SlideShare a Scribd company logo
1 of 33
 The physical layout or the way in which
network connection are made is called a
topologies.
 Types:
◦ There are three types of topologies.
1. Bus topology
2. Star topology
3. Ring topology
 A topology that connects each computer to a
common communication medium.
 In a local network , this medium is a central
wires called a bus.
 If a computer wants to send data to other
computer in the network, it sends the data
and destination address via the bus.
 Each computer checks this address and if it
matches with this computer, the computer
keeps the data.
 Otherwise the data move to the next.
 In the star topology cable from each
computer is connected to a centralized device
called a hub or switch.
 If two computer want to share data, the
sender computer sends data to the hub and
hub sends it to the receiving computer.
 A hub provides a central connection point so
that all computers can communicate across
the network.
 A ring topology is a computer network
configuration where the devices are
connected to each other in a circular shape.
 Each packet is sent around the ring until it
reaches its final destination.
 Short for Binary coded decimal, BCD is also
known as packet decimal and is numbers 0
through 9 converted to four digit binary.
 Below is a list of the decimal numbers o to 9
and the binary conversion.
 Decimal Binary
 0 0000
 1 0001
 2 0010
 3 0011
 4 0100
 5 0101
 6 0110
 7 0111
 8 1000
 9 1001
 EBCDIC (Extended Binary Coded Decimal
Interchange Code ) is a binary code for
alphabetic and numeric characters that IBM
developed for its larger operating systems.
 ASCII stands for American standard code for
information interchange.
 Computer can only understand numbers, so
an ASCII code is the numerical representation
of a character such as ‘a’ or ‘@’ or an action
of some sort.
 ASCII Table below in image.
 Data communication software manages the
transmission of data between computer.
 They are special type software.
 These are programs that control
telecommunications activities and manage
the function of telecommunication network.
 A simplex transmission circuit permits data
follow in only one direction.
 A terminal connected to such a circuit is
either a send only or a receive only device.
 An example is a traditionally television
broadcast, in which the signal send from the
transmitter to your television antenna.
 There is no return signal.
sender receiver
 In half-duplex transmission, data travels in
both direction but only in one direction at a
time.
 Example of half duplex is wireless set
sender receiver
Half-duplex
 In full-duplex transmission data is
transmitted in both direction at the same
time .
 An example is two people on telephones
talking and listening simultaneously.
 In parallel transmission made each bit to be
send on separate channel.
 As show
sender receiver
0
1
0
1
 Here all bits of the characters are transmitted
simultaneously.
 It has transmitting speed but expensive
because large number of channels are
required.
 It is used for short distance communication.
 In serial transmission each bit is transmit on
single channel.
 It is show as:
 The character bit is transmitted one after
another on signal channel.
sender receiver
0110 1100
 In a mesh topology, each computer is
connected to every other computer by
separate cabling.
 There is no concept of a central switch, hub
or computer which acts as a central point of
communication to pass on the messages.
 Hybrid topology is a type of network topology
that uses two or more other network
topologies, including bus topology, mesh,
ring topology etc.
 A node is any devices connected to a
computer network.
 A node can be a computer or some other
device, such as a printer.
 Every node has a unique network address ,
sometimes called a data link control (DLC) or
(MAC) Media Access Control.
 The physical layer is simply responsible for
sending bits from one computer to another.
 The physical layer deals with bit-level
transmission between different devices
 The data link layer is responsible for the flow
of data over a single link from one device to
another.
 It accepts packets from the network layer and
packages the information into data units
called frames.
 The network layer is the third level of the OSI
model and the layer that provide data routing
paths for network communication.
 Data transferred in the form of packets via
logical network paths in an ordered format
controlled by the network layer
 The transport layer ensures that packets are
delivered error free, in sequence and with no
losses or duplications.
 The transport layer breaks large message
from the session layer into packets to be sent
to the destination computer.
 The session layer allows applications on
separate computers to share a connection
called a session.
 Establishes, manages, and terminators
communication between devices.
 This layer also controls the dialog between
two processes determining who can transmit
and who can receive at what point during the
communication.
 The presentation layer translates data
between the formats the network requires
and the formats the computer expects.
◦ Translation
◦ Encryption
◦ Compression
 The application layer is the topmost layer of
the OSI Model and it provides services that
directly support user applications, such as
database access, email, and file transfers.

