SlideShare a Scribd company logo
NAME- SOUMA MAITI
ROLL N0- 27500120016
REG NO.- 202750100110016
DEPARTMENT- COMPUTER SCIENCE
YEAR- 3RD YEAR(6TH SEMESTER)
SUBJECT NAME-COMPUTER NETWORKS
SUBJECT CODE- PCC-CS602
INTRODUCTION
• WHAT IS THE OSI MODEL?
• THE OPEN SYSTEMS INTERCONNECTION (OSI) MODEL
DESCRIBES SEVEN LAYERS THAT COMPUTER SYSTEMS USE TO
COMMUNICATE OVER A NETWORK. IT WAS THE FIRST
STANDARD MODEL FOR NETWORK COMMUNICATIONS,
ADOPTED BY ALL MAJOR COMPUTER AND
TELECOMMUNICATION COMPANIES IN THE EARLY 1980S
• THE MODERN INTERNET IS NOT BASED ON OSI, BUT ON THE
SIMPLER TCP/IP MODEL. HOWEVER, THE OSI 7-LAYER MODEL IS
STILL WIDELY USED, AS IT HELPS VISUALIZE AND
COMMUNICATE HOW NETWORKS OPERATE, AND HELPS
ISOLATE AND TROUBLESHOOT NETWORKING PROBLEMS.
• OSI WAS INTRODUCED IN 1983 BY REPRESENTATIVES OF THE
MAJOR COMPUTER AND TELECOM COMPANIES, AND WAS
ADOPTED BY ISO AS AN INTERNATIONAL STANDARD IN 1984.
7 LAYERS OF OSI MODEL
7. APPLICATION LAYER:
THE APPLICATION LAYER IS USED BY END-USER SOFTWARE SUCH AS WEB BROWSERS
AND EMAIL CLIENTS. IT PROVIDES PROTOCOLS THAT ALLOW SOFTWARE TO SEND AND
RECEIVE INFORMATION AND PRESENT MEANINGFUL DATA TO USERS. A FEW EXAMPLES
OF APPLICATION LAYER PROTOCOLS ARE THE HYPERTEXT TRANSFER PROTOCOL
(HTTP), FILE TRANSFER PROTOCOL (FTP), POST OFFICE PROTOCOL (POP), SIMPLE MAIL
TRANSFER PROTOCOL (SMTP), AND DOMAIN NAME SYSTEM (DNS).
6. PRESENTATION LAYER:
THE PRESENTATION LAYER PREPARES DATA FOR THE APPLICATION LAYER. IT DEFINES
HOW TWO DEVICES SHOULD ENCODE, ENCRYPT, AND COMPRESS DATA SO IT IS
RECEIVED CORRECTLY ON THE OTHER END. THE PRESENTATION LAYER TAKES ANY
DATA TRANSMITTED BY THE APPLICATION LAYER AND PREPARES IT FOR
TRANSMISSION OVER THE SESSION LAYER.
5. SESSION LAYER:
THE SESSION LAYER CREATES COMMUNICATION CHANNELS, CALLED SESSIONS,
BETWEEN DEVICES. IT IS RESPONSIBLE FOR OPENING SESSIONS, ENSURING THEY
REMAIN OPEN AND FUNCTIONAL WHILE DATA IS BEING TRANSFERRED, AND CLOSING
THEM WHEN COMMUNICATION ENDS. THE SESSION LAYER CAN ALSO SET
CHECKPOINTS DURING A DATA TRANSFER—IF THE SESSION IS INTERRUPTED, DEVICES
CAN RESUME DATA TRANSFER FROM THE LAST CHECKPOINT.
• 4. TRANSPORT LAYER:
• THE TRANSPORT LAYER TAKES DATA TRANSFERRED IN THE SESSION LAYER AND BREAKS IT INTO
“SEGMENTS” ON THE TRANSMITTING END. IT IS RESPONSIBLE FOR REASSEMBLING THE SEGMENTS
ON THE RECEIVING END, TURNING IT BACK INTO DATA THAT CAN BE USED BY THE SESSION
LAYER. THE TRANSPORT LAYER CARRIES OUT FLOW CONTROL, SENDING DATA AT A RATE THAT
MATCHES THE CONNECTION SPEED OF THE RECEIVING DEVICE, AND ERROR CONTROL, CHECKING
IF DATA WAS RECEIVED INCORRECTLY AND IF NOT, REQUESTING IT AGAIN.
• 3. NETWORK LAYER:
• THE NETWORK LAYER HAS TWO MAIN FUNCTIONS. ONE IS BREAKING UP SEGMENTS INTO
NETWORK PACKETS, AND REASSEMBLING THE PACKETS ON THE RECEIVING END. THE OTHER IS
ROUTING PACKETS BY DISCOVERING THE BEST PATH ACROSS A PHYSICAL NETWORK. THE
NETWORK LAYER USES NETWORK ADDRESSES (TYPICALLY INTERNET PROTOCOL ADDRESSES) TO
ROUTE PACKETS TO A DESTINATION NODE.
• 2. DATA LINK LAYER:
• THE DATA LINK LAYER ESTABLISHES AND TERMINATES A CONNECTION BETWEEN TWO
PHYSICALLY-CONNECTED NODES ON A NETWORK. IT BREAKS UP PACKETS INTO FRAMES AND
SENDS THEM FROM SOURCE TO DESTINATION. THIS LAYER IS COMPOSED OF TWO PARTS—
LOGICAL LINK CONTROL (LLC), WHICH IDENTIFIES NETWORK PROTOCOLS, PERFORMS ERROR
CHECKING AND SYNCHRONIZES FRAMES, AND MEDIA ACCESS CONTROL (MAC) WHICH USES MAC
ADDRESSES TO CONNECT DEVICES AND DEFINE PERMISSIONS TO TRANSMIT AND RECEIVE DATA.
• 1. PHYSICAL LAYER:
• THE PHYSICAL LAYER IS RESPONSIBLE FOR THE PHYSICAL CABLE OR WIRELESS CONNECTION
BETWEEN NETWORK NODES. IT DEFINES THE CONNECTOR, THE ELECTRICAL CABLE OR WIRELESS
TECHNOLOGY CONNECTING THE DEVICES, AND IS RESPONSIBLE FOR TRANSMISSION OF THE RAW
DATA, WHICH IS SIMPLY A SERIES OF 0S AND 1S, WHILE TAKING CARE OF BIT RATE CONTROL.
Open Systems Interconnection (OSI)  MODEL

