SlideShare a Scribd company logo
By James Bennett, Joe Barton, Liam Edwards
and Harbinjit Salh
 The OSI Model has seven different layers. This presentation will
describe and explain each one of the layers, Starting with highest in
the hierarchy (The Application Layer) proceeding to the lowest (The
Physical Layer).
 This is how the layers look:
Layers 7 – 4 focus on end to
end communication of data
source and destination
Layers 3 – 1 provide consistent
communication between the
network devices.
 The application layer is the
closest to the end user. It is the
layer that provides the interface
between the applications we
use to communicate and the
underlying network over which
our messages are transmitted.
The application layer protocols
are used to exchange data
between programs running on
the source and destination
hosts. There are many
application layer protocols
including HTTP, FTP, TFTP,
IMAP, DNS protocol.
Layer 6 - Presentation
The presentation layer or sometimes
referred to as the syntax layer, serves
as a data translator for the network. It is
responsible for the delivery and
formatting of information to the
application layer for further processing
display.
Encryption is typically done at this layer
too, although it can be done at the
application, session and transport
layers. Decryption is also handled at
this layer. For example when logging on
to bank account sites the presentation
layer will decrypt the data as it is
received.
 Allows to applications to establish and terminate
communicate to each other, known as a session.
 Provides services like:
 Dialog management- what decides which end point talks at
what time
 Ensures data sent does no receive errors, like
duplication, lost or corruption.

 It Provides:
 Message segmentation- what splits messages into smaller
pieces, for fewer losses, and then passes to the network
layer. The receiving transport layer reassembles the
segments into the full data.

 Error checking and data recovery
 This layer forwards PDUs between hosts
 It uses four process to do this:
1. Addressing end devices- this process configures
end devices with a unique IP address
2. Encapsulation – this layer receives the data from
the transport layer and then adds an IP header to
the data, what includes the source and
destination IP address.
3. Routing - a router selects paths to direct
the packet towards to the destination.
4. De-encapsulation – when receiving a packet
the network layer reads the IP address, if
the destination IP address is the same as its
own it will remove the header and send the
data up to the transport layer.
 The Data link layer is responsible for the moving of data
across the a physical link in a network.
 The data link has two sublayers:
Media Access Control (MAC)
Logical Link Control (LLC)
The Data link ensures that initial connection has been set up, It
also divides output data into frames. It ensures that incoming
has been received.
 This layer transmit the data, in bits form, to
the destination physical layer.
 The data is transmitted using signals, the
signal used is determined by the medium
used.
 Electrical voltage, radio frequencies and
pulses of light or infrared are types of
signalling.

More Related Content

What's hot

Osi model
Osi modelOsi model
Osi model
Umamaheshwariv1
 
Osi model(open system interconnection)
Osi model(open system interconnection)Osi model(open system interconnection)
Osi model(open system interconnection)
Dipu Thomas joy
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
Sagar Gor
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
Mukesh Chinta
 
OSI models
OSI modelsOSI models
OSI models
Mahesh Kumar Attri
 
Computer Networks - Layers in OSI Model
Computer Networks - Layers in OSI ModelComputer Networks - Layers in OSI Model
Computer Networks - Layers in OSI Model
Shreyash Agarwal
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
Satyam Jaiswal
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
Nayan Sarma
 
The OSI Model
The OSI ModelThe OSI Model
The OSI Model
Trishit Biswas
 
Introduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerIntroduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link Layer
VNIT-ACM Student Chapter
 
Osi model
Osi modelOsi model
Osi model
Priyanka Sharma
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
Jhoniel Viloria
 
iso osi model
 iso osi model iso osi model
iso osi model
vishnu1204
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
vasanthimuniasamy
 
OSI(Open System Interconnection) model
OSI(Open System Interconnection) modelOSI(Open System Interconnection) model
OSI(Open System Interconnection) model
Namra Afzal
 
OsI reference model
OsI reference modelOsI reference model
OsI reference model
LakshmiSamivel
 
OSI MODEL
OSI MODELOSI MODEL
Osi reference model
Osi reference modelOsi reference model
Osi reference model
prashob7
 
Network protocols
Network protocolsNetwork protocols
Network protocols
Hemnath R.
 
