SlideShare a Scribd company logo
What is the OSI model? Network Architecture and Analysis Professor Peter Fall 2009 Kersey Lambert
Physical Layer Information is carried over wires as bits (1’s and 0’s) and converted into electrical pulses. This layer handles the physical connections within the computer and from terminal to terminal and completes no error checking.
OSI Model OSI stands for Open Systems Interconnection. There are seven layers in the OSI Model, as seen in this diagram. http://www.novell.com/info/primer/prim05.html   It was widely adopted because it offers a high level of interoperability. OSI stands for Open Systems Interconnection. There are seven layers in the OSI Model, as seen in this diagram. It was widely adopted because it offers a high level of interoperability. OSI stands for Open Systems Interconnection. There are seven layers in the OSI Model, as seen in this diagram. It was widely adopted because it offers a high level of interoperability. OSI stands for Open Systems Interconnection. There are seven layers in the OSI Model, as seen in this diagram. http://www.novell.com/info/primer/prim05.html   It was widely adopted because it offers a high level of interoperability. OSI stands for Open Systems Interconnection. There are seven layers in the OSI Model, as seen in this diagram. http://www.novell.com/info/primer/prim05.html
Data Link Layer Headers and trailers are added to create frames which allow the computer to know where frames begin and end. No data is interpreted, only encapsulated for the network layer. Packets are checked for errors at this layer.
Network Layer Receives segmented data, adds logical addressing information, and creates packets. This layer handles virtual connections throughout the network and between other networks. Routes and relays data between nodes. IP-Internet Protocol is the standard used to connect networks.
Transport Layer Maximum transmission units are determined here. If units are too large, they are segmented with sequence identifiers.  Ensures that packet arrive complete and in the correct sequence. This layer also contains checksum, flow control and acknowledgement data.
Session Layer PDU’s are received, transmission speed is detected, and a session header is added. TCP-Transmission Control Protocol functions at this layer. This layer “establishes, manages, and terminates sessions between applications” (Novell’s networking primer, 2009). Sessions are dialogues between presentation layers of sending and receiving computers.
Presentation Layer Information is encrypted, as needed, and PDU’s (Protocol Data Units) are sent through. FTAM-File Transfer, Access, and Management and VTP-Virtual Terminal Protocol are part of this layer. Developed by DoD as part of the TCP/IP suite of protocols (Novell’s network primer, 2009). This layer “converts incoming and outgoing data from one presentation format to another” (Novell’s networking primer, 2009).
Application Layer This layer uses FTP-File Transport Protocol, Telnet, HTTP-Hypertext Transfer Protocol, and SMTP-Simple Mail Transfer Protocol. This layer “performs high-level services such as making sure necessary resources are present…and authenticating users when appropriate” (Novell’s networking primer, 2009). Processes requests and transfers them down through the layers and across the network.

More Related Content

What's hot

Network standards & protocols
Network standards & protocolsNetwork standards & protocols
Network standards & protocols
Jaleel James
 
OSI Model
OSI ModelOSI Model
Osi protocols
Osi protocolsOsi protocols
Osi protocols
Ali Usman
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
Siddique Ibrahim
 
Chapter02 -- networking standards and the osi model
Chapter02  -- networking standards and the osi modelChapter02  -- networking standards and the osi model
Chapter02 -- networking standards and the osi model
Raja Waseem Akhtar
 
COMPUTER NETWORK TOPOLOGY
COMPUTER NETWORK TOPOLOGY COMPUTER NETWORK TOPOLOGY
COMPUTER NETWORK TOPOLOGY
Sayma Sultana
 
Osi reference model
Osi reference modelOsi reference model
Osi model
Osi modelOsi model
Osi model
sayyed sabir
 
Lecture2
Lecture2Lecture2
Lecture2
Vedpal Yadav
 
The OSI model and TCP/IP
The OSI model and TCP/IPThe OSI model and TCP/IP
The OSI model and TCP/IP
Yohniki Gordon
 
Lecture2
Lecture2Lecture2
Lecture2
AMITHEMBRAM
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
Jhoniel Viloria
 
OSI MODEL
    OSI MODEL    OSI MODEL
OSI MODEL
Ujjwal 'Shanu'
 
7 layer OSI model
7 layer OSI model7 layer OSI model
7 layer OSI model
penetration Tester
 
Introduction to Networking and OSI Model
Introduction to Networking and OSI ModelIntroduction to Networking and OSI Model
Introduction to Networking and OSI Model
KawtharAlsharah
 