More Related Content

Similar to Open Systems Interconnection (OSI) MODEL

What is network architecture
What is network architecture What is network architecture
What is network architecture
Sorcia D'Arceuil
 
Network internet
Network internetNetwork internet
Network internetKumar
 
Networks internet
Networks internetNetworks internet
Networks internetKumar
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
ChinmayWaingankar3
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
Shamima Akther
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And Disadvantages
Renee Jones
 
What is network architecture (full)
What is network architecture (full)What is network architecture (full)
What is network architecture (full)
Sorcia D'Arceuil
 
Ks 5th networking_basicskevinshea
Ks 5th networking_basicskevinsheaKs 5th networking_basicskevinshea
Ks 5th networking_basicskevinsheaPrema Bahadur
 
Ks 5th networking_basicskevinshea
Ks 5th networking_basicskevinsheaKs 5th networking_basicskevinshea
Ks 5th networking_basicskevinshea
maruthi vardhan
 
Class notes 1
Class notes 1Class notes 1
Class notes 1
Robuilislam
 
Lan pan class 12 ppt
Lan pan class 12 pptLan pan class 12 ppt
Lan pan class 12 ppt
094supreethaTSvic
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORT
Rajat Kumar
 
network.pptx
network.pptxnetwork.pptx
network.pptx
ssuser8347a1
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
KavyaGupta70
 
Computer Network
Computer NetworkComputer Network
Computer Networkashiesh0007
 
Client Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxClient Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptx
DevChaudhari17
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-network
lklokesh
 
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006 PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
Pace IT at Edmonds Community College
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and models
shahin raj
 

Similar to Open Systems Interconnection (OSI) MODEL (20)

What is network architecture
What is network architecture What is network architecture
What is network architecture
 
Network internet
Network internetNetwork internet
Network internet
 
Networks internet
Networks internetNetworks internet
Networks internet
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And Disadvantages
 
Document
DocumentDocument
Document
 
What is network architecture (full)
What is network architecture (full)What is network architecture (full)
What is network architecture (full)
 
Ks 5th networking_basicskevinshea
Ks 5th networking_basicskevinsheaKs 5th networking_basicskevinshea
Ks 5th networking_basicskevinshea
 
