SlideShare a Scribd company logo
OSI Reference ModelOSI Reference Model
Sayyed sabir shahSayyed sabir shah
Department of technologyDepartment of technology
Sarhad university of information technologySarhad university of information technology
PeshawarPeshawar
The Need For Standards.The Need For Standards.
• Over the past couple of decades many of the networks that
were built used different hardware and software
implementations, as a result:
– They were incompatible and it became difficult for networks using
different specifications to communicate with each other.
• The companies involved in networks development realized
that they needed to move from proprietary networking
system into open system.
• Proprietary systems are privately developed, owned and
controlled.
– Disadvantages are:
• Leads to monopolistic environment.
• Slows down the development of networking products.
• Open system is the opposite of proprietary systems.
– Advantages are:
• Leads to competitive environment.
• Accelerates the development of networking products.
The Need for Standards.The Need for Standards.
• To address the problem of networks being
incompatible and unable to communicate with each
other, the International Organisation for
Standardisation (ISO) created a NETWORK
MODEL.
• This NETWORK MODEL would help the vendor to
create interoperable network implementations.
• This NETWORK MODEL is called OSI Reference
Model.
Layered Tasks.Layered Tasks.
• We use the concept of layerslayers in our daily life.
• As an example, let us consider two friends who
communicate through postal mail.
• The process of sending a letter to a friend would be
complex if there were no services available from the post
office.
• This process of sending mail can be divided into several
phases/activities and each phase/activities is called layer.
Figure.Figure. Tasks involved in sending a letterTasks involved in sending a letter
Hierarchy.Hierarchy.
• In the previous mail communication example, we saw that
three activities were performed at the sender side and
another three activities were preformed at the receiver side.
• The task of transporting the mail between the sender and
receiver is done by the carrier.
• On important thing is that tasks must be done in the order
given in the hierarchy.
– At the sender side, the letter must be written and dropped into the
mailbox before being picked up by the mail carrier and delivered to
the post office.
– At the receiver side, the letter must be dropped in the recipient
mailbox before being picked up and read by the recipient.
The OSI Reference Model.The OSI Reference Model.
• The model was developed by the International Organisation
for Standardisation (ISO) in 1984. It is now considered the
primary architectural model for inter-computer
communications.
• The Open Systems Interconnection (OSI) reference model is
a descriptive network scheme. It ensures greater
compatibility and interoperability between various types of
network technologies.
• The OSI model describes how information or data makes its
way from application programmes (such as spreadsheets)
through a network medium (such as wire) to another
application programme located on another network.
• The OSI reference model divides the problem of moving
information between computers over a network medium into
SEVEN smaller and more manageable problems .
• This separation into smaller more manageable functions is
known as layering.
A Layered Network Model.A Layered Network Model.
• The OSI Reference Model is composed of seven
layers, each specifying particular network functions.
– The process of breaking up the functions or tasks of
networking into layers reduces complexity and makes
learning easier to understand.
– It breaks the network communication into smaller,
simpler parts that are easier to develop.
– It allows different types of hardware and software to
communicate with each other.
– It prevents changes in one layer from affecting the other
layers.
Layers of OSI Reference Model.Layers of OSI Reference Model.
Encapsulation.Encapsulation.
• As the data flows down through the layers in the hierarchy,
each layer adds some extra information to the data in the
form of headers or tailors.
• This process of wrapping data with headers and tailors is
called encapsulation.
• These extra information are added for:
– To enable the opposite corresponding layer to take the right
operation on the data (to facilitate his work).
– To enable the network to transfer the data accurately from the
source to the destination.
• Through these information each layer actually
communicates with the opposite corresponding layer and
this is called peer-to-peer communication.
• At the receiver side De-Encapsulation take place.
Encapsulation.Encapsulation.
Physical Layer.Physical Layer.
• The physical layer performs the functions required to transmit a bit stream
over a physical medium.
• It deals with the mechanical and electrical specification of the transmission
media.
• The major duties performed by physical layer are:
– Physical characteristics of interface and media.
• Defines the characteristics of the interface between the devices and the
transmission media.
• It also defines the type of transmission medium.
– Representation of bits:
• Physical layer receives a steam of bits (sequence of 0s and 1s) without any
interruption.
• To be transmitted, bits must be encoded into a signals – electrical or optical.
• The physical layer defined the type of representation ( how 0s and 1s are changed
into signals).
– Data rate:
• The transmission rate – the number of bit per second- is also defined by the
physical layer.
• Repeater is a device of the physical layer.
• Physical layer protocols are encoding techniques (RZ, NRZ, Manchester etc).
Physical Layer.
Data Link Layer.Data Link Layer.
• The data link layer is responsible for moving frames from
one hop (node) to the next.
• The major duties of the data link layer are:
– Framing:
• The data link layer divides the stream of bits steam from the network
layer into manageable data units called frames.
– Physical addressing:
• If frame is to be distributed to different systems on the network, the
data link layer adds a header to the frame to define the sender and
receiver of the frame.
• Physical address is the MAC address, which is hard coded into NIC
and is of 48-bit represented by Hexadecimal format.
– Flow control:
• If the rate at which the data are absorbed by the receiver is less than the
rate produced in the sender, the data link layer imposes a flow control
mechanism to prevent overwhelming the receiver.
Data Link Layer.Data Link Layer.
– Error control:
• The data link layer adds reliability to the physical layer by adding
