SlideShare a Scribd company logo
OSI Model
OSI MODEL
Presented by
Duryodhan Mahapatra
System Administrator
Strategy for connecting host computers and other
communicating equipment.
Defines necessary elements for data communication
between devices.
A communication architecture, therefore, defines a
standard for the communicating hosts.
A programmer formats data in a manner defined by
the communication architecture and passes it on to
the communication software.
Separating communication functions adds flexibility,
for example, we do not need to modify the entire host
software to include more communication devices.
OSI Model
Layer architecture simplifies the network design.
It is easy to debug network applications in a layered
architecture network.
The network management is easier due to the layered
architecture.
Network layers follow a set of rules, called protocol.
The protocol defines the format of the data being
exchanged, and the control and timing for the
handshake between layers.
OSI Model
International standard organization (ISO)
established a committee in 1977 to develop an
architecture for computer communication.
Open Systems Interconnection (OSI) reference
model is the result of this effort.
In 1984, the Open Systems Interconnection (OSI)
reference model was approved as an international
standard for communications architecture.
Term “open” denotes the ability to connect any two
systems which conform to the reference model and
associated standards.
OSI Model
The OSI model is now considered the primary
Architectural model for inter-computer
communications.
The OSI model describes how information or data
makes its way from application programmes (such as
spreadsheets) through a network medium (such as
wire) to another application programme located on
another network.
The OSI reference model divides the problem of
moving information between computers over a
network medium into SEVEN smaller and more
manageable problems .
This separation into smaller more manageable
functions is known as layering.
OSI Model
OSI Model
The process of breaking up the functions or tasks of
networking into layers reduces complexity.
Each layer provides a service to the layer above it in
the protocol specification.
Each layer communicates with the same layer’s
software or hardware on other computers.
The lower 4 layers (transport, network, data link and
physical —Layers 4, 3, 2, and 1) are concerned with
the flow of data from end to end through the network.
The upper four layers of the OSI model (application,
presentation and session—Layers 7, 6 and 5) are
orientated more toward services to the applications.
Data is Encapsulated with the necessary protocol
information as it moves down the layers before
network transit.
OSI Model
Provides physical interface for transmission of
information.
Defines rules by which bits are passed from one
system to another on a physical communication
medium.
Covers all - mechanical, electrical, functional and
procedural - aspects for physical communication.
Such characteristics as voltage levels, timing of
voltage changes, physical data rates, maximum
transmission distances, physical connectors, and
other similar attributes are defined by physical layer
specifications.
OSI Model
Data link layer attempts to provide reliable
communication over the physical layer interface.
Breaks the outgoing data into frames and reassemble
the received frames.
Create and detect frame boundaries.
Handle errors by implementing an acknowledgement
and retransmission scheme.
Implement flow control.
Supports points-to-point as well as broadcast
communication.
Supports simplex, half-duplex or full-duplex
communication.
OSI Model
Implements routing of frames (packets) through the
network.
Defines the most optimum path the packet should
take from the source to the destination
Defines logical addressing so that any endpoint can
be identified.
Handles congestion in the network.
Facilitates interconnection between heterogeneous
networks (Internetworking).
The network layer also defines how to fragment a
packet into smaller packets to accommodate
different media.
OSI Model
Purpose of this layer is to provide a reliable
mechanism for the exchange of data between two
processes in different computers.
Ensures that the data units are delivered error free.
Ensures that data units are delivered in sequence.
Ensures that there is no loss or duplication of data
units.
Provides connectionless or connection oriented
service.
Provides for the connection management.
Multiplex multiple connection over a single channel.
OSI Model
Session layer provides mechanism for controlling the
dialogue between the two end systems. It defines how to
start, control and end conversations (called sessions)
between applications.
This layer requests for a logical connection to be
established on an end-user’s request.
Any necessary log-on or password validation is also
handled by this layer.
Session layer is also responsible for terminating the
connection.
This layer provides services like dialogue discipline which
can be full duplex or half duplex.
Session layer can also provide check-pointing mechanism
such that if a failure of some sort occurs between
checkpoints, all data can be retransmitted from the last
checkpoint.
OSI Model
Presentation layer defines the format in which the
data is to be exchanged between the two
communicating entities.
Also handles data compression and data encryption
(cryptography).
OSI Model
1. Application layer interacts with application
programs and is the highest level of OSI model.
2. Application layer contains management functions
to support distributed applications.
3. Examples of application layer are applications such
as file transfer, electronic mail, remote login etc.
OSI Model
A message begins at the top
application layer and moves
down the OSI layers to the
bottom physical layer.
As the message descends, each
successive OSI model layer adds
a header to it.
A header is layer-specific
information that basically
explains what functions the
layer carried out.
Conversely, at the receiving
end, headers are striped from
the message as it travels up the
corresponding layers.
OSI Model
TCP/IP Model
TCP/IP MODEL
TCP/IP Model
TCP/IP Model
Application Layer
Application programs using the network
Transport Layer (TCP/UDP)
Management of end-to-end message transmission,
error detection and error correction
Network Layer (IP)
Handling of datagrams : routing and congestion
Data Link Layer
Management of cost effective and reliable data delivery,
access to physical networks
Physical Layer
Physical Media
Section Layer
In Host Communication
Section Layer
In Host Communication
Presentation Layer
Data Representation
OSI MODEL