Ks 5th networking_basicskevinshea
Ks 5th networking_basicskevinsheaKs 5th networking_basicskevinshea
Ks 5th networking_basicskevinshea
 
Class notes 1
Class notes 1Class notes 1
Class notes 1
 
Lan pan class 12 ppt
Lan pan class 12 pptLan pan class 12 ppt
Lan pan class 12 ppt
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORT
 
network.pptx
network.pptxnetwork.pptx
network.pptx
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Client Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxClient Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptx
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-network
 
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006 PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and models
 

More from Souma Maiti

LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
Souma Maiti
 
Types of Cyber Security Attacks- Active & Passive Attak
Types of Cyber Security Attacks- Active & Passive AttakTypes of Cyber Security Attacks- Active & Passive Attak
Types of Cyber Security Attacks- Active & Passive Attak
Souma Maiti
 
E-Commerce Analysis & Strategy Presentation
E-Commerce Analysis & Strategy PresentationE-Commerce Analysis & Strategy Presentation
E-Commerce Analysis & Strategy Presentation
Souma Maiti
 
Principles of Network Security-CIAD TRIAD
Principles of Network Security-CIAD TRIADPrinciples of Network Security-CIAD TRIAD
Principles of Network Security-CIAD TRIAD
Souma Maiti
 
Decision Tree in Machine Learning
Decision Tree in Machine Learning  Decision Tree in Machine Learning
Decision Tree in Machine Learning
Souma Maiti
 
Idea on Entreprenaurship
Idea on EntreprenaurshipIdea on Entreprenaurship
Idea on Entreprenaurship
Souma Maiti
 
System Based Attacks - CYBER SECURITY
System Based Attacks - CYBER SECURITYSystem Based Attacks - CYBER SECURITY
System Based Attacks - CYBER SECURITY
Souma Maiti
 
Operation Research
Operation ResearchOperation Research
Operation Research
Souma Maiti
 
Loan Approval Prediction Using Machine Learning
Loan Approval Prediction Using Machine LearningLoan Approval Prediction Using Machine Learning
Loan Approval Prediction Using Machine Learning
Souma Maiti
 
Constitution of India
Constitution of IndiaConstitution of India
Constitution of India
Souma Maiti
 
COMIPLER_DESIGN_1[1].pdf
COMIPLER_DESIGN_1[1].pdfCOMIPLER_DESIGN_1[1].pdf
COMIPLER_DESIGN_1[1].pdf
Souma Maiti
 
Heuristic Search Technique- Hill Climbing
Heuristic Search Technique- Hill ClimbingHeuristic Search Technique- Hill Climbing
Heuristic Search Technique- Hill Climbing
Souma Maiti
 
SATELLITE INTERNET AND STARLINK
SATELLITE INTERNET AND STARLINKSATELLITE INTERNET AND STARLINK
SATELLITE INTERNET AND STARLINK
Souma Maiti
 
Fundamental Steps Of Image Processing
Fundamental Steps Of Image ProcessingFundamental Steps Of Image Processing
Fundamental Steps Of Image Processing
Souma Maiti
 
Join in SQL - Inner, Self, Outer Join
Join in SQL - Inner, Self, Outer JoinJoin in SQL - Inner, Self, Outer Join
Join in SQL - Inner, Self, Outer Join
Souma Maiti
 
K means Clustering Algorithm
K means Clustering AlgorithmK means Clustering Algorithm
K means Clustering Algorithm
Souma Maiti
 
Errors in Numerical Analysis
Errors in Numerical AnalysisErrors in Numerical Analysis
Errors in Numerical Analysis
Souma Maiti
 
Internet of Things(IOT)
Internet of Things(IOT)Internet of Things(IOT)
Internet of Things(IOT)
Souma Maiti
 

More from Souma Maiti (18)

LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
 
Types of Cyber Security Attacks- Active & Passive Attak
Types of Cyber Security Attacks- Active & Passive AttakTypes of Cyber Security Attacks- Active & Passive Attak
Types of Cyber Security Attacks- Active & Passive Attak
 
E-Commerce Analysis & Strategy Presentation
E-Commerce Analysis & Strategy PresentationE-Commerce Analysis & Strategy Presentation
E-Commerce Analysis & Strategy Presentation
 
Principles of Network Security-CIAD TRIAD
Principles of Network Security-CIAD TRIADPrinciples of Network Security-CIAD TRIAD
Principles of Network Security-CIAD TRIAD
 