More Related Content

Similar to Introduction to the Network Topologies.pptx

Unit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptx
Unit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptxUnit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptx
Unit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptxgurjardeep68
 
Introductory Concepts of Data Communication-Lecture-1.pptx
Introductory Concepts of Data Communication-Lecture-1.pptxIntroductory Concepts of Data Communication-Lecture-1.pptx
Introductory Concepts of Data Communication-Lecture-1.pptxvishal choudhary
 
Introductory concepts of data communication lecture-1
Introductory concepts of data communication lecture-1Introductory concepts of data communication lecture-1
Introductory concepts of data communication lecture-1vishal choudhary
 
seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI modelManjeet MN
 
Computer network and communication (107 kb)
Computer network and communication (107 kb)Computer network and communication (107 kb)
Computer network and communication (107 kb)IMRAN KHAN
 
Chapter 1 introduction haramaya
Chapter 1 introduction haramayaChapter 1 introduction haramaya
Chapter 1 introduction haramayaAbdii Rashid
 
1834902182 julkar naim_dcam
1834902182 julkar naim_dcam1834902182 julkar naim_dcam
1834902182 julkar naim_dcamJulkarNaim
 
Telecommunications and computer networks
Telecommunications and computer networksTelecommunications and computer networks
Telecommunications and computer networksichiswa
 
Class note.2.....nazmun nahar 1834902176
Class note.2.....nazmun nahar 1834902176Class note.2.....nazmun nahar 1834902176
Class note.2.....nazmun nahar 1834902176Nazmun Nahar
 
Data communication and networking
Data communication and networkingData communication and networking
Data communication and networkingDashbo
 
1834902097 class note 2 transmission modes in computer networks
1834902097 class note 2     transmission modes in computer networks1834902097 class note 2     transmission modes in computer networks
1834902097 class note 2 transmission modes in computer networksMehediHassan468099
 
Lesson 5 data communication and networking (136 kb)
Lesson 5   data communication and networking (136 kb)Lesson 5   data communication and networking (136 kb)
Lesson 5 data communication and networking (136 kb)IMRAN KHAN
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptxTadeseBeyene
 
Computer Network Unit-1 ppt
Computer Network Unit-1 pptComputer Network Unit-1 ppt
Computer Network Unit-1 pptvmdharxfr
 

Similar to Introduction to the Network Topologies.pptx (20)

Unit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptx
Unit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptxUnit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptx
Unit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptx
 
Introductory Concepts of Data Communication-Lecture-1.pptx
Introductory Concepts of Data Communication-Lecture-1.pptxIntroductory Concepts of Data Communication-Lecture-1.pptx
Introductory Concepts of Data Communication-Lecture-1.pptx
 
Introductory concepts of data communication lecture-1
Introductory concepts of data communication lecture-1Introductory concepts of data communication lecture-1
Introductory concepts of data communication lecture-1
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI model
 
Class notes 1
Class notes 1Class notes 1
Class notes 1
 
Computer network and communication (107 kb)
Computer network and communication (107 kb)Computer network and communication (107 kb)
Computer network and communication (107 kb)
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Chapter 1 introduction haramaya
Chapter 1 introduction haramayaChapter 1 introduction haramaya
Chapter 1 introduction haramaya
 
Network
NetworkNetwork
Network
 
1834902182 julkar naim_dcam
1834902182 julkar naim_dcam1834902182 julkar naim_dcam
1834902182 julkar naim_dcam
 
Telecommunications and computer networks
Telecommunications and computer networksTelecommunications and computer networks
Telecommunications and computer networks
 
Class note.2.....nazmun nahar 1834902176
Class note.2.....nazmun nahar 1834902176Class note.2.....nazmun nahar 1834902176
Class note.2.....nazmun nahar 1834902176
 
Data communication and networking
Data communication and networkingData communication and networking
Data communication and networking
 
1834902097 class note 2 transmission modes in computer networks
1834902097 class note 2     transmission modes in computer networks1834902097 class note 2     transmission modes in computer networks
1834902097 class note 2 transmission modes in computer networks
 
Lesson 5 data communication and networking (136 kb)
Lesson 5   data communication and networking (136 kb)Lesson 5   data communication and networking (136 kb)
Lesson 5 data communication and networking (136 kb)
 
Chapeter 2
Chapeter 2Chapeter 2
Chapeter 2
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
 
OSI MODELS.pptx
OSI  MODELS.pptxOSI  MODELS.pptx
OSI MODELS.pptx
 
Computer Network Unit-1 ppt
Computer Network Unit-1 pptComputer Network Unit-1 ppt
Computer Network Unit-1 ppt
 

