SlideShare a Scribd company logo
Elective 2 – Windows Server Management By: Aaron Angeles
OSI Layers Network Terms Subnets Topics
Multimedia – OSI Layers media276_1_A_OSI.htm OSI
Begins by 1978 to define a unifying standard for the architecture of networking systems International Telegraph and Telephone Consultative Committee and International Organization for Standardization (ISO) Officially rolled out by ISO as Open Systems Interconnection model  by 1984. OSI Layers
OSI Layers 7 Layers: 7 - Application 6 - Presentation 5 - Session 4 - Transport 3 - Network 2 - Data-Link 1 - Physical “All PeopleSeem To Need Data Processing”
Each layer defines networking tasks Each layer communicates with the layers above and below it Layer 7 provides services for programs to gain access to the network Layers 1 & 2 define the network’s physical media and related tasks OSI
Application Layer ( Layer 7) Provides an entrance point for programs (e.g. web browsers, e-mail system) to gain network services Represent application programming interfaces (APIs) that developers can use to perform network functions when building applications OSI
Presentation (Layer 6) Translates data between computing systems on a network Performs:  – data encryption – data compression – data conversion OSI
Session (Layer 5) Enables two application to create a persisten communication connections. Ensures that both sender and receiver are ready to communicate OSI
Transport (Layer 4) Ensures packets are delivered in order in which they are sent without loss or duplication. On the sending side, this layer is responsible for braking down larger messages into smaller packets for transmission On the receiving end, this layer is responsible for reassembling the packets into a single message to pass up to the upper layer OSI
Network (Layer 3) Determines the physical path of the data to be transmitted based on the network conditions, priority of server and other factors. The only layer that uses logical networking and can move packets between different networks. OSI
Data-link (Layer 2) Provides error free transfer of data frames from one computer to another over the physical layer. The Media Access Control (MAC) address of the network card exists at this layer that is added to the packet to create a frame. OSI
Physical Layer (Layer 1) Establishes the physical interface and mechanisms for placing a raw stream of data bits on the network cabling. OSI
TCP/IP in Relation with OSI OSI

More Related Content

What's hot

Lecture 03
Lecture 03Lecture 03
Lecture 03
Anwal Mirza
 
Introduction to Networking and OSI Model
Introduction to Networking and OSI ModelIntroduction to Networking and OSI Model
Introduction to Networking and OSI Model
KawtharAlsharah
 
Introduction to the osi 7 layer model
Introduction to the osi 7 layer modelIntroduction to the osi 7 layer model
Introduction to the osi 7 layer modelnvjphillips
 
Osi model
Osi modelOsi model
Osi model
Kishan Patel
 
OSI Reference Model
OSI Reference ModelOSI Reference Model
Osi reference model in Networking
Osi reference model in NetworkingOsi reference model in Networking
Osi reference model in Networking
Satya P. Joshi
 
Full presentation of The OSI model
Full presentation of The OSI model Full presentation of The OSI model
Full presentation of The OSI model
FizzaShehwar
 
OSI Model - Every Detail Explained
OSI Model - Every Detail ExplainedOSI Model - Every Detail Explained
OSI Model - Every Detail ExplainedAshish Malik
 
OSI Model
OSI ModelOSI Model
OSI Model
Simran Kaur
 
OSI Model - Open Systems Interconnection
OSI Model - Open Systems InterconnectionOSI Model - Open Systems Interconnection
OSI Model - Open Systems Interconnection
Adeel Rasheed
 
Osi model(open system interconnection)
Osi model(open system interconnection)Osi model(open system interconnection)
Osi model(open system interconnection)Dipu Thomas joy
 
OSI Model
OSI ModelOSI Model
OSI Model
DINESH KAMBLE
 
OSI Model | Computer Science
OSI Model | Computer ScienceOSI Model | Computer Science
OSI Model | Computer Science
Transweb Global Inc
 
OSI LAYERS
OSI LAYERSOSI LAYERS
OSI LAYERS
Akhil Jose
 
Lesson 7
Lesson 7Lesson 7
Lesson 7
Gicheru Onesmus
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
OSI MODELOSI MODEL

What's hot (20)

Lecture 03
Lecture 03Lecture 03
Lecture 03
 
Introduction to Networking and OSI Model
Introduction to Networking and OSI ModelIntroduction to Networking and OSI Model
Introduction to Networking and OSI Model
 