More Related Content

What's hot

ITFT_Osi reference model
ITFT_Osi reference modelITFT_Osi reference model
ITFT_Osi reference model
Sneh Prabha
 
Osi reference model in Networking
Osi reference model in NetworkingOsi reference model in Networking
Osi reference model in Networking
Satya P. Joshi
 
Osi Layer model provided by TopTechy.com
Osi Layer model provided by TopTechy.comOsi Layer model provided by TopTechy.com
Osi Layer model provided by TopTechy.com
Vicky Kamboj
 
OSI Model | Computer Science
OSI Model | Computer ScienceOSI Model | Computer Science
OSI Model | Computer Science
Transweb Global Inc
 
Osi reference model
Osi reference modelOsi reference model
THE COMPLETE OSI MODEL
THE COMPLETE OSI MODEL THE COMPLETE OSI MODEL
THE COMPLETE OSI MODEL
AMIT GUPTA
 
Presentation on osi layer
Presentation on osi layerPresentation on osi layer
Presentation on osi layer
Kuldeep Pathak
 
Introduction to Networking and OSI Model
Introduction to Networking and OSI ModelIntroduction to Networking and OSI Model
Introduction to Networking and OSI Model
KawtharAlsharah
 
A Technical Seminar on OSI model
A Technical Seminar on OSI modelA Technical Seminar on OSI model
A Technical Seminar on OSI model
Likan Patra
 
OSI Model - Open Systems Interconnection
OSI Model - Open Systems InterconnectionOSI Model - Open Systems Interconnection
OSI Model - Open Systems Interconnection
Adeel Rasheed
 
Osi model
Osi modelOsi model
Osi model
Umamaheshwariv1
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
Jhoniel Viloria
 
Lalit bhati ppt osi
Lalit bhati ppt osiLalit bhati ppt osi
Lalit bhati ppt osi
Lalit Bhati
 
Lecture 03
Lecture 03Lecture 03
Lecture 03
Anwal Mirza
 
Osi
OsiOsi

What's hot (20)

ITFT_Osi reference model
ITFT_Osi reference modelITFT_Osi reference model
ITFT_Osi reference model
 
OSI MODEL
    OSI MODEL    OSI MODEL
OSI MODEL
 
Osi reference model in Networking
Osi reference model in NetworkingOsi reference model in Networking
Osi reference model in Networking
 
Osi Layer model provided by TopTechy.com
Osi Layer model provided by TopTechy.comOsi Layer model provided by TopTechy.com
Osi Layer model provided by TopTechy.com
 
OSI Model | Computer Science
OSI Model | Computer ScienceOSI Model | Computer Science
OSI Model | Computer Science
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
THE COMPLETE OSI MODEL
THE COMPLETE OSI MODEL THE COMPLETE OSI MODEL
THE COMPLETE OSI MODEL
 
The Osi Model
The Osi ModelThe Osi Model
The Osi Model
 
Presentation on osi layer
Presentation on osi layerPresentation on osi layer
Presentation on osi layer
 
Introduction to Networking and OSI Model
Introduction to Networking and OSI ModelIntroduction to Networking and OSI Model
Introduction to Networking and OSI Model
 
A Technical Seminar on OSI model
A Technical Seminar on OSI modelA Technical Seminar on OSI model
A Technical Seminar on OSI model
 
OSI Model - Open Systems Interconnection
OSI Model - Open Systems InterconnectionOSI Model - Open Systems Interconnection
OSI Model - Open Systems Interconnection
 
Osi model
Osi modelOsi model
Osi model
 
OSI models
OSI modelsOSI models
OSI models
 
Osi model
Osi modelOsi model
Osi model
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
 