Recently uploaded

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Introduction to the Network Topologies.pptx

  • 1.
  • 2.  The physical layout or the way in which network connection are made is called a topologies.  Types: ◦ There are three types of topologies. 1. Bus topology 2. Star topology 3. Ring topology
  • 3.  A topology that connects each computer to a common communication medium.  In a local network , this medium is a central wires called a bus.  If a computer wants to send data to other computer in the network, it sends the data and destination address via the bus.  Each computer checks this address and if it matches with this computer, the computer keeps the data.  Otherwise the data move to the next.
  • 4.
  • 5.  In the star topology cable from each computer is connected to a centralized device called a hub or switch.  If two computer want to share data, the sender computer sends data to the hub and hub sends it to the receiving computer.  A hub provides a central connection point so that all computers can communicate across the network.
  • 6.
  • 7.  A ring topology is a computer network configuration where the devices are connected to each other in a circular shape.  Each packet is sent around the ring until it reaches its final destination.
  • 8.
  • 9.  Short for Binary coded decimal, BCD is also known as packet decimal and is numbers 0 through 9 converted to four digit binary.  Below is a list of the decimal numbers o to 9 and the binary conversion.
  • 10.  Decimal Binary  0 0000  1 0001  2 0010  3 0011  4 0100  5 0101  6 0110  7 0111  8 1000  9 1001
  • 11.  EBCDIC (Extended Binary Coded Decimal Interchange Code ) is a binary code for alphabetic and numeric characters that IBM developed for its larger operating systems.
  • 12.  ASCII stands for American standard code for information interchange.  Computer can only understand numbers, so an ASCII code is the numerical representation of a character such as ‘a’ or ‘@’ or an action of some sort.  ASCII Table below in image.
  • 13.
  • 14.  Data communication software manages the transmission of data between computer.  They are special type software.  These are programs that control telecommunications activities and manage the function of telecommunication network.
  • 15.  A simplex transmission circuit permits data follow in only one direction.  A terminal connected to such a circuit is either a send only or a receive only device.  An example is a traditionally television broadcast, in which the signal send from the transmitter to your television antenna.  There is no return signal. sender receiver
  • 16.
  • 17.  In half-duplex transmission, data travels in both direction but only in one direction at a time.  Example of half duplex is wireless set sender receiver Half-duplex
  • 18.  In full-duplex transmission data is transmitted in both direction at the same time .  An example is two people on telephones talking and listening simultaneously.
  • 19.  In parallel transmission made each bit to be send on separate channel.  As show sender receiver 0 1 0 1
  • 20.  Here all bits of the characters are transmitted simultaneously.  It has transmitting speed but expensive because large number of channels are required.  It is used for short distance communication.
  • 21.  In serial transmission each bit is transmit on single channel.  It is show as:  The character bit is transmitted one after another on signal channel. sender receiver 0110 1100
  • 22.  In a mesh topology, each computer is connected to every other computer by separate cabling.  There is no concept of a central switch, hub or computer which acts as a central point of communication to pass on the messages.
  • 23.
  • 24.  Hybrid topology is a type of network topology that uses two or more other network topologies, including bus topology, mesh, ring topology etc.
  • 25.
  • 26.  A node is any devices connected to a computer network.  A node can be a computer or some other device, such as a printer.  Every node has a unique network address , sometimes called a data link control (DLC) or (MAC) Media Access Control.
  • 27.  The physical layer is simply responsible for sending bits from one computer to another.  The physical layer deals with bit-level transmission between different devices
  • 28.  The data link layer is responsible for the flow of data over a single link from one device to another.  It accepts packets from the network layer and packages the information into data units called frames.
  • 29.  The network layer is the third level of the OSI model and the layer that provide data routing paths for network communication.  Data transferred in the form of packets via logical network paths in an ordered format controlled by the network layer
  • 30.  The transport layer ensures that packets are delivered error free, in sequence and with no losses or duplications.  The transport layer breaks large message from the session layer into packets to be sent to the destination computer.
  • 31.  The session layer allows applications on separate computers to share a connection called a session.  Establishes, manages, and terminators communication between devices.  This layer also controls the dialog between two processes determining who can transmit and who can receive at what point during the communication.
  • 32.  The presentation layer translates data between the formats the network requires and the formats the computer expects. ◦ Translation ◦ Encryption ◦ Compression
  • 33.  The application layer is the topmost layer of the OSI Model and it provides services that directly support user applications, such as database access, email, and file transfers.