SlideShare a Scribd company logo
OSI Model
• The OSI reference model
• Services in the OSI model
Topics
• OSI Reference Model - internationally
standardised network architecture.
• OSI = Open Systems Interconnection: deals
with open systems, i.e. systems open for
communications with other systems.
• Specified in ISO 7498.
• Model has 7 layers.
OSI Reference Model
• Layers 1-4 relate to
communications technology.
• Layers 5-7 relate to user
applications.
7-Layer OSI Model
Layer 7
Layer 6
Layer 5
Layer 4
Layer 3
Layer 2
Layer 1
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Communications subnet boundary
• Level at which applications access network
services.
– Represents services that directly support
software applications for file transfers,
database access, and electronic mail etc.
Layer 7: Application Layer
• Related to representation of transmitted
data
– Translates different data representations from
the Application layer into uniform standard
format
• Providing services for secure efficient data
transmission
– e.g. data encryption, and data compression.
Layer 6: Presentation Layer
• Allows two applications on different computers to
establish, use, and end a session.
– e.g. file transfer, remote login
• Establishes dialog control
– Regulates which side transmits, plus when and how
long it transmits.
• Performs token management and synchronization.
Layer 5: Session Layer
• Manages transmission packets
– Repackages long messages when necessary
into small packets for transmission
– Reassembles packets in correct order to get
the original message.
• Handles error recognition and recovery.
– Transport layer at receiving acknowledges
packet delivery.
– Resends missing packets
Layer 4: Transport Layer
• Manages addressing/routing of data within the
subnet
– Addresses messages and translates logical
addresses and names into physical addresses.
– Determines the route from the source to the
destination computer
– Manages traffic problems, such as switching, routing,
and controlling the congestion of data packets.
• Routing can be:
– Based on static tables
– determined at start of each session
– Individually determined for each packet, reflecting the
current network load.
Layer 3: Network Layer
 Packages raw bits from the Physical layer
into frames (logical, structured packets for
data).
 Provides reliable transmission of frames
 It waits for an acknowledgment from the
receiving computer.
 Retransmits frames for which
acknowledgement not received
Layer 2: Data Link Layer
• Transmits bits from one computer to another
• Regulates the transmission of a stream of bits
over a physical medium.
• Defines how the cable is attached to the network
adapter and what transmission technique is used
to send data over the cable. Deals with issues
like
– The definition of 0 and 1, e.g. how many volts represents a
1, and how long a bit lasts?
– Whether the channel is simplex or duplex?
– How many pins a connector has, and what the function of
each pin is?
Layer 1: Physical Layer
• Explicit
Presentation and
session layers
missing in Internet
Protocols
• Data Link and
Network Layers
redesigned
Internet Protocols vs OSI
Application
Presentation
Session
Transport
Network
Data Link
Physical
Application
TCP
IP
Network Interface
Hardware
• In OSI model, each layer provide services to
layer above, and ‘consumes’ services provided
by layer below.
• Active elements in a layer called entities.
• Entities in same layer in different machines
called peer entities.
Services in the OSI Model
• Layer N provides service to layer N+1
Layering Principles
(N+1) Entity
Service User
(N) Entity
Service Provider
(N+1) Entity
Service User
(N) Entity
Service Provider
Layer N Service
Access Point (SAP)
Layer N protocol
N+1
PDU
Layer N+1 protocol
SDU
PDU - Protocol Data Unit
SDU - Service Data Unit
N
PDU
N
PDU
• Layers can offer connection-oriented or
connectionless services.
• Connection-oriented like telephone system.
• Connectionless like postal system.
• Each service has an associated Quality-of-
service (e.g. reliable or unreliable).
Connections
• Reliable services never lose/corrupt data.
• Reliable service costs more.
• Typical application for reliable service is file
transfer.
• Typical application not needing reliable service
is voice traffic.
• Not all applications need connections.
Reliability
• Service = set of primitives provided by one
layer to layer above.
• Service defines what layer can do (but not how
it does it).
• Protocol = set of rules governing data
communication between peer entities, i.e.
format and meaning of frames/packets.
• Service/protocol decoupling very important.
Topics

More Related Content

Similar to 46-cn.ppt

osi.ppt
osi.pptosi.ppt
osi.ppt
osi.pptosi.ppt
osi.ppt
YumnaShahzaad
 
osi.ppt
osi.pptosi.ppt
osi.ppt
osi.pptosi.ppt
osi.ppt
LarryYork6
 
Osi
OsiOsi
1_Operating System.ppt
1_Operating System.ppt1_Operating System.ppt
1_Operating System.ppt
SproohaAthalye
 
osi.ppt
osi.pptosi.ppt
Dc2 t1
Dc2 t1Dc2 t1
OSI Model.ppt
OSI Model.pptOSI Model.ppt
OSI Model.ppt
ShantanuBhushanMishr
 
ch5-osi.pdf
ch5-osi.pdfch5-osi.pdf
ch5-osi.pdf
ssuserc8e1481
 
open system interconnection referencemodel.ppt
open system interconnection referencemodel.pptopen system interconnection referencemodel.ppt
open system interconnection referencemodel.ppt
AnkitaAggarwal68
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
OSI Model
OSI ModelOSI Model
OSI Model
DINESH KAMBLE
 
Osi
OsiOsi
OSI Reerence Model
OSI Reerence ModelOSI Reerence Model
OSI Reerence Model
Heena Prajapati
 
Osi model
Osi modelOsi model
Osi model
Dhani Ahmad
 
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
PriyankaBhattacharya28
 
Open system interference reference model.pptx
Open system interference reference model.pptxOpen system interference reference model.pptx
Open system interference reference model.pptx
SwapnilGaikwad138578
 
