SlideShare a Scribd company logo
Chapter 6
OSI Reference Model
Data Communications
1By Chhay Buntha
We use the concept of layers in our daily life. As an
example, let us consider two friends who communicate
through postal mail. The process of sending a letter to a
friend would be complex if there were no services available
from the post office.
Established in 1947, the International Standards
Organization (ISO) is a multinational body dedicated to
worldwide agreement on international standards. An ISO
standard that covers all aspects of network communications
is the Open Systems Interconnection (OSI) model. It was
first introduced in the late 1970s.
Layered Tasks of the OSI Model
Chapter6
2By Chhay Buntha
Tasks involved in sending a letter.
Chapter6
3By Chhay Buntha
Chapter6
4By Chhay Buntha
ISO is the organization.
OSI is the model.
Note
Seven Layers of the OSI Model
Chapter6
5By Chhay Buntha
The interaction between layers
Chapter6
6By Chhay Buntha
An exchange using the OSI model
Chapter6
7By Chhay Buntha
Layer1: Physical Layer
Chapter6
8By Chhay Buntha
-Physical Characteristics of interfaces and medium
-Representation of bits: Stream of bits 0s and 1s
-Data Rate
-Synchronization of bits
-Line configuration: Connection
-Physical topology
-Transmission mode: Simplex,Half/Full duplex
Layer2: Data Link Layer
Chapter6
9By Chhay Buntha
-Framing: convert from up layer to frame
-Physical addressing: MAC (Media Access Control)
-Flow/Error/Access control: Make error free to upper
Layer3: Network Layer
Chapter6
10By Chhay Buntha
Responsible for the source to destination delivery of a packet.
-Routing
-Logical addressing: IP Address
Layer4: Transport Layer
Chapter6
11By Chhay Buntha
Responsible for process-to-process delivery of the entire
message:
-Flow/Error control
-Connection control: Connectionless and connection
oriented
Layer4: Transport Layer
Chapter6
12By Chhay Buntha
Layer5: Session Layer
Chapter6
13By Chhay Buntha
Responsible for established the connection between
communication systems
Layer6: Presentation Layer
Chapter6
14By Chhay Buntha
-Translate
-Encryption/Decryption
Layer7: Application Layer
Chapter6
15By Chhay Buntha
Summary of Layers
Chapter6
16By Chhay Buntha
Addressing
Chapter6
17By Chhay Buntha
Four levels of addresses are used in an internet employing
the TCP/IP protocols: physical, logical, port, and specific.
Physical Address: MAC Address
Chapter6
18By Chhay Buntha
Most local-area networks use a 48-bit (6-byte) physical
address written as 12 hexadecimal digits; every byte (2
hexadecimal digits) is separated by a colon, as shown
below:
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
Logical Address: IP Address
Chapter6
19By Chhay Buntha
An IPv4/IPv6 addresses is a 32/128-bit address that
uniquely and universally defines the connection of a device
(for example, a computer or a router) to the Internet. Figure
below is the sample of IPv4 address.
Port Address
Chapter6
20By Chhay Buntha
A port address is a 16-bit address represented by one
decimal number as shown.
753
A 16-bit port address represented
as one single number.
Special Address:
Chapter6
21By Chhay Buntha
What is a special address?
- www.google.com
- www.ppiu.edu.kh
- www.dap-news.com
- 127.0.0.0

More Related Content

Viewers also liked

一页纸经理人
一页纸经理人一页纸经理人
一页纸经理人
GameLook .com
 
La ética y la moral
La ética y la moralLa ética y la moral
La ética y la moral
okeliuladech
 
Characteristics Of Life
Characteristics Of LifeCharacteristics Of Life
Characteristics Of LifeScott Stevens
 
Night Vision System(SVS)
Night Vision System(SVS)Night Vision System(SVS)
Night Vision System(SVS)
Ratnesh Pal
 