mechanism to detect and retransmit damaged or lost frames.
• It also uses a mechanism to prevent duplication of frames.
• Error control is normally achieved through a trailer added to the end of
the frame.
– Access control:
• The data link layer protocol has to determine that how to get access to
the link in case when two or more devices are connected to the same
link.
• The PDU of the data link layer is called frame.
• Data Link layer protocols are CSMA/CD, CSMA/CA,
Token Passing etc.
Node-to-Node Delivery.
Data Link Layer.
Network Layer.Network Layer.
• The network layer is responsible for the source -to-
destination delivery of a packet possibly across
multiple networks.
– It two systems are connected to the same link, there is
usually no need for a network layer.
– However, if the two systems are attached to different
networks with connecting devices between the networks,
there is need for the network layer to accomplish the
delivery.
• The major duties performed by the network layer
are:
Network Layer.Network Layer.
– Logical addressing:
• The physical addressing implemented by the data link layer handles the
addressing problem locally.
• If a packet passes the network boundary, we need another addressing
system to perform the source and destination delivery.
• The network layer adds a header to the segment received from the
transport layer containing the logical addresses of the sender and
receiver.
• Logical address is also called IP address which is of 32-bits and
represented in decimal format.
– Routing:
• To route the packets from the source to destination in an internetwork,
the router uses network layer information.
• The PDU of network layer is called packet.
• Network layer protocols are IP, IPX, AppleTalk.
Network Layer.Network Layer.
Source-to-Destination Delivery.Source-to-Destination Delivery.
Transport Layer.Transport Layer.
• The transport layer is responsible for process-to-process
delivery of the entire message.
• The major duties performed by the transport layer are:
– Port address:
• Computers often running several processes (running programs) at the
same time:
• Each running process open a logical port on the computer.
• The transport layer header must therefore include a type of address
called port address.
• The network layer gets each packet to the correct computer, the
transport layer get the entire message to the correct process on that
computer.
– Segmentation and reassembly:
• A message received form the upper layers is divided into transmittable
segments, each segment contains a sequence number.
• These number enables the transport layer to reassemble the message
correctly upon arrival at the destination and to identify and replace
packets that were lost in the transmission.
Transport Layer.Transport Layer.
– Connection Control:
• The transport layer can be either connectionless or connection
oriented.
• A connection oriented transport layer makes a logical connection with
the transport layer at the destination machine first before delivering the
packets.
• After all the data are transferred, the connection is terminated.
– Flow control:
• Like data link layer, the transport layer is resposnsible for flow control.
• However, flow control at this layer is performed end to end rather than
across a single link (Hop-to-Hop).
– Error control:
• Like data link layer, the transport layer is responsible for error control.
• However, error control at this layer is performed end to end rather than
across a single link (Hop-to-Hop).
• Transport layer 4 protocols include TCP (Transmission
Control Protocol) and UDP (User Datagram Protocol).
Transport Layer.Transport Layer.
Reliable Process-to-Process Delivery.Reliable Process-to-Process Delivery.
Session Layer.Session Layer.
• The session layer defines how to establish, maintaining and
terminates session between two communication hosts.
• The major duties of the session layer are:
– Synchronization:
• For lengthy transaction (file transfer), the user may choose to establish
synchronization points associated with the transfer. If a fault develops
during a transaction, the dialog may be restarted at an agreed
synchronization point.
– Dialog control:
• Session layer determines that which role is to be played at any given
time by a host.
– Duplex: Two-way simultaneous.
– Half-Duplex: Two-way alternate.
– Simplex: One-way.
• Session layer protocols are SQL, ASP(AppleTalk Session
Protocol), Remote Procedure Call (RPC), X Window
System.
Session Layer.Session Layer.
Presentation Layer.Presentation Layer.
• The presentation layer ensures that the information that the
application layer of one system sends out is readable by the
application layer of another system.
• The major duties of the presentation layer are:
– Format conversion:
• Convert message from one format into another format .i.e. for ASCII
to EBCEDIC or vice versa.
– Compression.
• Compress the message to take less bandwidth on the transmission
media and less time for transmission.
– Encryption:
• Convert the message into a form that will not be readable by others.
• Provides security to the message.
• Protocols of the presentation layer are JPEG, MPEG, ASCII,
EBCDIC etc.
Presentation Layer.Presentation Layer.
Application Layer.Application Layer.
• The application layer is the OSI layer that is closest to the
user.
• It provides network services to the user’s applications (.i.e.
spreadsheet etc).
• The major duties are:
– Mail service:
• It provides network services for the email application.
– File transfer and Access:
• It provides network services for a user to access files on a remote
computer, to retrieve files from a remote computer for use in the local
computer and to manage or control files in a remote computer locally.
– World Wide Web:
• It provides network services to access the World Wide Web.
Application Layer.Application Layer.
Summary.Summary.
• There was no standard for networks in the early days and as a result it was
difficult for networks to communicate with each other.
• The International Organisation for Standardisation (ISO) recognised this.
and researched various network schemes, and in 1984 introduced the Open
Systems Interconnection (OSI) reference model.
• The OSI reference model has standards which ensure vendors greater
compatibility and interoperability between various types of network
technologies.
• The OSI reference model organizes network functions into seven
numbered layers.
• Each layer provides a service to the layer above it in the protocol
specification and communicates with the same layer’s software or
hardware on other computers.
Summary of the Layers.Summary of the Layers.