Decision Tree in Machine Learning
Decision Tree in Machine Learning  Decision Tree in Machine Learning
Decision Tree in Machine Learning
 
Idea on Entreprenaurship
Idea on EntreprenaurshipIdea on Entreprenaurship
Idea on Entreprenaurship
 
System Based Attacks - CYBER SECURITY
System Based Attacks - CYBER SECURITYSystem Based Attacks - CYBER SECURITY
System Based Attacks - CYBER SECURITY
 
Operation Research
Operation ResearchOperation Research
Operation Research
 
Loan Approval Prediction Using Machine Learning
Loan Approval Prediction Using Machine LearningLoan Approval Prediction Using Machine Learning
Loan Approval Prediction Using Machine Learning
 
Constitution of India
Constitution of IndiaConstitution of India
Constitution of India
 
COMIPLER_DESIGN_1[1].pdf
COMIPLER_DESIGN_1[1].pdfCOMIPLER_DESIGN_1[1].pdf
COMIPLER_DESIGN_1[1].pdf
 
Heuristic Search Technique- Hill Climbing
Heuristic Search Technique- Hill ClimbingHeuristic Search Technique- Hill Climbing
Heuristic Search Technique- Hill Climbing
 
SATELLITE INTERNET AND STARLINK
SATELLITE INTERNET AND STARLINKSATELLITE INTERNET AND STARLINK
SATELLITE INTERNET AND STARLINK
 
Fundamental Steps Of Image Processing
Fundamental Steps Of Image ProcessingFundamental Steps Of Image Processing
Fundamental Steps Of Image Processing
 
Join in SQL - Inner, Self, Outer Join
Join in SQL - Inner, Self, Outer JoinJoin in SQL - Inner, Self, Outer Join
Join in SQL - Inner, Self, Outer Join
 
K means Clustering Algorithm
K means Clustering AlgorithmK means Clustering Algorithm
K means Clustering Algorithm
 
Errors in Numerical Analysis
Errors in Numerical AnalysisErrors in Numerical Analysis
Errors in Numerical Analysis
 
Internet of Things(IOT)
Internet of Things(IOT)Internet of Things(IOT)
Internet of Things(IOT)
 

Recently uploaded

Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 

Recently uploaded (20)

Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 

Open Systems Interconnection (OSI) MODEL

  • 1. NAME- SOUMA MAITI ROLL N0- 27500120016 REG NO.- 202750100110016 DEPARTMENT- COMPUTER SCIENCE YEAR- 3RD YEAR(6TH SEMESTER) SUBJECT NAME-COMPUTER NETWORKS SUBJECT CODE- PCC-CS602
  • 2. INTRODUCTION • WHAT IS THE OSI MODEL? • THE OPEN SYSTEMS INTERCONNECTION (OSI) MODEL DESCRIBES SEVEN LAYERS THAT COMPUTER SYSTEMS USE TO COMMUNICATE OVER A NETWORK. IT WAS THE FIRST STANDARD MODEL FOR NETWORK COMMUNICATIONS, ADOPTED BY ALL MAJOR COMPUTER AND TELECOMMUNICATION COMPANIES IN THE EARLY 1980S • THE MODERN INTERNET IS NOT BASED ON OSI, BUT ON THE SIMPLER TCP/IP MODEL. HOWEVER, THE OSI 7-LAYER MODEL IS STILL WIDELY USED, AS IT HELPS VISUALIZE AND COMMUNICATE HOW NETWORKS OPERATE, AND HELPS ISOLATE AND TROUBLESHOOT NETWORKING PROBLEMS. • OSI WAS INTRODUCED IN 1983 BY REPRESENTATIVES OF THE MAJOR COMPUTER AND TELECOM COMPANIES, AND WAS ADOPTED BY ISO AS AN INTERNATIONAL STANDARD IN 1984.
  • 3. 7 LAYERS OF OSI MODEL 7. APPLICATION LAYER: THE APPLICATION LAYER IS USED BY END-USER SOFTWARE SUCH AS WEB BROWSERS AND EMAIL CLIENTS. IT PROVIDES PROTOCOLS THAT ALLOW SOFTWARE TO SEND AND RECEIVE INFORMATION AND PRESENT MEANINGFUL DATA TO USERS. A FEW EXAMPLES OF APPLICATION LAYER PROTOCOLS ARE THE HYPERTEXT TRANSFER PROTOCOL (HTTP), FILE TRANSFER PROTOCOL (FTP), POST OFFICE PROTOCOL (POP), SIMPLE MAIL TRANSFER PROTOCOL (SMTP), AND DOMAIN NAME SYSTEM (DNS). 6. PRESENTATION LAYER: THE PRESENTATION LAYER PREPARES DATA FOR THE APPLICATION LAYER. IT DEFINES HOW TWO DEVICES SHOULD ENCODE, ENCRYPT, AND COMPRESS DATA SO IT IS RECEIVED CORRECTLY ON THE OTHER END. THE PRESENTATION LAYER TAKES ANY DATA TRANSMITTED BY THE APPLICATION LAYER AND PREPARES IT FOR TRANSMISSION OVER THE SESSION LAYER. 5. SESSION LAYER: THE SESSION LAYER CREATES COMMUNICATION CHANNELS, CALLED SESSIONS, BETWEEN DEVICES. IT IS RESPONSIBLE FOR OPENING SESSIONS, ENSURING THEY REMAIN OPEN AND FUNCTIONAL WHILE DATA IS BEING TRANSFERRED, AND CLOSING THEM WHEN COMMUNICATION ENDS. THE SESSION LAYER CAN ALSO SET CHECKPOINTS DURING A DATA TRANSFER—IF THE SESSION IS INTERRUPTED, DEVICES CAN RESUME DATA TRANSFER FROM THE LAST CHECKPOINT.
  • 4. • 4. TRANSPORT LAYER: • THE TRANSPORT LAYER TAKES DATA TRANSFERRED IN THE SESSION LAYER AND BREAKS IT INTO “SEGMENTS” ON THE TRANSMITTING END. IT IS RESPONSIBLE FOR REASSEMBLING THE SEGMENTS ON THE RECEIVING END, TURNING IT BACK INTO DATA THAT CAN BE USED BY THE SESSION LAYER. THE TRANSPORT LAYER CARRIES OUT FLOW CONTROL, SENDING DATA AT A RATE THAT MATCHES THE CONNECTION SPEED OF THE RECEIVING DEVICE, AND ERROR CONTROL, CHECKING IF DATA WAS RECEIVED INCORRECTLY AND IF NOT, REQUESTING IT AGAIN. • 3. NETWORK LAYER: • THE NETWORK LAYER HAS TWO MAIN FUNCTIONS. ONE IS BREAKING UP SEGMENTS INTO NETWORK PACKETS, AND REASSEMBLING THE PACKETS ON THE RECEIVING END. THE OTHER IS ROUTING PACKETS BY DISCOVERING THE BEST PATH ACROSS A PHYSICAL NETWORK. THE NETWORK LAYER USES NETWORK ADDRESSES (TYPICALLY INTERNET PROTOCOL ADDRESSES) TO ROUTE PACKETS TO A DESTINATION NODE. • 2. DATA LINK LAYER: • THE DATA LINK LAYER ESTABLISHES AND TERMINATES A CONNECTION BETWEEN TWO PHYSICALLY-CONNECTED NODES ON A NETWORK. IT BREAKS UP PACKETS INTO FRAMES AND SENDS THEM FROM SOURCE TO DESTINATION. THIS LAYER IS COMPOSED OF TWO PARTS— LOGICAL LINK CONTROL (LLC), WHICH IDENTIFIES NETWORK PROTOCOLS, PERFORMS ERROR CHECKING AND SYNCHRONIZES FRAMES, AND MEDIA ACCESS CONTROL (MAC) WHICH USES MAC ADDRESSES TO CONNECT DEVICES AND DEFINE PERMISSIONS TO TRANSMIT AND RECEIVE DATA. • 1. PHYSICAL LAYER: • THE PHYSICAL LAYER IS RESPONSIBLE FOR THE PHYSICAL CABLE OR WIRELESS CONNECTION BETWEEN NETWORK NODES. IT DEFINES THE CONNECTOR, THE ELECTRICAL CABLE OR WIRELESS TECHNOLOGY CONNECTING THE DEVICES, AND IS RESPONSIBLE FOR TRANSMISSION OF THE RAW DATA, WHICH IS SIMPLY A SERIES OF 0S AND 1S, WHILE TAKING CARE OF BIT RATE CONTROL.