VLAN ON PACKET TRACER
VLAN ON PACKET TRACERVLAN ON PACKET TRACER
VLAN ON PACKET TRACER
BIRLA VISHVAKARMA MAHAVIDYALAY
 
LUIS FERNANDO MARIN
LUIS FERNANDO MARINLUIS FERNANDO MARIN
LUIS FERNANDO MARIN
luismarin560
 
Introducción a SignalR
Introducción a SignalRIntroducción a SignalR
Introducción a SignalR
Mariano Sánchez
 
Malika Snail Resume
Malika Snail ResumeMalika Snail Resume
Malika Snail Resume
Malika Snail
 
Guapi. información del micrositio copia
Guapi. información del micrositio   copiaGuapi. información del micrositio   copia
Guapi. información del micrositio copia
marimba de chonta
 
Santa bárbara información del micrositio
Santa bárbara información del micrositioSanta bárbara información del micrositio
Santa bárbara información del micrositio
marimba de chonta
 
Webinar Presentation: Proactive vs Reactive Glass Delamination Testing in Pha...
Webinar Presentation: Proactive vs Reactive Glass Delamination Testing in Pha...Webinar Presentation: Proactive vs Reactive Glass Delamination Testing in Pha...
Webinar Presentation: Proactive vs Reactive Glass Delamination Testing in Pha...
BCNorris Consulting
 
InterScan Messaging Security 8.2
InterScan Messaging Security 8.2InterScan Messaging Security 8.2
InterScan Messaging Security 8.2khaled sayed
 

Viewers also liked (16)

一页纸经理人
一页纸经理人一页纸经理人
一页纸经理人
 
Texto Marcelo Lagos
Texto Marcelo LagosTexto Marcelo Lagos
Texto Marcelo Lagos
 
La ética y la moral
La ética y la moralLa ética y la moral
La ética y la moral
 
Characteristics Of Life
Characteristics Of LifeCharacteristics Of Life
Characteristics Of Life
 
Night Vision System(SVS)
Night Vision System(SVS)Night Vision System(SVS)
Night Vision System(SVS)
 
VLAN ON PACKET TRACER
VLAN ON PACKET TRACERVLAN ON PACKET TRACER
VLAN ON PACKET TRACER
 
L5
L5L5
L5
 
LUIS FERNANDO MARIN
LUIS FERNANDO MARINLUIS FERNANDO MARIN
LUIS FERNANDO MARIN
 
Introducción a SignalR
Introducción a SignalRIntroducción a SignalR
Introducción a SignalR
 
Malika Snail Resume
Malika Snail ResumeMalika Snail Resume
Malika Snail Resume
 
Reunión
ReuniónReunión
Reunión
 
Postgres tutorial
Postgres tutorial Postgres tutorial
Postgres tutorial
 
Guapi. información del micrositio copia
Guapi. información del micrositio   copiaGuapi. información del micrositio   copia
Guapi. información del micrositio copia
 
Santa bárbara información del micrositio
Santa bárbara información del micrositioSanta bárbara información del micrositio
Santa bárbara información del micrositio
 
Webinar Presentation: Proactive vs Reactive Glass Delamination Testing in Pha...
Webinar Presentation: Proactive vs Reactive Glass Delamination Testing in Pha...Webinar Presentation: Proactive vs Reactive Glass Delamination Testing in Pha...
Webinar Presentation: Proactive vs Reactive Glass Delamination Testing in Pha...
 