More Related Content

What's hot

Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
Siddique Ibrahim
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
Krishnkant Pandey
 
Computer network (Lecture 1)
Computer network (Lecture 1)Computer network (Lecture 1)
Computer network (Lecture 1)Vishwajit Nandi
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
Satyam Jaiswal
 
Osi model
Osi modelOsi model
Osi model
Online
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49myrajendra
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
قصي نسور
 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
Mohd. Ahmad Siddiqi
 
Data link control protocol(1)
Data link control protocol(1)Data link control protocol(1)
Data link control protocol(1)
Jeffrey Des Binwag
 
Application Layer
Application Layer Application Layer
Application Layer
Dr Shashikant Athawale
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
Harish Chand
 
Transport layer
Transport layer Transport layer
Transport layer
Mukesh Chinta
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
hoanv
 
Tcp ip
Tcp ipTcp ip
Tcp ip
Dhani Ahmad
 
Frame relay
Frame relayFrame relay
Frame relay
Ayesha Maqsood
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
Mukesh Tekwani
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
Rubal Sagwal
 

What's hot (20)

Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
Computer network (Lecture 1)
Computer network (Lecture 1)Computer network (Lecture 1)
Computer network (Lecture 1)
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
Osi model
Osi modelOsi model
Osi model
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
 
Data link control protocol(1)
Data link control protocol(1)Data link control protocol(1)
Data link control protocol(1)
 