Introduction to the osi 7 layer model
Introduction to the osi 7 layer modelIntroduction to the osi 7 layer model
Introduction to the osi 7 layer model
 
Osi model
Osi modelOsi model
Osi model
 
OSI Reference Model
OSI Reference ModelOSI Reference Model
OSI Reference Model
 
Osi reference model in Networking
Osi reference model in NetworkingOsi reference model in Networking
Osi reference model in Networking
 
Full presentation of The OSI model
Full presentation of The OSI model Full presentation of The OSI model
Full presentation of The OSI model
 
OSI Model - Every Detail Explained
OSI Model - Every Detail ExplainedOSI Model - Every Detail Explained
OSI Model - Every Detail Explained
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Network session 1 OSI Model
Network session 1 OSI ModelNetwork session 1 OSI Model
Network session 1 OSI Model
 
OSI Model - Open Systems Interconnection
OSI Model - Open Systems InterconnectionOSI Model - Open Systems Interconnection
OSI Model - Open Systems Interconnection
 
Osi model(open system interconnection)
Osi model(open system interconnection)Osi model(open system interconnection)
Osi model(open system interconnection)
 
OSI Model
OSI ModelOSI Model
OSI Model
 
OSI Model | Computer Science
OSI Model | Computer ScienceOSI Model | Computer Science
OSI Model | Computer Science
 
OSI LAYERS
OSI LAYERSOSI LAYERS
OSI LAYERS
 
Osi model
Osi modelOsi model
Osi model
 
Lesson 7
Lesson 7Lesson 7
Lesson 7
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
OSI model
OSI modelOSI model
OSI model
 

Viewers also liked

Presentacion motivafit startup live alicante
Presentacion motivafit startup live alicantePresentacion motivafit startup live alicante
Presentacion motivafit startup live alicanteNadia Calatayud
 
iPad MS Validation 3
iPad MS Validation 3iPad MS Validation 3
iPad MS Validation 3
Kristen Scott
 
Automating the Use of Web APIs through Lightweight Semantics
Automating the Use of Web APIs through Lightweight SemanticsAutomating the Use of Web APIs through Lightweight Semantics
Automating the Use of Web APIs through Lightweight Semantics
mmaleshkova
 
Using technology to maintain course quality- delivery a city course in the co...
Using technology to maintain course quality- delivery a city course in the co...Using technology to maintain course quality- delivery a city course in the co...
Using technology to maintain course quality- delivery a city course in the co...HMVT Teaching and Learning Space
 
Gestiona el riesgo de las grandes amenazas
Gestiona el riesgo de las grandes amenazasGestiona el riesgo de las grandes amenazas
Gestiona el riesgo de las grandes amenazas
Nextel S.A.
 
Business Excellence in the CIS
Business Excellence in the CISBusiness Excellence in the CIS
Business Excellence in the CIS
Morten Munk
 
達人出版会からPHPの本を出版しよう
達人出版会からPHPの本を出版しよう達人出版会からPHPの本を出版しよう
達人出版会からPHPの本を出版しよう
kenjis
 
Leading Change and Coaching
Leading Change and CoachingLeading Change and Coaching
Leading Change and Coaching
Naveen Nanjundappa
 
Attack Toolkit Webinar on Tobacco Industry Marketing
Attack Toolkit Webinar on Tobacco Industry MarketingAttack Toolkit Webinar on Tobacco Industry Marketing
Attack Toolkit Webinar on Tobacco Industry Marketing
Alex T.
 
Sales Transformation Kevin Purcell 2011 Sales 2.0 Conference Boston
Sales Transformation Kevin Purcell 2011 Sales 2.0 Conference BostonSales Transformation Kevin Purcell 2011 Sales 2.0 Conference Boston
Sales Transformation Kevin Purcell 2011 Sales 2.0 Conference Boston
Kevin Purcell
 
Vesten forstår ikke rusland
Vesten forstår ikke ruslandVesten forstår ikke rusland
Vesten forstår ikke ruslandMorten Munk
 
EdComs Classroom Everywhere - Michaela Kirsop-Holdford
 EdComs Classroom Everywhere - Michaela Kirsop-Holdford EdComs Classroom Everywhere - Michaela Kirsop-Holdford
EdComs Classroom Everywhere - Michaela Kirsop-HoldfordEdComs
 
Virtualización de los puestos de trabajo: Ventajas de migrar los PCs a la nube
Virtualización de los puestos de trabajo: Ventajas de migrar los PCs a la nubeVirtualización de los puestos de trabajo: Ventajas de migrar los PCs a la nube
Virtualización de los puestos de trabajo: Ventajas de migrar los PCs a la nube
Nextel S.A.
 