InterScan Messaging Security 8.2
InterScan Messaging Security 8.2InterScan Messaging Security 8.2
InterScan Messaging Security 8.2
 

Similar to Chapter6 osi

Topic 2.1 network communication using osi model part1
Topic 2.1 network communication using osi   model part1Topic 2.1 network communication using osi   model part1
Topic 2.1 network communication using osi model part1
Atika Zaimi
 
IP_Subnet training.pptx
IP_Subnet training.pptxIP_Subnet training.pptx
IP_Subnet training.pptx
karthikvcyber
 
TCPIP and OSI ModalOSI Reference Model-The seven layers .docx
TCPIP and OSI ModalOSI Reference Model-The seven layers .docxTCPIP and OSI ModalOSI Reference Model-The seven layers .docx
TCPIP and OSI ModalOSI Reference Model-The seven layers .docx
mattinsonjanel
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 
DCN-chapter1.pdf
DCN-chapter1.pdfDCN-chapter1.pdf
DCN-chapter1.pdf
MakuBandar
 
Lecture5-6-7.pdf
Lecture5-6-7.pdfLecture5-6-7.pdf
Lecture5-6-7.pdf
Rachel70983
 
Chapter-2.pdf
Chapter-2.pdfChapter-2.pdf
Chapter-2.pdf
MrMuneeb2
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP Layer
Netwax Lab
 
Networking models tcp
Networking models tcpNetworking models tcp
Networking models tcp
Bhaskar Karimuri
 
1b network models
1b network models1b network models
1b network modelskavish dani
 
Unit 1 network models & typical examples(part a)
Unit 1 network models & typical examples(part a)Unit 1 network models & typical examples(part a)
Unit 1 network models & typical examples(part a)
Vishal kakade
 
1. Answer the following questions about OSI modela.At which layer.pdf
1. Answer the following questions about OSI modela.At which layer.pdf1. Answer the following questions about OSI modela.At which layer.pdf
1. Answer the following questions about OSI modela.At which layer.pdf
lohithkart
 
Class 3
Class 3Class 3
Class 3
AsmaulCSE
 
UNIT 3 - EXPLAINING THE NEED OF COMPUTER NETWORK
UNIT 3 - EXPLAINING THE NEED OF COMPUTER NETWORKUNIT 3 - EXPLAINING THE NEED OF COMPUTER NETWORK
UNIT 3 - EXPLAINING THE NEED OF COMPUTER NETWORK
LeahRachael
 
Network Reference Model (Computer Networks) - Cybernetics Robo Academy
Network Reference Model  (Computer Networks) - Cybernetics Robo AcademyNetwork Reference Model  (Computer Networks) - Cybernetics Robo Academy
Network Reference Model (Computer Networks) - Cybernetics Robo Academy
TutulAhmed3
 
osi and tcpip.ppt
osi and tcpip.pptosi and tcpip.ppt
osi and tcpip.ppt
KowsalyaJayakumar2
 
Osi and tcpip
Osi and tcpipOsi and tcpip
Osi and tcpip
chetnaindaurkar
 
Lecture 05 OSI Model and IP Protocol Suite.ppt
Lecture 05 OSI Model and IP Protocol Suite.pptLecture 05 OSI Model and IP Protocol Suite.ppt
Lecture 05 OSI Model and IP Protocol Suite.ppt
HanzlaNaveed1
 
CSC1202_3_The_OSI_Reference_Model_-_V2.pptx
CSC1202_3_The_OSI_Reference_Model_-_V2.pptxCSC1202_3_The_OSI_Reference_Model_-_V2.pptx
CSC1202_3_The_OSI_Reference_Model_-_V2.pptx
Muhammad Sohail
 

Similar to Chapter6 osi (20)

Topic 2.1 network communication using osi model part1
Topic 2.1 network communication using osi   model part1Topic 2.1 network communication using osi   model part1
Topic 2.1 network communication using osi model part1
 
IP_Subnet training.pptx
IP_Subnet training.pptxIP_Subnet training.pptx
IP_Subnet training.pptx
 
TCPIP and OSI ModalOSI Reference Model-The seven layers .docx
TCPIP and OSI ModalOSI Reference Model-The seven layers .docxTCPIP and OSI ModalOSI Reference Model-The seven layers .docx
TCPIP and OSI ModalOSI Reference Model-The seven layers .docx
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
DCN-chapter1.pdf
DCN-chapter1.pdfDCN-chapter1.pdf
DCN-chapter1.pdf
 