Application Layer
Application Layer Application Layer
Application Layer
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 
Transport layer
Transport layer Transport layer
Transport layer
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Frame relay
Frame relayFrame relay
Frame relay
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
introduction about TCP/IP
introduction about TCP/IPintroduction about TCP/IP
introduction about TCP/IP
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
 

Similar to Osi model

06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
ssuserf7cd2b
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
ssuserf7cd2b
 
Dc2 t1
Dc2 t1Dc2 t1
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
Nayan Sarma
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
183JAIDEEP
 
OSI Model.pdf
OSI Model.pdfOSI Model.pdf
OSI Model.pdf
Madhumitha Jayaram
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
MosesOkumu4
 
Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Ammar Shafiq
 
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptx
Kaythry P
 
Chap 2 network models
Chap 2 network modelsChap 2 network models
Chap 2 network models
Mukesh Tekwani
 
Client Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxClient Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptx
DevChaudhari17
 
Basics of Ethernet
Basics of Ethernet Basics of Ethernet
Basics of Ethernet
Pushpa Yakkala
 
OSI Model.ppt
OSI Model.pptOSI Model.ppt
OSI Model.ppt
ShantanuBhushanMishr
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and models
shahin raj
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
Tutun Juhana
 
ch5-osi.pdf
ch5-osi.pdfch5-osi.pdf
ch5-osi.pdf
ssuserc8e1481
 
Networking basics
Networking basicsNetworking basics
Networking basics
Vadiraj Jahagirdar
 
tcpiposi.pptx
tcpiposi.pptxtcpiposi.pptx
tcpiposi.pptx
JustinMathew73
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
Zakirul Islam
 

Similar to Osi model (20)

06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
Dc2 t1
Dc2 t1Dc2 t1
Dc2 t1
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
OSI Model.pdf
OSI Model.pdfOSI Model.pdf
OSI Model.pdf
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
 
Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)
 
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptx
 
Chap 2 network models
Chap 2 network modelsChap 2 network models
Chap 2 network models
 
Client Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxClient Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptx
 
Basics of Ethernet
Basics of Ethernet Basics of Ethernet
Basics of Ethernet
 
OSI Model.ppt
OSI Model.pptOSI Model.ppt
OSI Model.ppt
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and models
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
 
ch5-osi.pdf
ch5-osi.pdfch5-osi.pdf
ch5-osi.pdf
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
tcpiposi.pptx
tcpiposi.pptxtcpiposi.pptx
tcpiposi.pptx
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 

More from sayyed sabir

Workbreakdownstructureppt 130410021152-phpapp02
Workbreakdownstructureppt 130410021152-phpapp02Workbreakdownstructureppt 130410021152-phpapp02
Workbreakdownstructureppt 130410021152-phpapp02
sayyed sabir
 
Automatic door using arduino
Automatic door using arduinoAutomatic door using arduino
Automatic door using arduino
sayyed sabir
 
Importance of coal water slurry
Importance of coal water slurryImportance of coal water slurry
Importance of coal water slurry
sayyed sabir
 
(Week 15)
(Week 15)(Week 15)
(Week 15)
sayyed sabir
 
(Week 14)
(Week 14)(Week 14)
(Week 14)
sayyed sabir
 
(Week 13)
(Week 13)(Week 13)
(Week 13)
sayyed sabir
 
(Week 12)
(Week 12)(Week 12)
(Week 12)
sayyed sabir
 
(Week 11)
(Week 11)(Week 11)
(Week 11)
sayyed sabir
 
(Week 10)
(Week 10)(Week 10)
(Week 10)
sayyed sabir
 
(Week 9)
(Week 9)(Week 9)
(Week 9)
sayyed sabir
 
(Week 8)
(Week 8)(Week 8)
(Week 8)
sayyed sabir
 
(Week 7)
(Week 7)(Week 7)
(Week 7)
sayyed sabir
 
(Week 6)
(Week 6)(Week 6)
(Week 6)
sayyed sabir
 
(Week 5)
(Week 5)(Week 5)
(Week 5)
sayyed sabir
 
(Week 4)
(Week 4)(Week 4)
(Week 4)
sayyed sabir
 
(Week 3)
(Week 3)(Week 3)
(Week 3)
sayyed sabir
 
(Week 2)
(Week 2)(Week 2)
(Week 2)
sayyed sabir
 
(Week 1)
(Week 1)(Week 1)
(Week 1)
sayyed sabir
 
Transmission modes
Transmission modesTransmission modes
Transmission modes
sayyed sabir
 
