CORRECTLY ON THE OTHER END. THE PRESENTATION LAYER TAKES ANY
DATA TRANSMITTED BY THE APPLICATION LAYER AND PREPARES IT FOR
TRANSMISSION OVER THE SESSION LAYER.
5. SESSION LAYER:
THE SESSION LAYER CREATES COMMUNICATION CHANNELS, CALLED SESSIONS,
BETWEEN DEVICES. IT IS RESPONSIBLE FOR OPENING SESSIONS, ENSURING THEY
REMAIN OPEN AND FUNCTIONAL WHILE DATA IS BEING TRANSFERRED, AND CLOSING
THEM WHEN COMMUNICATION ENDS. THE SESSION LAYER CAN ALSO SET
CHECKPOINTS DURING A DATA TRANSFER—IF THE SESSION IS INTERRUPTED, DEVICES
CAN RESUME DATA TRANSFER FROM THE LAST CHECKPOINT.
• 4. TRANSPORT LAYER:
• THE TRANSPORT LAYER TAKES DATA TRANSFERRED IN THE SESSION LAYER AND BREAKS IT INTO
“SEGMENTS” ON THE TRANSMITTING END. IT IS RESPONSIBLE FOR REASSEMBLING THE SEGMENTS
ON THE RECEIVING END, TURNING IT BACK INTO DATA THAT CAN BE USED BY THE SESSION
LAYER. THE TRANSPORT LAYER CARRIES OUT FLOW CONTROL, SENDING DATA AT A RATE THAT
MATCHES THE CONNECTION SPEED OF THE RECEIVING DEVICE, AND ERROR CONTROL, CHECKING
IF DATA WAS RECEIVED INCORRECTLY AND IF NOT, REQUESTING IT AGAIN.
• 3. NETWORK LAYER:
• THE NETWORK LAYER HAS TWO MAIN FUNCTIONS. ONE IS BREAKING UP SEGMENTS INTO
NETWORK PACKETS, AND REASSEMBLING THE PACKETS ON THE RECEIVING END. THE OTHER IS
ROUTING PACKETS BY DISCOVERING THE BEST PATH ACROSS A PHYSICAL NETWORK. THE
NETWORK LAYER USES NETWORK ADDRESSES (TYPICALLY INTERNET PROTOCOL ADDRESSES) TO
ROUTE PACKETS TO A DESTINATION NODE.
• 2. DATA LINK LAYER:
• THE DATA LINK LAYER ESTABLISHES AND TERMINATES A CONNECTION BETWEEN TWO
PHYSICALLY-CONNECTED NODES ON A NETWORK. IT BREAKS UP PACKETS INTO FRAMES AND
SENDS THEM FROM SOURCE TO DESTINATION. THIS LAYER IS COMPOSED OF TWO PARTS—
LOGICAL LINK CONTROL (LLC), WHICH IDENTIFIES NETWORK PROTOCOLS, PERFORMS ERROR
CHECKING AND SYNCHRONIZES FRAMES, AND MEDIA ACCESS CONTROL (MAC) WHICH USES MAC
ADDRESSES TO CONNECT DEVICES AND DEFINE PERMISSIONS TO TRANSMIT AND RECEIVE DATA.
• 1. PHYSICAL LAYER:
• THE PHYSICAL LAYER IS RESPONSIBLE FOR THE PHYSICAL CABLE OR WIRELESS CONNECTION
BETWEEN NETWORK NODES. IT DEFINES THE CONNECTOR, THE ELECTRICAL CABLE OR WIRELESS
TECHNOLOGY CONNECTING THE DEVICES, AND IS RESPONSIBLE FOR TRANSMISSION OF THE RAW
DATA, WHICH IS SIMPLY A SERIES OF 0S AND 1S, WHILE TAKING CARE OF BIT RATE CONTROL.
Open Systems Interconnection (OSI)  MODEL

More Related Content

Similar to Open Systems Interconnection (OSI) MODEL

What is network architecture
What is network architecture What is network architecture
What is network architecture Sorcia D'Arceuil
 
Network internet
Network internetNetwork internet
Network internetKumar
 
Networks internet
Networks internetNetworks internet
Networks internetKumar
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And DisadvantagesRenee Jones
 
What is network architecture (full)
What is network architecture (full)What is network architecture (full)
What is network architecture (full)Sorcia D'Arceuil
 
Ks 5th networking_basicskevinshea
Ks 5th networking_basicskevinsheaKs 5th networking_basicskevinshea
Ks 5th networking_basicskevinsheaPrema Bahadur
 