Lecture5-6-7.pdf
Lecture5-6-7.pdfLecture5-6-7.pdf
Lecture5-6-7.pdf
 
Chapter-2.pdf
Chapter-2.pdfChapter-2.pdf
Chapter-2.pdf
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP Layer
 
Networking models tcp
Networking models tcpNetworking models tcp
Networking models tcp
 
1b network models
1b network models1b network models
1b network models
 
Unit 1 network models & typical examples(part a)
Unit 1 network models & typical examples(part a)Unit 1 network models & typical examples(part a)
Unit 1 network models & typical examples(part a)
 
1. Answer the following questions about OSI modela.At which layer.pdf
1. Answer the following questions about OSI modela.At which layer.pdf1. Answer the following questions about OSI modela.At which layer.pdf
1. Answer the following questions about OSI modela.At which layer.pdf
 
Class 3
Class 3Class 3
Class 3
 
UNIT 3 - EXPLAINING THE NEED OF COMPUTER NETWORK
UNIT 3 - EXPLAINING THE NEED OF COMPUTER NETWORKUNIT 3 - EXPLAINING THE NEED OF COMPUTER NETWORK
UNIT 3 - EXPLAINING THE NEED OF COMPUTER NETWORK
 
Network Reference Model (Computer Networks) - Cybernetics Robo Academy
Network Reference Model  (Computer Networks) - Cybernetics Robo AcademyNetwork Reference Model  (Computer Networks) - Cybernetics Robo Academy
Network Reference Model (Computer Networks) - Cybernetics Robo Academy
 
introduction about TCP/IP
introduction about TCP/IPintroduction about TCP/IP
introduction about TCP/IP
 
osi and tcpip.ppt
osi and tcpip.pptosi and tcpip.ppt
osi and tcpip.ppt
 
Osi and tcpip
Osi and tcpipOsi and tcpip
Osi and tcpip
 
Lecture 05 OSI Model and IP Protocol Suite.ppt
Lecture 05 OSI Model and IP Protocol Suite.pptLecture 05 OSI Model and IP Protocol Suite.ppt
Lecture 05 OSI Model and IP Protocol Suite.ppt
 
CSC1202_3_The_OSI_Reference_Model_-_V2.pptx
CSC1202_3_The_OSI_Reference_Model_-_V2.pptxCSC1202_3_The_OSI_Reference_Model_-_V2.pptx
CSC1202_3_The_OSI_Reference_Model_-_V2.pptx
 

More from Buntha Chhay

Chapter 01 Introduction to Network Components.pptx
Chapter 01 Introduction to Network Components.pptxChapter 01 Introduction to Network Components.pptx
Chapter 01 Introduction to Network Components.pptx
Buntha Chhay
 
Chapter 5-Network Address Translation.pdf
Chapter 5-Network Address Translation.pdfChapter 5-Network Address Translation.pdf
Chapter 5-Network Address Translation.pdf
Buntha Chhay
 
Chapter 3-Network Switching.pdf
Chapter 3-Network Switching.pdfChapter 3-Network Switching.pdf
Chapter 3-Network Switching.pdf
Buntha Chhay
 
Chapter 2-IP Routing.pdf
Chapter 2-IP Routing.pdfChapter 2-IP Routing.pdf
Chapter 2-IP Routing.pdf
Buntha Chhay
 
Chapter 1-IPv6 Structure_Basic.pdf
Chapter 1-IPv6 Structure_Basic.pdfChapter 1-IPv6 Structure_Basic.pdf
Chapter 1-IPv6 Structure_Basic.pdf
Buntha Chhay
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkBuntha Chhay
 

More from Buntha Chhay (8)

Chapter 01 Introduction to Network Components.pptx
Chapter 01 Introduction to Network Components.pptxChapter 01 Introduction to Network Components.pptx
Chapter 01 Introduction to Network Components.pptx
 