Ch3 4 v1
Ch3 4 v1Ch3 4 v1
Ch3 4 v1
sayyed sabir
 

More from sayyed sabir (20)

Workbreakdownstructureppt 130410021152-phpapp02
Workbreakdownstructureppt 130410021152-phpapp02Workbreakdownstructureppt 130410021152-phpapp02
Workbreakdownstructureppt 130410021152-phpapp02
 
Automatic door using arduino
Automatic door using arduinoAutomatic door using arduino
Automatic door using arduino
 
Importance of coal water slurry
Importance of coal water slurryImportance of coal water slurry
Importance of coal water slurry
 
(Week 15)
(Week 15)(Week 15)
(Week 15)
 
(Week 14)
(Week 14)(Week 14)
(Week 14)
 
(Week 13)
(Week 13)(Week 13)
(Week 13)
 
(Week 12)
(Week 12)(Week 12)
(Week 12)
 
(Week 11)
(Week 11)(Week 11)
(Week 11)
 
(Week 10)
(Week 10)(Week 10)
(Week 10)
 
(Week 9)
(Week 9)(Week 9)
(Week 9)
 
(Week 8)
(Week 8)(Week 8)
(Week 8)
 
(Week 7)
(Week 7)(Week 7)
(Week 7)
 
(Week 6)
(Week 6)(Week 6)
(Week 6)
 
(Week 5)
(Week 5)(Week 5)
(Week 5)
 
(Week 4)
(Week 4)(Week 4)
(Week 4)
 
(Week 3)
(Week 3)(Week 3)
(Week 3)
 
(Week 2)
(Week 2)(Week 2)
(Week 2)
 
(Week 1)
(Week 1)(Week 1)
(Week 1)
 
Transmission modes
Transmission modesTransmission modes
Transmission modes
 
Ch3 4 v1
Ch3 4 v1Ch3 4 v1
Ch3 4 v1
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Osi model