Viewers also liked (17)

ELEC - Lecture 2
ELEC - Lecture 2ELEC - Lecture 2
ELEC - Lecture 2
 
CCNA part 3 subnetting
CCNA part 3 subnettingCCNA part 3 subnetting
CCNA part 3 subnetting
 
Presentacion motivafit startup live alicante
Presentacion motivafit startup live alicantePresentacion motivafit startup live alicante
Presentacion motivafit startup live alicante
 
iPad MS Validation 3
iPad MS Validation 3iPad MS Validation 3
iPad MS Validation 3
 
Automating the Use of Web APIs through Lightweight Semantics
Automating the Use of Web APIs through Lightweight SemanticsAutomating the Use of Web APIs through Lightweight Semantics
Automating the Use of Web APIs through Lightweight Semantics
 
Using technology to maintain course quality- delivery a city course in the co...
Using technology to maintain course quality- delivery a city course in the co...Using technology to maintain course quality- delivery a city course in the co...
Using technology to maintain course quality- delivery a city course in the co...
 
Gestiona el riesgo de las grandes amenazas
Gestiona el riesgo de las grandes amenazasGestiona el riesgo de las grandes amenazas
Gestiona el riesgo de las grandes amenazas
 
Business Excellence in the CIS
Business Excellence in the CISBusiness Excellence in the CIS
Business Excellence in the CIS
 
達人出版会からPHPの本を出版しよう
達人出版会からPHPの本を出版しよう達人出版会からPHPの本を出版しよう
達人出版会からPHPの本を出版しよう
 
Creativity
CreativityCreativity
Creativity
 
Leading Change and Coaching
Leading Change and CoachingLeading Change and Coaching
Leading Change and Coaching
 
Attack Toolkit Webinar on Tobacco Industry Marketing
Attack Toolkit Webinar on Tobacco Industry MarketingAttack Toolkit Webinar on Tobacco Industry Marketing
Attack Toolkit Webinar on Tobacco Industry Marketing
 
Sales Transformation Kevin Purcell 2011 Sales 2.0 Conference Boston
Sales Transformation Kevin Purcell 2011 Sales 2.0 Conference BostonSales Transformation Kevin Purcell 2011 Sales 2.0 Conference Boston
Sales Transformation Kevin Purcell 2011 Sales 2.0 Conference Boston
 
Vesten forstår ikke rusland
Vesten forstår ikke ruslandVesten forstår ikke rusland
Vesten forstår ikke rusland
 
EdComs Classroom Everywhere - Michaela Kirsop-Holdford
 EdComs Classroom Everywhere - Michaela Kirsop-Holdford EdComs Classroom Everywhere - Michaela Kirsop-Holdford
EdComs Classroom Everywhere - Michaela Kirsop-Holdford
 
Virtualización de los puestos de trabajo: Ventajas de migrar los PCs a la nube
Virtualización de los puestos de trabajo: Ventajas de migrar los PCs a la nubeVirtualización de los puestos de trabajo: Ventajas de migrar los PCs a la nube
Virtualización de los puestos de trabajo: Ventajas de migrar los PCs a la nube
 
Empathize and define
Empathize and defineEmpathize and define
Empathize and define
 

Similar to ELEC2 - Lecture 1

Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
TadeseBeyene
 
OSI model
OSI modelOSI model
OSI modelDMMemon
 
Osi model
Osi modelOsi model
Osi model
yjartes
 
Dod & osi model
Dod & osi modelDod & osi model
Dod & osi model
KABIR HUSSAIN
 
Complete Osi Model Explained
Complete Osi Model ExplainedComplete Osi Model Explained
Complete Osi Model Explained
Vivek chan
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi ModelBELKA08
 
Osi model
Osi modelOsi model
Osi model
prakash N
 
Network Fundamentals: OSI Model
Network Fundamentals: OSI Model Network Fundamentals: OSI Model
Network Fundamentals: OSI Model
Diwash Sapkota
 
OSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptxOSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptx
vishal choudhary
 
Osi model
Osi modelOsi model
Osi model
GLIM Digital
 
Osi model or open system interconnection by MHM
Osi model or open system interconnection by MHMOsi model or open system interconnection by MHM
Osi model or open system interconnection by MHM
Md Mosharof Hosen
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
NajmulIslam38
 