Chapter 5-Network Address Translation.pdf
Chapter 5-Network Address Translation.pdfChapter 5-Network Address Translation.pdf
Chapter 5-Network Address Translation.pdf
 
Chapter 3-Network Switching.pdf
Chapter 3-Network Switching.pdfChapter 3-Network Switching.pdf
Chapter 3-Network Switching.pdf
 
Chapter 2-IP Routing.pdf
Chapter 2-IP Routing.pdfChapter 2-IP Routing.pdf
Chapter 2-IP Routing.pdf
 
Chapter 1-IPv6 Structure_Basic.pdf
Chapter 1-IPv6 Structure_Basic.pdfChapter 1-IPv6 Structure_Basic.pdf
Chapter 1-IPv6 Structure_Basic.pdf
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Networking
NetworkingNetworking
Networking
 
Linux seminar
Linux seminarLinux seminar
Linux seminar
 

Recently uploaded

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Chapter6 osi

  • 1. Chapter 6 OSI Reference Model Data Communications 1By Chhay Buntha
  • 2. We use the concept of layers in our daily life. As an example, let us consider two friends who communicate through postal mail. The process of sending a letter to a friend would be complex if there were no services available from the post office. Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. An ISO standard that covers all aspects of network communications is the Open Systems Interconnection (OSI) model. It was first introduced in the late 1970s. Layered Tasks of the OSI Model Chapter6 2By Chhay Buntha
  • 3. Tasks involved in sending a letter. Chapter6 3By Chhay Buntha
  • 4. Chapter6 4By Chhay Buntha ISO is the organization. OSI is the model. Note
  • 5. Seven Layers of the OSI Model Chapter6 5By Chhay Buntha
  • 6. The interaction between layers Chapter6 6By Chhay Buntha
  • 7. An exchange using the OSI model Chapter6 7By Chhay Buntha
  • 8. Layer1: Physical Layer Chapter6 8By Chhay Buntha -Physical Characteristics of interfaces and medium -Representation of bits: Stream of bits 0s and 1s -Data Rate -Synchronization of bits -Line configuration: Connection -Physical topology -Transmission mode: Simplex,Half/Full duplex
  • 9. Layer2: Data Link Layer Chapter6 9By Chhay Buntha -Framing: convert from up layer to frame -Physical addressing: MAC (Media Access Control) -Flow/Error/Access control: Make error free to upper
  • 10. Layer3: Network Layer Chapter6 10By Chhay Buntha Responsible for the source to destination delivery of a packet. -Routing -Logical addressing: IP Address
  • 11. Layer4: Transport Layer Chapter6 11By Chhay Buntha Responsible for process-to-process delivery of the entire message: -Flow/Error control -Connection control: Connectionless and connection oriented
  • 13. Layer5: Session Layer Chapter6 13By Chhay Buntha Responsible for established the connection between communication systems
  • 14. Layer6: Presentation Layer Chapter6 14By Chhay Buntha -Translate -Encryption/Decryption
  • 17. Addressing Chapter6 17By Chhay Buntha Four levels of addresses are used in an internet employing the TCP/IP protocols: physical, logical, port, and specific.
  • 18. Physical Address: MAC Address Chapter6 18By Chhay Buntha Most local-area networks use a 48-bit (6-byte) physical address written as 12 hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as shown below: 07:01:02:01:2C:4B A 6-byte (12 hexadecimal digits) physical address.
  • 19. Logical Address: IP Address Chapter6 19By Chhay Buntha An IPv4/IPv6 addresses is a 32/128-bit address that uniquely and universally defines the connection of a device (for example, a computer or a router) to the Internet. Figure below is the sample of IPv4 address.
  • 20. Port Address Chapter6 20By Chhay Buntha A port address is a 16-bit address represented by one decimal number as shown. 753 A 16-bit port address represented as one single number.
  • 21. Special Address: Chapter6 21By Chhay Buntha What is a special address? - www.google.com - www.ppiu.edu.kh - www.dap-news.com - 127.0.0.0