OSI layer (Network)
OSI layer (Network)OSI layer (Network)
OSI layer (Network)
swethaRajendran1
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnection
KingPinYT
 

Similar to 46-cn.ppt (20)

osi.ppt
osi.pptosi.ppt
osi.ppt
 
osi.ppt
osi.pptosi.ppt
osi.ppt
 
osi.ppt
osi.pptosi.ppt
osi.ppt
 
osi.ppt
osi.pptosi.ppt
osi.ppt
 
Osi
OsiOsi
Osi
 
1_Operating System.ppt
1_Operating System.ppt1_Operating System.ppt
1_Operating System.ppt
 
osi.ppt
osi.pptosi.ppt
osi.ppt
 
Dc2 t1
Dc2 t1Dc2 t1
Dc2 t1
 
OSI Model.ppt
OSI Model.pptOSI Model.ppt
OSI Model.ppt
 
ch5-osi.pdf
ch5-osi.pdfch5-osi.pdf
ch5-osi.pdf
 
open system interconnection referencemodel.ppt
open system interconnection referencemodel.pptopen system interconnection referencemodel.ppt
open system interconnection referencemodel.ppt
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Osi
OsiOsi
Osi
 
OSI Reerence Model
OSI Reerence ModelOSI Reerence Model
OSI Reerence Model
 
Osi model
Osi modelOsi model
Osi model
 
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
 
Open system interference reference model.pptx
Open system interference reference model.pptxOpen system interference reference model.pptx
Open system interference reference model.pptx
 
OSI layer (Network)
OSI layer (Network)OSI layer (Network)
OSI layer (Network)
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnection
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 

46-cn.ppt

  • 2. • The OSI reference model • Services in the OSI model Topics
  • 3. • OSI Reference Model - internationally standardised network architecture. • OSI = Open Systems Interconnection: deals with open systems, i.e. systems open for communications with other systems. • Specified in ISO 7498. • Model has 7 layers. OSI Reference Model
  • 4. • Layers 1-4 relate to communications technology. • Layers 5-7 relate to user applications. 7-Layer OSI Model Layer 7 Layer 6 Layer 5 Layer 4 Layer 3 Layer 2 Layer 1 Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Communications subnet boundary
  • 5. • Level at which applications access network services. – Represents services that directly support software applications for file transfers, database access, and electronic mail etc. Layer 7: Application Layer
  • 6. • Related to representation of transmitted data – Translates different data representations from the Application layer into uniform standard format • Providing services for secure efficient data transmission – e.g. data encryption, and data compression. Layer 6: Presentation Layer
  • 7. • Allows two applications on different computers to establish, use, and end a session. – e.g. file transfer, remote login • Establishes dialog control – Regulates which side transmits, plus when and how long it transmits. • Performs token management and synchronization. Layer 5: Session Layer
  • 8. • Manages transmission packets – Repackages long messages when necessary into small packets for transmission – Reassembles packets in correct order to get the original message. • Handles error recognition and recovery. – Transport layer at receiving acknowledges packet delivery. – Resends missing packets Layer 4: Transport Layer
  • 9. • Manages addressing/routing of data within the subnet – Addresses messages and translates logical addresses and names into physical addresses. – Determines the route from the source to the destination computer – Manages traffic problems, such as switching, routing, and controlling the congestion of data packets. • Routing can be: – Based on static tables – determined at start of each session – Individually determined for each packet, reflecting the current network load. Layer 3: Network Layer
  • 10.  Packages raw bits from the Physical layer into frames (logical, structured packets for data).  Provides reliable transmission of frames  It waits for an acknowledgment from the receiving computer.  Retransmits frames for which acknowledgement not received Layer 2: Data Link Layer
  • 11. • Transmits bits from one computer to another • Regulates the transmission of a stream of bits over a physical medium. • Defines how the cable is attached to the network adapter and what transmission technique is used to send data over the cable. Deals with issues like – The definition of 0 and 1, e.g. how many volts represents a 1, and how long a bit lasts? – Whether the channel is simplex or duplex? – How many pins a connector has, and what the function of each pin is? Layer 1: Physical Layer
  • 12. • Explicit Presentation and session layers missing in Internet Protocols • Data Link and Network Layers redesigned Internet Protocols vs OSI Application Presentation Session Transport Network Data Link Physical Application TCP IP Network Interface Hardware
  • 13. • In OSI model, each layer provide services to layer above, and ‘consumes’ services provided by layer below. • Active elements in a layer called entities. • Entities in same layer in different machines called peer entities. Services in the OSI Model
  • 14. • Layer N provides service to layer N+1 Layering Principles (N+1) Entity Service User (N) Entity Service Provider (N+1) Entity Service User (N) Entity Service Provider Layer N Service Access Point (SAP) Layer N protocol N+1 PDU Layer N+1 protocol SDU PDU - Protocol Data Unit SDU - Service Data Unit N PDU N PDU
  • 15. • Layers can offer connection-oriented or connectionless services. • Connection-oriented like telephone system. • Connectionless like postal system. • Each service has an associated Quality-of- service (e.g. reliable or unreliable). Connections
  • 16. • Reliable services never lose/corrupt data. • Reliable service costs more. • Typical application for reliable service is file transfer. • Typical application not needing reliable service is voice traffic. • Not all applications need connections. Reliability
  • 17. • Service = set of primitives provided by one layer to layer above. • Service defines what layer can do (but not how it does it). • Protocol = set of rules governing data communication between peer entities, i.e. format and meaning of frames/packets. • Service/protocol decoupling very important. Topics