Osi
OsiOsi
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
chandrakant Mallick
 
Osi model(open system interconnection)
Osi model(open system interconnection)Osi model(open system interconnection)
Osi model(open system interconnection)
Dipu Thomas joy
 
Osi models
Osi modelsOsi models
Osi models
sivasarah
 
The ISO_OSI Reference Model
The ISO_OSI Reference ModelThe ISO_OSI Reference Model
The ISO_OSI Reference Model
Vishnu Vardhan
 

What's hot (20)

Network standards & protocols
Network standards & protocolsNetwork standards & protocols
Network standards & protocols
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Osi protocols
Osi protocolsOsi protocols
Osi protocols
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
Chapter02 -- networking standards and the osi model
Chapter02  -- networking standards and the osi modelChapter02  -- networking standards and the osi model
Chapter02 -- networking standards and the osi model
 
COMPUTER NETWORK TOPOLOGY
COMPUTER NETWORK TOPOLOGY COMPUTER NETWORK TOPOLOGY
COMPUTER NETWORK TOPOLOGY
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Osi model
Osi modelOsi model
Osi model
 
Lecture2
Lecture2Lecture2
Lecture2
 
The OSI model and TCP/IP
The OSI model and TCP/IPThe OSI model and TCP/IP
The OSI model and TCP/IP
 
Lecture2
Lecture2Lecture2
Lecture2
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
 
OSI MODEL
    OSI MODEL    OSI MODEL
OSI MODEL
 
7 layer OSI model
7 layer OSI model7 layer OSI model
7 layer OSI model
 
Introduction to Networking and OSI Model
Introduction to Networking and OSI ModelIntroduction to Networking and OSI Model
Introduction to Networking and OSI Model
 
Osi
OsiOsi
Osi
 
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
 
Osi model(open system interconnection)
Osi model(open system interconnection)Osi model(open system interconnection)
Osi model(open system interconnection)
 
Osi models
Osi modelsOsi models
Osi models
 
The ISO_OSI Reference Model
The ISO_OSI Reference ModelThe ISO_OSI Reference Model
The ISO_OSI Reference Model
 

Viewers also liked

Sadarah sal-004.. كيفية توعية الفئات المستهدفة بأضرار المخدرات.. عرض
Sadarah sal-004.. كيفية توعية الفئات المستهدفة بأضرار المخدرات.. عرضSadarah sal-004.. كيفية توعية الفئات المستهدفة بأضرار المخدرات.. عرض
Sadarah sal-004.. كيفية توعية الفئات المستهدفة بأضرار المخدرات.. عرض
Abdullah Ali
 
Sadarah 5th-008.. تفضيلات العميل.. عرض
Sadarah 5th-008.. تفضيلات العميل.. عرضSadarah 5th-008.. تفضيلات العميل.. عرض
Sadarah 5th-008.. تفضيلات العميل.. عرض
Abdullah Ali
 
Sadarah 5th-015.. الزيارة الفعّالة.. عرض
Sadarah 5th-015.. الزيارة الفعّالة.. عرضSadarah 5th-015.. الزيارة الفعّالة.. عرض
Sadarah 5th-015.. الزيارة الفعّالة.. عرض
Abdullah Ali
 
CTSO Advocacy: Oregon Success Story
CTSO Advocacy: Oregon Success StoryCTSO Advocacy: Oregon Success Story
CTSO Advocacy: Oregon Success Story
TRI Leadership Resources
 
أبعاد صور الشبكة الاجتماعية.. صور
أبعاد صور الشبكة الاجتماعية.. صورأبعاد صور الشبكة الاجتماعية.. صور
أبعاد صور الشبكة الاجتماعية.. صور
Abdullah Ali
 
Sadarah 5th-024.. 5 قواعد تربوية.. للمستثمر الصغير.. عرض
Sadarah 5th-024.. 5 قواعد تربوية.. للمستثمر الصغير.. عرضSadarah 5th-024.. 5 قواعد تربوية.. للمستثمر الصغير.. عرض
Sadarah 5th-024.. 5 قواعد تربوية.. للمستثمر الصغير.. عرض
Abdullah Ali
 
Sadarah 5th-014.. أساس الصفقات الناجحة.. عرض
Sadarah 5th-014.. أساس الصفقات الناجحة..  عرضSadarah 5th-014.. أساس الصفقات الناجحة..  عرض
Sadarah 5th-014.. أساس الصفقات الناجحة.. عرض
Abdullah Ali
 