Osi model
Osi modelOsi model
Osi modelufaq kk
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi model
Naiyan Noor
 
OVERVIEW ON THE SEVEN LAYERs OF COMPUTER NETWORK
OVERVIEW ON THE SEVEN LAYERs OF COMPUTER NETWORKOVERVIEW ON THE SEVEN LAYERs OF COMPUTER NETWORK
OVERVIEW ON THE SEVEN LAYERs OF COMPUTER NETWORK
waqasahmad1995
 

Similar to ELEC2 - Lecture 1 (20)

ELEC2 - Lecture 1
ELEC2 - Lecture 1ELEC2 - Lecture 1
ELEC2 - Lecture 1
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
 
OSI model
OSI modelOSI model
OSI model
 
Osi model
Osi modelOsi model
Osi model
 
Osi model
Osi modelOsi model
Osi model
 
Dod & osi model
Dod & osi modelDod & osi model
Dod & osi model
 
Complete Osi Model Explained
Complete Osi Model ExplainedComplete Osi Model Explained
Complete Osi Model Explained
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
 
OSI models
OSI modelsOSI models
OSI models
 
Osi model
Osi modelOsi model
Osi model
 
Network Fundamentals: OSI Model
Network Fundamentals: OSI Model Network Fundamentals: OSI Model
Network Fundamentals: OSI Model
 
OSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptxOSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptx
 
Osi model
Osi modelOsi model
Osi model
 
Osi model or open system interconnection by MHM
Osi model or open system interconnection by MHMOsi model or open system interconnection by MHM
Osi model or open system interconnection by MHM
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
 
Osi model
Osi modelOsi model
Osi model
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi model
 
Osi model 1
Osi model 1Osi model 1
Osi model 1
 
OVERVIEW ON THE SEVEN LAYERs OF COMPUTER NETWORK
OVERVIEW ON THE SEVEN LAYERs OF COMPUTER NETWORKOVERVIEW ON THE SEVEN LAYERs OF COMPUTER NETWORK
OVERVIEW ON THE SEVEN LAYERs OF COMPUTER NETWORK
 
Lecture2
Lecture2Lecture2
Lecture2
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

ELEC2 - Lecture 1

  • 1. Elective 2 – Windows Server Management By: Aaron Angeles
  • 2. OSI Layers Network Terms Subnets Topics
  • 3. Multimedia – OSI Layers media276_1_A_OSI.htm OSI
  • 4. Begins by 1978 to define a unifying standard for the architecture of networking systems International Telegraph and Telephone Consultative Committee and International Organization for Standardization (ISO) Officially rolled out by ISO as Open Systems Interconnection model by 1984. OSI Layers
  • 5. OSI Layers 7 Layers: 7 - Application 6 - Presentation 5 - Session 4 - Transport 3 - Network 2 - Data-Link 1 - Physical “All PeopleSeem To Need Data Processing”
  • 6. Each layer defines networking tasks Each layer communicates with the layers above and below it Layer 7 provides services for programs to gain access to the network Layers 1 & 2 define the network’s physical media and related tasks OSI
  • 7. Application Layer ( Layer 7) Provides an entrance point for programs (e.g. web browsers, e-mail system) to gain network services Represent application programming interfaces (APIs) that developers can use to perform network functions when building applications OSI
  • 8. Presentation (Layer 6) Translates data between computing systems on a network Performs: – data encryption – data compression – data conversion OSI
  • 9. Session (Layer 5) Enables two application to create a persisten communication connections. Ensures that both sender and receiver are ready to communicate OSI
  • 10. Transport (Layer 4) Ensures packets are delivered in order in which they are sent without loss or duplication. On the sending side, this layer is responsible for braking down larger messages into smaller packets for transmission On the receiving end, this layer is responsible for reassembling the packets into a single message to pass up to the upper layer OSI
  • 11. Network (Layer 3) Determines the physical path of the data to be transmitted based on the network conditions, priority of server and other factors. The only layer that uses logical networking and can move packets between different networks. OSI
  • 12. Data-link (Layer 2) Provides error free transfer of data frames from one computer to another over the physical layer. The Media Access Control (MAC) address of the network card exists at this layer that is added to the packet to create a frame. OSI
  • 13. Physical Layer (Layer 1) Establishes the physical interface and mechanisms for placing a raw stream of data bits on the network cabling. OSI
  • 14. TCP/IP in Relation with OSI OSI