  • 1. OSI Reference ModelOSI Reference Model Sayyed sabir shahSayyed sabir shah Department of technologyDepartment of technology Sarhad university of information technologySarhad university of information technology PeshawarPeshawar
  • 2. The Need For Standards.The Need For Standards. • Over the past couple of decades many of the networks that were built used different hardware and software implementations, as a result: – They were incompatible and it became difficult for networks using different specifications to communicate with each other. • The companies involved in networks development realized that they needed to move from proprietary networking system into open system. • Proprietary systems are privately developed, owned and controlled. – Disadvantages are: • Leads to monopolistic environment. • Slows down the development of networking products. • Open system is the opposite of proprietary systems. – Advantages are: • Leads to competitive environment. • Accelerates the development of networking products.
  • 3. The Need for Standards.The Need for Standards. • To address the problem of networks being incompatible and unable to communicate with each other, the International Organisation for Standardisation (ISO) created a NETWORK MODEL. • This NETWORK MODEL would help the vendor to create interoperable network implementations. • This NETWORK MODEL is called OSI Reference Model.
  • 4. Layered Tasks.Layered Tasks. • We use the concept of layerslayers in our daily life. • As an example, let us consider two friends who communicate through postal mail. • The process of sending a letter to a friend would be complex if there were no services available from the post office. • This process of sending mail can be divided into several phases/activities and each phase/activities is called layer.
  • 5. Figure.Figure. Tasks involved in sending a letterTasks involved in sending a letter
  • 6. Hierarchy.Hierarchy. • In the previous mail communication example, we saw that three activities were performed at the sender side and another three activities were preformed at the receiver side. • The task of transporting the mail between the sender and receiver is done by the carrier. • On important thing is that tasks must be done in the order given in the hierarchy. – At the sender side, the letter must be written and dropped into the mailbox before being picked up by the mail carrier and delivered to the post office. – At the receiver side, the letter must be dropped in the recipient mailbox before being picked up and read by the recipient.
  • 7. The OSI Reference Model.The OSI Reference Model. • The model was developed by the International Organisation for Standardisation (ISO) in 1984. It is now considered the primary architectural model for inter-computer communications. • The Open Systems Interconnection (OSI) reference model is a descriptive network scheme. It ensures greater compatibility and interoperability between various types of network technologies. • The OSI model describes how information or data makes its way from application programmes (such as spreadsheets) through a network medium (such as wire) to another application programme located on another network. • The OSI reference model divides the problem of moving information between computers over a network medium into SEVEN smaller and more manageable problems . • This separation into smaller more manageable functions is known as layering.
  • 8. A Layered Network Model.A Layered Network Model. • The OSI Reference Model is composed of seven layers, each specifying particular network functions. – The process of breaking up the functions or tasks of networking into layers reduces complexity and makes learning easier to understand. – It breaks the network communication into smaller, simpler parts that are easier to develop. – It allows different types of hardware and software to communicate with each other. – It prevents changes in one layer from affecting the other layers.
  • 9. Layers of OSI Reference Model.Layers of OSI Reference Model.
  • 10. Encapsulation.Encapsulation. • As the data flows down through the layers in the hierarchy, each layer adds some extra information to the data in the form of headers or tailors. • This process of wrapping data with headers and tailors is called encapsulation. • These extra information are added for: – To enable the opposite corresponding layer to take the right operation on the data (to facilitate his work). – To enable the network to transfer the data accurately from the source to the destination. • Through these information each layer actually communicates with the opposite corresponding layer and this is called peer-to-peer communication. • At the receiver side De-Encapsulation take place.
  • 12. Physical Layer.Physical Layer. • The physical layer performs the functions required to transmit a bit stream over a physical medium. • It deals with the mechanical and electrical specification of the transmission media. • The major duties performed by physical layer are: – Physical characteristics of interface and media. • Defines the characteristics of the interface between the devices and the transmission media. • It also defines the type of transmission medium. – Representation of bits: • Physical layer receives a steam of bits (sequence of 0s and 1s) without any interruption. • To be transmitted, bits must be encoded into a signals – electrical or optical. • The physical layer defined the type of representation ( how 0s and 1s are changed into signals). – Data rate: • The transmission rate – the number of bit per second- is also defined by the physical layer. • Repeater is a device of the physical layer. • Physical layer protocols are encoding techniques (RZ, NRZ, Manchester etc).
  • 14. Data Link Layer.Data Link Layer. • The data link layer is responsible for moving frames from one hop (node) to the next. • The major duties of the data link layer are: – Framing: • The data link layer divides the stream of bits steam from the network layer into manageable data units called frames. – Physical addressing: • If frame is to be distributed to different systems on the network, the data link layer adds a header to the frame to define the sender and receiver of the frame. • Physical address is the MAC address, which is hard coded into NIC and is of 48-bit represented by Hexadecimal format. – Flow control: • If the rate at which the data are absorbed by the receiver is less than the rate produced in the sender, the data link layer imposes a flow control mechanism to prevent overwhelming the receiver.