Ks 5th networking_basicskevinshea
Ks 5th networking_basicskevinsheaKs 5th networking_basicskevinshea
Ks 5th networking_basicskevinsheamaruthi vardhan
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORTRajat Kumar
 
Computer Network
Computer NetworkComputer Network
Computer Networkashiesh0007
 
Client Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxClient Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxDevChaudhari17
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-networklklokesh
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and modelsshahin raj
 

Similar to Open Systems Interconnection (OSI) MODEL (20)

What is network architecture
What is network architecture What is network architecture
What is network architecture
 
Network internet
Network internetNetwork internet
Network internet
 
Networks internet
Networks internetNetworks internet
Networks internet
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And Disadvantages
 
Document
DocumentDocument
Document
 
What is network architecture (full)
What is network architecture (full)What is network architecture (full)
What is network architecture (full)
 
Ks 5th networking_basicskevinshea
Ks 5th networking_basicskevinsheaKs 5th networking_basicskevinshea
Ks 5th networking_basicskevinshea
 
Ks 5th networking_basicskevinshea
Ks 5th networking_basicskevinsheaKs 5th networking_basicskevinshea
Ks 5th networking_basicskevinshea
 
Class notes 1
Class notes 1Class notes 1
Class notes 1
 
Lan pan class 12 ppt
Lan pan class 12 pptLan pan class 12 ppt
Lan pan class 12 ppt
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORT
 
network.pptx
network.pptxnetwork.pptx
network.pptx
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Client Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxClient Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptx
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-network
 
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006 PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and models
 

More from Souma Maiti

LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.Souma Maiti
 
Types of Cyber Security Attacks- Active & Passive Attak
Types of Cyber Security Attacks- Active & Passive AttakTypes of Cyber Security Attacks- Active & Passive Attak
Types of Cyber Security Attacks- Active & Passive AttakSouma Maiti
 
E-Commerce Analysis & Strategy Presentation
E-Commerce Analysis & Strategy PresentationE-Commerce Analysis & Strategy Presentation
E-Commerce Analysis & Strategy PresentationSouma Maiti
 
Principles of Network Security-CIAD TRIAD
Principles of Network Security-CIAD TRIADPrinciples of Network Security-CIAD TRIAD
Principles of Network Security-CIAD TRIADSouma Maiti
 
Decision Tree in Machine Learning
Decision Tree in Machine Learning  Decision Tree in Machine Learning
Decision Tree in Machine Learning Souma Maiti
 
Idea on Entreprenaurship
Idea on EntreprenaurshipIdea on Entreprenaurship
Idea on EntreprenaurshipSouma Maiti
 
System Based Attacks - CYBER SECURITY
System Based Attacks - CYBER SECURITYSystem Based Attacks - CYBER SECURITY
System Based Attacks - CYBER SECURITYSouma Maiti
 
Operation Research
Operation ResearchOperation Research
Operation ResearchSouma Maiti
 
Loan Approval Prediction Using Machine Learning
Loan Approval Prediction Using Machine LearningLoan Approval Prediction Using Machine Learning
Loan Approval Prediction Using Machine LearningSouma Maiti
 
Constitution of India
Constitution of IndiaConstitution of India
Constitution of IndiaSouma Maiti
 
COMIPLER_DESIGN_1[1].pdf
COMIPLER_DESIGN_1[1].pdfCOMIPLER_DESIGN_1[1].pdf
COMIPLER_DESIGN_1[1].pdfSouma Maiti
 
Heuristic Search Technique- Hill Climbing
Heuristic Search Technique- Hill ClimbingHeuristic Search Technique- Hill Climbing
Heuristic Search Technique- Hill ClimbingSouma Maiti
 
SATELLITE INTERNET AND STARLINK
SATELLITE INTERNET AND STARLINKSATELLITE INTERNET AND STARLINK
SATELLITE INTERNET AND STARLINKSouma Maiti
 
Fundamental Steps Of Image Processing
Fundamental Steps Of Image ProcessingFundamental Steps Of Image Processing
Fundamental Steps Of Image ProcessingSouma Maiti
 
Join in SQL - Inner, Self, Outer Join
Join in SQL - Inner, Self, Outer JoinJoin in SQL - Inner, Self, Outer Join
Join in SQL - Inner, Self, Outer JoinSouma Maiti
 
K means Clustering Algorithm
K means Clustering AlgorithmK means Clustering Algorithm
K means Clustering AlgorithmSouma Maiti
 
Errors in Numerical Analysis
Errors in Numerical AnalysisErrors in Numerical Analysis
Errors in Numerical AnalysisSouma Maiti
 
Internet of Things(IOT)
Internet of Things(IOT)Internet of Things(IOT)
Internet of Things(IOT)Souma Maiti
 

More from Souma Maiti (18)

LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
 
Types of Cyber Security Attacks- Active & Passive Attak
Types of Cyber Security Attacks- Active & Passive AttakTypes of Cyber Security Attacks- Active & Passive Attak
Types of Cyber Security Attacks- Active & Passive Attak
 
E-Commerce Analysis & Strategy Presentation
E-Commerce Analysis & Strategy PresentationE-Commerce Analysis & Strategy Presentation
E-Commerce Analysis & Strategy Presentation
 
Principles of Network Security-CIAD TRIAD
Principles of Network Security-CIAD TRIADPrinciples of Network Security-CIAD TRIAD
Principles of Network Security-CIAD TRIAD
 
Decision Tree in Machine Learning
Decision Tree in Machine Learning  Decision Tree in Machine Learning
Decision Tree in Machine Learning
 
Idea on Entreprenaurship
Idea on EntreprenaurshipIdea on Entreprenaurship
Idea on Entreprenaurship
 
System Based Attacks - CYBER SECURITY
System Based Attacks - CYBER SECURITYSystem Based Attacks - CYBER SECURITY
System Based Attacks - CYBER SECURITY
 
Operation Research
Operation ResearchOperation Research
Operation Research
 
Loan Approval Prediction Using Machine Learning
Loan Approval Prediction Using Machine LearningLoan Approval Prediction Using Machine Learning
Loan Approval Prediction Using Machine Learning
 
Constitution of India
Constitution of IndiaConstitution of India
Constitution of India
 
COMIPLER_DESIGN_1[1].pdf
COMIPLER_DESIGN_1[1].pdfCOMIPLER_DESIGN_1[1].pdf
COMIPLER_DESIGN_1[1].pdf
 
Heuristic Search Technique- Hill Climbing
Heuristic Search Technique- Hill ClimbingHeuristic Search Technique- Hill Climbing
Heuristic Search Technique- Hill Climbing
 
SATELLITE INTERNET AND STARLINK
SATELLITE INTERNET AND STARLINKSATELLITE INTERNET AND STARLINK
SATELLITE INTERNET AND STARLINK
 
Fundamental Steps Of Image Processing
Fundamental Steps Of Image ProcessingFundamental Steps Of Image Processing
Fundamental Steps Of Image Processing
 
Join in SQL - Inner, Self, Outer Join
Join in SQL - Inner, Self, Outer JoinJoin in SQL - Inner, Self, Outer Join
Join in SQL - Inner, Self, Outer Join
 
K means Clustering Algorithm
K means Clustering AlgorithmK means Clustering Algorithm
K means Clustering Algorithm
 
Errors in Numerical Analysis
Errors in Numerical AnalysisErrors in Numerical Analysis
Errors in Numerical Analysis
 
Internet of Things(IOT)
Internet of Things(IOT)Internet of Things(IOT)
Internet of Things(IOT)
 

Recently uploaded

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 

Recently uploaded (20)