Osi & ip presentation
Osi & ip presentationOsi & ip presentation
Osi & ip presentation
Monika Vijay
 

What's hot (20)

Osi model
Osi modelOsi model
Osi model
 
Osi model(open system interconnection)
Osi model(open system interconnection)Osi model(open system interconnection)
Osi model(open system interconnection)
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
OSI models
OSI modelsOSI models
OSI models
 
Computer Networks - Layers in OSI Model
Computer Networks - Layers in OSI ModelComputer Networks - Layers in OSI Model
Computer Networks - Layers in OSI Model
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
The OSI Model
The OSI ModelThe OSI Model
The OSI Model
 
Introduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerIntroduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link Layer
 
Osi model
Osi modelOsi model
Osi model
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
 
iso osi model
 iso osi model iso osi model
iso osi model
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
OSI(Open System Interconnection) model
OSI(Open System Interconnection) modelOSI(Open System Interconnection) model
OSI(Open System Interconnection) model
 
OsI reference model
OsI reference modelOsI reference model
OsI reference model
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Osi & ip presentation
Osi & ip presentationOsi & ip presentation
Osi & ip presentation
 

Similar to OSI Draft

Hardware7
Hardware7Hardware7
Hardware7
George Ranson
 
BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptx
BapanKar2
 
OSI Model
OSI ModelOSI Model
OSI Model
Rahul Marwaha
 
7 layer OSI model
7 layer OSI model7 layer OSI model
7 layer OSI model
penetration Tester
 
Osi model
Osi modelOsi model
Osi model
Manju Lakkegowda
 
OSI MODEL AND ITS LAYERS FUNCTION
OSI  MODEL AND ITS LAYERS FUNCTIONOSI  MODEL AND ITS LAYERS FUNCTION
OSI MODEL AND ITS LAYERS FUNCTION
Pooja Dewangan
 
Osi model
Osi modelOsi model
Osi model
yjartes
 
Osi model
Osi modelOsi model
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
TadeseBeyene
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
BELKA08
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3
Raghu nath
 
Network essentials chapter 2
Network essentials  chapter 2Network essentials  chapter 2
Network essentials chapter 2
Raghu nath
 
Osi model
Osi modelOsi model
Osi model
GLIM Digital
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
Shamima Akther
 
Network essentials chapter 4
Network essentials  chapter 4Network essentials  chapter 4
Network essentials chapter 4
Raghu nath
 
Computer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusComputer Networks Notes Complete Syllabus
Computer Networks Notes Complete Syllabus
Anujashejwal
 
OSI Reference Model
OSI Reference ModelOSI Reference Model
OSI Reference Model
AayushAryal2
 
OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.
City University, Dhaka, Bangladesh
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
NajmulIslam38
 
Learn basics of ip addressing
Learn basics of  ip addressingLearn basics of  ip addressing
Learn basics of ip addressing
Bobby Agustinus Ginting
 

Similar to OSI Draft (20)

Hardware7
Hardware7Hardware7
Hardware7
 
BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptx
 
OSI Model
OSI ModelOSI Model
OSI Model
 
7 layer OSI model
7 layer OSI model7 layer OSI model
7 layer OSI model
 
Osi model
Osi modelOsi model
Osi model
 
OSI MODEL AND ITS LAYERS FUNCTION
OSI  MODEL AND ITS LAYERS FUNCTIONOSI  MODEL AND ITS LAYERS FUNCTION
OSI MODEL AND ITS LAYERS FUNCTION
 
Osi model
Osi modelOsi model
Osi model
 
Osi model
Osi modelOsi model
Osi model
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3
 
Network essentials chapter 2
Network essentials  chapter 2Network essentials  chapter 2
Network essentials chapter 2
 
Osi model
Osi modelOsi model
Osi model
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Network essentials chapter 4
Network essentials  chapter 4Network essentials  chapter 4
Network essentials chapter 4
 
Computer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusComputer Networks Notes Complete Syllabus
Computer Networks Notes Complete Syllabus
 