  • 15. Data Link Layer.Data Link Layer. – Error control: • The data link layer adds reliability to the physical layer by adding mechanism to detect and retransmit damaged or lost frames. • It also uses a mechanism to prevent duplication of frames. • Error control is normally achieved through a trailer added to the end of the frame. – Access control: • The data link layer protocol has to determine that how to get access to the link in case when two or more devices are connected to the same link. • The PDU of the data link layer is called frame. • Data Link layer protocols are CSMA/CD, CSMA/CA, Token Passing etc.
  • 18. Network Layer.Network Layer. • The network layer is responsible for the source -to- destination delivery of a packet possibly across multiple networks. – It two systems are connected to the same link, there is usually no need for a network layer. – However, if the two systems are attached to different networks with connecting devices between the networks, there is need for the network layer to accomplish the delivery. • The major duties performed by the network layer are:
  • 19. Network Layer.Network Layer. – Logical addressing: • The physical addressing implemented by the data link layer handles the addressing problem locally. • If a packet passes the network boundary, we need another addressing system to perform the source and destination delivery. • The network layer adds a header to the segment received from the transport layer containing the logical addresses of the sender and receiver. • Logical address is also called IP address which is of 32-bits and represented in decimal format. – Routing: • To route the packets from the source to destination in an internetwork, the router uses network layer information. • The PDU of network layer is called packet. • Network layer protocols are IP, IPX, AppleTalk.
  • 22. Transport Layer.Transport Layer. • The transport layer is responsible for process-to-process delivery of the entire message. • The major duties performed by the transport layer are: – Port address: • Computers often running several processes (running programs) at the same time: • Each running process open a logical port on the computer. • The transport layer header must therefore include a type of address called port address. • The network layer gets each packet to the correct computer, the transport layer get the entire message to the correct process on that computer. – Segmentation and reassembly: • A message received form the upper layers is divided into transmittable segments, each segment contains a sequence number. • These number enables the transport layer to reassemble the message correctly upon arrival at the destination and to identify and replace packets that were lost in the transmission.
  • 23. Transport Layer.Transport Layer. – Connection Control: • The transport layer can be either connectionless or connection oriented. • A connection oriented transport layer makes a logical connection with the transport layer at the destination machine first before delivering the packets. • After all the data are transferred, the connection is terminated. – Flow control: • Like data link layer, the transport layer is resposnsible for flow control. • However, flow control at this layer is performed end to end rather than across a single link (Hop-to-Hop). – Error control: • Like data link layer, the transport layer is responsible for error control. • However, error control at this layer is performed end to end rather than across a single link (Hop-to-Hop). • Transport layer 4 protocols include TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).
  • 25. Reliable Process-to-Process Delivery.Reliable Process-to-Process Delivery.
  • 26. Session Layer.Session Layer. • The session layer defines how to establish, maintaining and terminates session between two communication hosts. • The major duties of the session layer are: – Synchronization: • For lengthy transaction (file transfer), the user may choose to establish synchronization points associated with the transfer. If a fault develops during a transaction, the dialog may be restarted at an agreed synchronization point. – Dialog control: • Session layer determines that which role is to be played at any given time by a host. – Duplex: Two-way simultaneous. – Half-Duplex: Two-way alternate. – Simplex: One-way. • Session layer protocols are SQL, ASP(AppleTalk Session Protocol), Remote Procedure Call (RPC), X Window System.
  • 28. Presentation Layer.Presentation Layer. • The presentation layer ensures that the information that the application layer of one system sends out is readable by the application layer of another system. • The major duties of the presentation layer are: – Format conversion: • Convert message from one format into another format .i.e. for ASCII to EBCEDIC or vice versa. – Compression. • Compress the message to take less bandwidth on the transmission media and less time for transmission. – Encryption: • Convert the message into a form that will not be readable by others. • Provides security to the message. • Protocols of the presentation layer are JPEG, MPEG, ASCII, EBCDIC etc.
  • 30. Application Layer.Application Layer. • The application layer is the OSI layer that is closest to the user. • It provides network services to the user’s applications (.i.e. spreadsheet etc). • The major duties are: – Mail service: • It provides network services for the email application. – File transfer and Access: • It provides network services for a user to access files on a remote computer, to retrieve files from a remote computer for use in the local computer and to manage or control files in a remote computer locally. – World Wide Web: • It provides network services to access the World Wide Web.
  • 32. Summary.Summary. • There was no standard for networks in the early days and as a result it was difficult for networks to communicate with each other. • The International Organisation for Standardisation (ISO) recognised this. and researched various network schemes, and in 1984 introduced the Open Systems Interconnection (OSI) reference model. • The OSI reference model has standards which ensure vendors greater compatibility and interoperability between various types of network technologies. • The OSI reference model organizes network functions into seven numbered layers. • Each layer provides a service to the layer above it in the protocol specification and communicates with the same layer’s software or hardware on other computers.
  • 33. Summary of the Layers.Summary of the Layers.