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 

Open Systems Interconnection (OSI) MODEL

  • 1. NAME- SOUMA MAITI ROLL N0- 27500120016 REG NO.- 202750100110016 DEPARTMENT- COMPUTER SCIENCE YEAR- 3RD YEAR(6TH SEMESTER) SUBJECT NAME-COMPUTER NETWORKS SUBJECT CODE- PCC-CS602
  • 2. INTRODUCTION • WHAT IS THE OSI MODEL? • THE OPEN SYSTEMS INTERCONNECTION (OSI) MODEL DESCRIBES SEVEN LAYERS THAT COMPUTER SYSTEMS USE TO COMMUNICATE OVER A NETWORK. IT WAS THE FIRST STANDARD MODEL FOR NETWORK COMMUNICATIONS, ADOPTED BY ALL MAJOR COMPUTER AND TELECOMMUNICATION COMPANIES IN THE EARLY 1980S • THE MODERN INTERNET IS NOT BASED ON OSI, BUT ON THE SIMPLER TCP/IP MODEL. HOWEVER, THE OSI 7-LAYER MODEL IS STILL WIDELY USED, AS IT HELPS VISUALIZE AND COMMUNICATE HOW NETWORKS OPERATE, AND HELPS ISOLATE AND TROUBLESHOOT NETWORKING PROBLEMS. • OSI WAS INTRODUCED IN 1983 BY REPRESENTATIVES OF THE MAJOR COMPUTER AND TELECOM COMPANIES, AND WAS ADOPTED BY ISO AS AN INTERNATIONAL STANDARD IN 1984.
  • 3. 7 LAYERS OF OSI MODEL 7. APPLICATION LAYER: THE APPLICATION LAYER IS USED BY END-USER SOFTWARE SUCH AS WEB BROWSERS AND EMAIL CLIENTS. IT PROVIDES PROTOCOLS THAT ALLOW SOFTWARE TO SEND AND RECEIVE INFORMATION AND PRESENT MEANINGFUL DATA TO USERS. A FEW EXAMPLES OF APPLICATION LAYER PROTOCOLS ARE THE HYPERTEXT TRANSFER PROTOCOL (HTTP), FILE TRANSFER PROTOCOL (FTP), POST OFFICE PROTOCOL (POP), SIMPLE MAIL TRANSFER PROTOCOL (SMTP), AND DOMAIN NAME SYSTEM (DNS). 6. PRESENTATION LAYER: THE PRESENTATION LAYER PREPARES DATA FOR THE APPLICATION LAYER. IT DEFINES HOW TWO DEVICES SHOULD ENCODE, ENCRYPT, AND COMPRESS DATA SO IT IS RECEIVED CORRECTLY ON THE OTHER END. THE PRESENTATION LAYER TAKES ANY DATA TRANSMITTED BY THE APPLICATION LAYER AND PREPARES IT FOR TRANSMISSION OVER THE SESSION LAYER. 5. SESSION LAYER: THE SESSION LAYER CREATES COMMUNICATION CHANNELS, CALLED SESSIONS, BETWEEN DEVICES. IT IS RESPONSIBLE FOR OPENING SESSIONS, ENSURING THEY REMAIN OPEN AND FUNCTIONAL WHILE DATA IS BEING TRANSFERRED, AND CLOSING THEM WHEN COMMUNICATION ENDS. THE SESSION LAYER CAN ALSO SET CHECKPOINTS DURING A DATA TRANSFER—IF THE SESSION IS INTERRUPTED, DEVICES CAN RESUME DATA TRANSFER FROM THE LAST CHECKPOINT.
  • 4. • 4. TRANSPORT LAYER: • THE TRANSPORT LAYER TAKES DATA TRANSFERRED IN THE SESSION LAYER AND BREAKS IT INTO “SEGMENTS” ON THE TRANSMITTING END. IT IS RESPONSIBLE FOR REASSEMBLING THE SEGMENTS ON THE RECEIVING END, TURNING IT BACK INTO DATA THAT CAN BE USED BY THE SESSION LAYER. THE TRANSPORT LAYER CARRIES OUT FLOW CONTROL, SENDING DATA AT A RATE THAT MATCHES THE CONNECTION SPEED OF THE RECEIVING DEVICE, AND ERROR CONTROL, CHECKING IF DATA WAS RECEIVED INCORRECTLY AND IF NOT, REQUESTING IT AGAIN. • 3. NETWORK LAYER: • THE NETWORK LAYER HAS TWO MAIN FUNCTIONS. ONE IS BREAKING UP SEGMENTS INTO NETWORK PACKETS, AND REASSEMBLING THE PACKETS ON THE RECEIVING END. THE OTHER IS ROUTING PACKETS BY DISCOVERING THE BEST PATH ACROSS A PHYSICAL NETWORK. THE NETWORK LAYER USES NETWORK ADDRESSES (TYPICALLY INTERNET PROTOCOL ADDRESSES) TO ROUTE PACKETS TO A DESTINATION NODE. • 2. DATA LINK LAYER: • THE DATA LINK LAYER ESTABLISHES AND TERMINATES A CONNECTION BETWEEN TWO PHYSICALLY-CONNECTED NODES ON A NETWORK. IT BREAKS UP PACKETS INTO FRAMES AND SENDS THEM FROM SOURCE TO DESTINATION. THIS LAYER IS COMPOSED OF TWO PARTS— LOGICAL LINK CONTROL (LLC), WHICH IDENTIFIES NETWORK PROTOCOLS, PERFORMS ERROR CHECKING AND SYNCHRONIZES FRAMES, AND MEDIA ACCESS CONTROL (MAC) WHICH USES MAC ADDRESSES TO CONNECT DEVICES AND DEFINE PERMISSIONS TO TRANSMIT AND RECEIVE DATA. • 1. PHYSICAL LAYER: • THE PHYSICAL LAYER IS RESPONSIBLE FOR THE PHYSICAL CABLE OR WIRELESS CONNECTION BETWEEN NETWORK NODES. IT DEFINES THE CONNECTOR, THE ELECTRICAL CABLE OR WIRELESS TECHNOLOGY CONNECTING THE DEVICES, AND IS RESPONSIBLE FOR TRANSMISSION OF THE RAW DATA, WHICH IS SIMPLY A SERIES OF 0S AND 1S, WHILE TAKING CARE OF BIT RATE CONTROL.