Interview Success
Interview SuccessInterview Success
FBLA-PBL History: Celebrating 70 Years!
FBLA-PBL History: Celebrating 70 Years!FBLA-PBL History: Celebrating 70 Years!
FBLA-PBL History: Celebrating 70 Years!
TRI Leadership Resources
 
Social Media Club Southwest Florida Kick Off Event
Social Media Club Southwest Florida  Kick  Off  EventSocial Media Club Southwest Florida  Kick  Off  Event
Social Media Club Southwest Florida Kick Off Event
Michele Lorito-Chase
 
10 22 K Va Features & Benefits(Gb)
10   22 K Va Features & Benefits(Gb)10   22 K Va Features & Benefits(Gb)
10 22 K Va Features & Benefits(Gb)
guest0e09bf6
 
Reflexivos
ReflexivosReflexivos
Reflexivos
Angela Bonds
 
Psg10 Cug En
Psg10 Cug EnPsg10 Cug En
Psg10 Cug En
guestb1326
 
Digital Divide
Digital DivideDigital Divide
Digital Divide
srikanth26
 
Sadarah 5th-012.. تنظيم الملتقيات.. عرض
Sadarah 5th-012.. تنظيم الملتقيات.. عرضSadarah 5th-012.. تنظيم الملتقيات.. عرض
Sadarah 5th-012.. تنظيم الملتقيات.. عرض
Abdullah Ali
 
خوارزميات صدارة.. الجودة في التسويق.. مختصر العرض.. عرض
خوارزميات صدارة.. الجودة في التسويق.. مختصر العرض.. عرضخوارزميات صدارة.. الجودة في التسويق.. مختصر العرض.. عرض
خوارزميات صدارة.. الجودة في التسويق.. مختصر العرض.. عرض
Abdullah Ali
 
MARTA,SEILA,ESTELA ETA ADUR
MARTA,SEILA,ESTELA ETA ADURMARTA,SEILA,ESTELA ETA ADUR
MARTA,SEILA,ESTELA ETA ADURsheila1033
 
Social Capital Inside The Enterprise Is08
Social Capital Inside The Enterprise Is08Social Capital Inside The Enterprise Is08
Social Capital Inside The Enterprise Is08
GoLab Austin
 

Viewers also liked (20)

Sadarah sal-004.. كيفية توعية الفئات المستهدفة بأضرار المخدرات.. عرض
Sadarah sal-004.. كيفية توعية الفئات المستهدفة بأضرار المخدرات.. عرضSadarah sal-004.. كيفية توعية الفئات المستهدفة بأضرار المخدرات.. عرض
Sadarah sal-004.. كيفية توعية الفئات المستهدفة بأضرار المخدرات.. عرض
 
Sadarah 5th-008.. تفضيلات العميل.. عرض
Sadarah 5th-008.. تفضيلات العميل.. عرضSadarah 5th-008.. تفضيلات العميل.. عرض
Sadarah 5th-008.. تفضيلات العميل.. عرض
 
Sadarah 5th-015.. الزيارة الفعّالة.. عرض
Sadarah 5th-015.. الزيارة الفعّالة.. عرضSadarah 5th-015.. الزيارة الفعّالة.. عرض
Sadarah 5th-015.. الزيارة الفعّالة.. عرض
 
CTSO Advocacy: Oregon Success Story
CTSO Advocacy: Oregon Success StoryCTSO Advocacy: Oregon Success Story
CTSO Advocacy: Oregon Success Story
 
أبعاد صور الشبكة الاجتماعية.. صور
أبعاد صور الشبكة الاجتماعية.. صورأبعاد صور الشبكة الاجتماعية.. صور
أبعاد صور الشبكة الاجتماعية.. صور
 
Sadarah 5th-024.. 5 قواعد تربوية.. للمستثمر الصغير.. عرض
Sadarah 5th-024.. 5 قواعد تربوية.. للمستثمر الصغير.. عرضSadarah 5th-024.. 5 قواعد تربوية.. للمستثمر الصغير.. عرض
Sadarah 5th-024.. 5 قواعد تربوية.. للمستثمر الصغير.. عرض
 
Sadarah 5th-014.. أساس الصفقات الناجحة.. عرض
Sadarah 5th-014.. أساس الصفقات الناجحة..  عرضSadarah 5th-014.. أساس الصفقات الناجحة..  عرض
Sadarah 5th-014.. أساس الصفقات الناجحة.. عرض
 
Interview Success
Interview SuccessInterview Success
Interview Success
 
FBLA-PBL History: Celebrating 70 Years!
FBLA-PBL History: Celebrating 70 Years!FBLA-PBL History: Celebrating 70 Years!
FBLA-PBL History: Celebrating 70 Years!
 