Lalit bhati ppt osi
Lalit bhati ppt osiLalit bhati ppt osi
Lalit bhati ppt osi
 
OSI Layers
OSI LayersOSI Layers
OSI Layers
 
Lecture 03
Lecture 03Lecture 03
Lecture 03
 
Osi
OsiOsi
Osi
 

Viewers also liked

Las TIC en La Universidad Nacional Abierta
Las TIC en La Universidad Nacional AbiertaLas TIC en La Universidad Nacional Abierta
Las TIC en La Universidad Nacional Abierta
nelson Maldonado
 
Bed In Summer Comm Board
Bed In Summer Comm BoardBed In Summer Comm Board
Bed In Summer Comm Board
ms_shepley
 
Common core and its challenge
Common core and its challengeCommon core and its challenge
Common core and its challenge
QD Learning
 
Horário 29fev
Horário 29fevHorário 29fev
Horário 29fev
muni2014
 
The Roseate Shade(正文)
The Roseate Shade(正文)The Roseate Shade(正文)
The Roseate Shade(正文)Na Kang
 
Questions and Answers on Shakespeare's the Tempest
Questions and Answers on Shakespeare's the TempestQuestions and Answers on Shakespeare's the Tempest
Questions and Answers on Shakespeare's the Tempest
Sawsan Ali
 
Bed In Summer Poem
Bed In Summer PoemBed In Summer Poem
Bed In Summer Poem
ms_shepley
 
La Realidad Aumentada. (RA)
La Realidad Aumentada. (RA)La Realidad Aumentada. (RA)
La Realidad Aumentada. (RA)
oswaldomnrique0
 
Anna Resume Grad
Anna Resume GradAnna Resume Grad
Anna Resume GradAnna Fuller
 
El Bolero de Ravel
El Bolero de RavelEl Bolero de Ravel
El Bolero de Ravel
iesjcbaroja
 
CAFE BAR MOJITOS
CAFE BAR MOJITOSCAFE BAR MOJITOS
CAFE BAR MOJITOS
gigisitab
 
Self driving and connected cars fooling sensors and tracking drivers
Self driving and connected cars fooling sensors and tracking driversSelf driving and connected cars fooling sensors and tracking drivers
Self driving and connected cars fooling sensors and tracking drivers
Vivek chan
 
Realidad virtual inmersiva
Realidad virtual inmersivaRealidad virtual inmersiva
Realidad virtual inmersiva
lmargaritahernandez
 
Pedagogia general i
Pedagogia general iPedagogia general i
Pedagogia general i
Piter Henry Escobar Callejas
 
NuSoap & Test Web Services
NuSoap & Test Web ServicesNuSoap & Test Web Services
NuSoap & Test Web Services
Yesith Valencia
 
Emergence Enterprise Cloud Playbook 2015
Emergence Enterprise Cloud Playbook 2015Emergence Enterprise Cloud Playbook 2015
Emergence Enterprise Cloud Playbook 2015
Emergence Capital
 
Catedrainrtoelearning1 Zaragoza 2009
Catedrainrtoelearning1 Zaragoza 2009Catedrainrtoelearning1 Zaragoza 2009
Catedrainrtoelearning1 Zaragoza 2009
Juan Acevedo Miño
 
Succès Eudec Food | Lifting Group
Succès Eudec Food | Lifting GroupSuccès Eudec Food | Lifting Group

Viewers also liked (19)

Las TIC en La Universidad Nacional Abierta
Las TIC en La Universidad Nacional AbiertaLas TIC en La Universidad Nacional Abierta
Las TIC en La Universidad Nacional Abierta
 
Valores
ValoresValores
Valores
 
Bed In Summer Comm Board
Bed In Summer Comm BoardBed In Summer Comm Board
Bed In Summer Comm Board
 
Common core and its challenge
Common core and its challengeCommon core and its challenge
Common core and its challenge
 
Horário 29fev
Horário 29fevHorário 29fev
Horário 29fev
 
The Roseate Shade(正文)
The Roseate Shade(正文)The Roseate Shade(正文)
The Roseate Shade(正文)
 
Questions and Answers on Shakespeare's the Tempest
Questions and Answers on Shakespeare's the TempestQuestions and Answers on Shakespeare's the Tempest
Questions and Answers on Shakespeare's the Tempest
 
Bed In Summer Poem
Bed In Summer PoemBed In Summer Poem
Bed In Summer Poem
 
La Realidad Aumentada. (RA)
La Realidad Aumentada. (RA)La Realidad Aumentada. (RA)
La Realidad Aumentada. (RA)
 