OSI Reference Model
OSI Reference ModelOSI Reference Model
OSI Reference Model
 
OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
 
Learn basics of ip addressing
Learn basics of  ip addressingLearn basics of  ip addressing
Learn basics of ip addressing
 

More from har139

M1
M1M1
M1
har139
 
Communication devices
Communication devicesCommunication devices
Communication devices
har139
 
Interconnecting devices
Interconnecting devices Interconnecting devices
Interconnecting devices
har139
 
Managed s.
Managed s.Managed s.
Managed s.
har139
 
P5 ram instillation
P5 ram instillationP5 ram instillation
P5 ram instillation
har139
 
P2 computer systems
P2 computer systemsP2 computer systems
P2 computer systems
har139
 
P1 computer components
P1 computer componentsP1 computer components
P1 computer components
har139
 
Ipod presentation
Ipod presentationIpod presentation
Ipod presentation
har139
 

More from har139 (8)

M1
M1M1
M1
 
Communication devices
Communication devicesCommunication devices
Communication devices
 
Interconnecting devices
Interconnecting devices Interconnecting devices
Interconnecting devices
 
Managed s.
Managed s.Managed s.
Managed s.
 
P5 ram instillation
P5 ram instillationP5 ram instillation
P5 ram instillation
 
P2 computer systems
P2 computer systemsP2 computer systems
P2 computer systems
 
P1 computer components
P1 computer componentsP1 computer components
P1 computer components
 
Ipod presentation
Ipod presentationIpod presentation
Ipod presentation
 

Recently uploaded

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 

Recently uploaded (20)

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 

OSI Draft

  • 1. By James Bennett, Joe Barton, Liam Edwards and Harbinjit Salh
  • 2.  The OSI Model has seven different layers. This presentation will describe and explain each one of the layers, Starting with highest in the hierarchy (The Application Layer) proceeding to the lowest (The Physical Layer).  This is how the layers look: Layers 7 – 4 focus on end to end communication of data source and destination Layers 3 – 1 provide consistent communication between the network devices.
  • 3.  The application layer is the closest to the end user. It is the layer that provides the interface between the applications we use to communicate and the underlying network over which our messages are transmitted. The application layer protocols are used to exchange data between programs running on the source and destination hosts. There are many application layer protocols including HTTP, FTP, TFTP, IMAP, DNS protocol.
  • 4. Layer 6 - Presentation The presentation layer or sometimes referred to as the syntax layer, serves as a data translator for the network. It is responsible for the delivery and formatting of information to the application layer for further processing display. Encryption is typically done at this layer too, although it can be done at the application, session and transport layers. Decryption is also handled at this layer. For example when logging on to bank account sites the presentation layer will decrypt the data as it is received.
  • 5.  Allows to applications to establish and terminate communicate to each other, known as a session.  Provides services like:  Dialog management- what decides which end point talks at what time
  • 6.  Ensures data sent does no receive errors, like duplication, lost or corruption.   It Provides:  Message segmentation- what splits messages into smaller pieces, for fewer losses, and then passes to the network layer. The receiving transport layer reassembles the segments into the full data.   Error checking and data recovery
  • 7.  This layer forwards PDUs between hosts  It uses four process to do this: 1. Addressing end devices- this process configures end devices with a unique IP address 2. Encapsulation – this layer receives the data from the transport layer and then adds an IP header to the data, what includes the source and destination IP address.
  • 8. 3. Routing - a router selects paths to direct the packet towards to the destination. 4. De-encapsulation – when receiving a packet the network layer reads the IP address, if the destination IP address is the same as its own it will remove the header and send the data up to the transport layer.
  • 9.  The Data link layer is responsible for the moving of data across the a physical link in a network.  The data link has two sublayers: Media Access Control (MAC) Logical Link Control (LLC) The Data link ensures that initial connection has been set up, It also divides output data into frames. It ensures that incoming has been received.
  • 10.  This layer transmit the data, in bits form, to the destination physical layer.  The data is transmitted using signals, the signal used is determined by the medium used.  Electrical voltage, radio frequencies and pulses of light or infrared are types of signalling.