Anna Resume Grad
Anna Resume GradAnna Resume Grad
Anna Resume Grad
 
El Bolero de Ravel
El Bolero de RavelEl Bolero de Ravel
El Bolero de Ravel
 
CAFE BAR MOJITOS
CAFE BAR MOJITOSCAFE BAR MOJITOS
CAFE BAR MOJITOS
 
Self driving and connected cars fooling sensors and tracking drivers
Self driving and connected cars fooling sensors and tracking driversSelf driving and connected cars fooling sensors and tracking drivers
Self driving and connected cars fooling sensors and tracking drivers
 
Realidad virtual inmersiva
Realidad virtual inmersivaRealidad virtual inmersiva
Realidad virtual inmersiva
 
Pedagogia general i
Pedagogia general iPedagogia general i
Pedagogia general i
 
NuSoap & Test Web Services
NuSoap & Test Web ServicesNuSoap & Test Web Services
NuSoap & Test Web Services
 
Emergence Enterprise Cloud Playbook 2015
Emergence Enterprise Cloud Playbook 2015Emergence Enterprise Cloud Playbook 2015
Emergence Enterprise Cloud Playbook 2015
 
Catedrainrtoelearning1 Zaragoza 2009
Catedrainrtoelearning1 Zaragoza 2009Catedrainrtoelearning1 Zaragoza 2009
Catedrainrtoelearning1 Zaragoza 2009
 
Succès Eudec Food | Lifting Group
Succès Eudec Food | Lifting GroupSuccès Eudec Food | Lifting Group
Succès Eudec Food | Lifting Group
 

Similar to OSI MODEL

Lecture2
Lecture2Lecture2
DCN _ unit 2.pptx
DCN _ unit 2.pptxDCN _ unit 2.pptx
DCN _ unit 2.pptx
ssuser9e1626
 
OSI Model.pptx
OSI Model.pptxOSI Model.pptx
OSI Model.pptx
karmaYonten5
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 
Osi model
Osi model Osi model
Osi model
akshit panchal
 
Osi model and tcpip model.
Osi model and tcpip model.Osi model and tcpip model.
Osi model and tcpip model.
kona paul
 
OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.
City University, Dhaka, Bangladesh
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
Mukesh Tekwani
 
THE OSI MODEL
THE OSI MODEL THE OSI MODEL
THE OSI MODEL
Sayma Sultana
 
Internetworking
InternetworkingInternetworking
InternetworkingRaghu nath
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcpAgrippa Mungazi
 
what is OSI model
what is OSI modelwhat is OSI model
what is OSI model
jeetendra mandal
 
Assignment3
Assignment3Assignment3
Assignment3
MahfujurRahman63
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
DeepVala5
 
OSI Network model ppt
OSI Network model pptOSI Network model ppt
OSI Network model pptextraganesh
 
OSI & TCP model
OSI & TCP modelOSI & TCP model
OSI & TCP model
Nafizul Islam
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi model
Naiyan Noor
 

Similar to OSI MODEL (20)

Lecture2
Lecture2Lecture2
Lecture2
 
Osi model
Osi modelOsi model
Osi model
 
DCN _ unit 2.pptx
DCN _ unit 2.pptxDCN _ unit 2.pptx
DCN _ unit 2.pptx
 
OSI Model.pptx
OSI Model.pptxOSI Model.pptx
OSI Model.pptx
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Osi model
Osi model Osi model
Osi model
 
Osi model and tcpip model.
Osi model and tcpip model.Osi model and tcpip model.
Osi model and tcpip model.
 
OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
THE OSI MODEL
THE OSI MODEL THE OSI MODEL
THE OSI MODEL
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcp
 
what is OSI model
what is OSI modelwhat is OSI model
what is OSI model
 
Assignment3
Assignment3Assignment3
Assignment3
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
OSI Network model ppt
OSI Network model pptOSI Network model ppt
OSI Network model ppt
 
Lecture 05
Lecture 05Lecture 05
Lecture 05
 
OSI & TCP model
OSI & TCP modelOSI & TCP model
OSI & TCP model
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi model
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

OSI MODEL

  • 1. OSI Model OSI MODEL Presented by Duryodhan Mahapatra System Administrator
  • 2. Strategy for connecting host computers and other communicating equipment. Defines necessary elements for data communication between devices. A communication architecture, therefore, defines a standard for the communicating hosts. A programmer formats data in a manner defined by the communication architecture and passes it on to the communication software. Separating communication functions adds flexibility, for example, we do not need to modify the entire host software to include more communication devices. OSI Model
  • 3. Layer architecture simplifies the network design. It is easy to debug network applications in a layered architecture network. The network management is easier due to the layered architecture. Network layers follow a set of rules, called protocol. The protocol defines the format of the data being exchanged, and the control and timing for the handshake between layers. OSI Model
  • 4. International standard organization (ISO) established a committee in 1977 to develop an architecture for computer communication. Open Systems Interconnection (OSI) reference model is the result of this effort. In 1984, the Open Systems Interconnection (OSI) reference model was approved as an international standard for communications architecture. Term “open” denotes the ability to connect any two systems which conform to the reference model and associated standards. OSI Model
  • 5. The OSI model is now considered the primary Architectural model for inter-computer communications. The OSI model describes how information or data makes its way from application programmes (such as spreadsheets) through a network medium (such as wire) to another application programme located on another network. The OSI reference model divides the problem of moving information between computers over a network medium into SEVEN smaller and more manageable problems . This separation into smaller more manageable functions is known as layering. OSI Model
  • 7. The process of breaking up the functions or tasks of networking into layers reduces complexity. Each layer provides a service to the layer above it in the protocol specification. Each layer communicates with the same layer’s software or hardware on other computers. The lower 4 layers (transport, network, data link and physical —Layers 4, 3, 2, and 1) are concerned with the flow of data from end to end through the network. The upper four layers of the OSI model (application, presentation and session—Layers 7, 6 and 5) are orientated more toward services to the applications. Data is Encapsulated with the necessary protocol information as it moves down the layers before network transit. OSI Model
  • 8. Provides physical interface for transmission of information. Defines rules by which bits are passed from one system to another on a physical communication medium. Covers all - mechanical, electrical, functional and procedural - aspects for physical communication. Such characteristics as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors, and other similar attributes are defined by physical layer specifications. OSI Model
  • 9. Data link layer attempts to provide reliable communication over the physical layer interface. Breaks the outgoing data into frames and reassemble the received frames. Create and detect frame boundaries. Handle errors by implementing an acknowledgement and retransmission scheme. Implement flow control. Supports points-to-point as well as broadcast communication. Supports simplex, half-duplex or full-duplex communication. OSI Model
  • 10. Implements routing of frames (packets) through the network. Defines the most optimum path the packet should take from the source to the destination Defines logical addressing so that any endpoint can be identified. Handles congestion in the network. Facilitates interconnection between heterogeneous networks (Internetworking). The network layer also defines how to fragment a packet into smaller packets to accommodate different media. OSI Model
  • 11. Purpose of this layer is to provide a reliable mechanism for the exchange of data between two processes in different computers. Ensures that the data units are delivered error free. Ensures that data units are delivered in sequence. Ensures that there is no loss or duplication of data units. Provides connectionless or connection oriented service. Provides for the connection management. Multiplex multiple connection over a single channel. OSI Model
  • 12. Session layer provides mechanism for controlling the dialogue between the two end systems. It defines how to start, control and end conversations (called sessions) between applications. This layer requests for a logical connection to be established on an end-user’s request. Any necessary log-on or password validation is also handled by this layer. Session layer is also responsible for terminating the connection. This layer provides services like dialogue discipline which can be full duplex or half duplex. Session layer can also provide check-pointing mechanism such that if a failure of some sort occurs between checkpoints, all data can be retransmitted from the last checkpoint. OSI Model
  • 13. Presentation layer defines the format in which the data is to be exchanged between the two communicating entities. Also handles data compression and data encryption (cryptography). OSI Model
  • 14. 1. Application layer interacts with application programs and is the highest level of OSI model. 2. Application layer contains management functions to support distributed applications. 3. Examples of application layer are applications such as file transfer, electronic mail, remote login etc. OSI Model
  • 15. A message begins at the top application layer and moves down the OSI layers to the bottom physical layer. As the message descends, each successive OSI model layer adds a header to it. A header is layer-specific information that basically explains what functions the layer carried out. Conversely, at the receiving end, headers are striped from the message as it travels up the corresponding layers. OSI Model
  • 18. TCP/IP Model Application Layer Application programs using the network Transport Layer (TCP/UDP) Management of end-to-end message transmission, error detection and error correction Network Layer (IP) Handling of datagrams : routing and congestion Data Link Layer Management of cost effective and reliable data delivery, access to physical networks Physical Layer Physical Media Section Layer In Host Communication Section Layer In Host Communication Presentation Layer Data Representation