Social Media Club Southwest Florida Kick Off Event
Social Media Club Southwest Florida  Kick  Off  EventSocial Media Club Southwest Florida  Kick  Off  Event
Social Media Club Southwest Florida Kick Off Event
 
10 22 K Va Features & Benefits(Gb)
10   22 K Va Features & Benefits(Gb)10   22 K Va Features & Benefits(Gb)
10 22 K Va Features & Benefits(Gb)
 
Ballagás2015
Ballagás2015Ballagás2015
Ballagás2015
 
Reflexivos
ReflexivosReflexivos
Reflexivos
 
iLeader - Make Way for the Millennials
iLeader - Make Way for the MillennialsiLeader - Make Way for the Millennials
iLeader - Make Way for the Millennials
 
Psg10 Cug En
Psg10 Cug EnPsg10 Cug En
Psg10 Cug En
 
Digital Divide
Digital DivideDigital Divide
Digital Divide
 
Sadarah 5th-012.. تنظيم الملتقيات.. عرض
Sadarah 5th-012.. تنظيم الملتقيات.. عرضSadarah 5th-012.. تنظيم الملتقيات.. عرض
Sadarah 5th-012.. تنظيم الملتقيات.. عرض
 
خوارزميات صدارة.. الجودة في التسويق.. مختصر العرض.. عرض
خوارزميات صدارة.. الجودة في التسويق.. مختصر العرض.. عرضخوارزميات صدارة.. الجودة في التسويق.. مختصر العرض.. عرض
خوارزميات صدارة.. الجودة في التسويق.. مختصر العرض.. عرض
 
MARTA,SEILA,ESTELA ETA ADUR
MARTA,SEILA,ESTELA ETA ADURMARTA,SEILA,ESTELA ETA ADUR
MARTA,SEILA,ESTELA ETA ADUR
 
Social Capital Inside The Enterprise Is08
Social Capital Inside The Enterprise Is08Social Capital Inside The Enterprise Is08
Social Capital Inside The Enterprise Is08
 

Similar to Osi Model Lambert K

Osi model
Osi modelOsi model
Osi model
dhawal mehta
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP Layer
Netwax Lab
 
OSI models
OSI modelsOSI models
OSI models
Mahesh Kumar Attri
 
Osi model (open systems interconnection)
Osi model (open systems interconnection)Osi model (open systems interconnection)
Osi model (open systems interconnection)
maria afzal
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
skknowledge
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocols
Muhammed Sadham
 
Assignment3
Assignment3Assignment3
Assignment3
MahfujurRahman63
 
OSI & TCP model
OSI & TCP modelOSI & TCP model
OSI & TCP model
Nafizul Islam
 
Osi model
Osi modelOsi model
Osi model
Umamaheshwariv1
 
Osi model 1
Osi model 1Osi model 1
Osi model 1
Zohaib Hassan
 
Osi model
Osi modelOsi model
Osi model
Ujjwal 'Shanu'
 
OsI reference model
OsI reference modelOsI reference model
OsI reference model
LakshmiSamivel
 
Lecture2
Lecture2Lecture2
Lecture2
Thinesh Nathan
 
Osi model
Osi modelOsi model
Osi model
ufaq kk
 
Practical Wireless, Ethernet and TCP/IP Networking
Practical Wireless, Ethernet and TCP/IP NetworkingPractical Wireless, Ethernet and TCP/IP Networking
Practical Wireless, Ethernet and TCP/IP Networking
Living Online
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
isma ishak
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi model
Naiyan Noor
 
7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.
Kanishk Raj
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
NajmulIslam38
 
Learn basics of ip addressing
Learn basics of  ip addressingLearn basics of  ip addressing
Learn basics of ip addressing
Bobby Agustinus Ginting
 

Similar to Osi Model Lambert K (20)

Osi model
Osi modelOsi model
Osi model
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP Layer
 
OSI models
OSI modelsOSI models
OSI models
 
Osi model (open systems interconnection)
Osi model (open systems interconnection)Osi model (open systems interconnection)
Osi model (open systems interconnection)
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocols
 
Assignment3
Assignment3Assignment3
Assignment3
 
OSI & TCP model
OSI & TCP modelOSI & TCP model
OSI & TCP model
 
Osi model
Osi modelOsi model
Osi model
 
Osi model 1
Osi model 1Osi model 1
Osi model 1
 
Osi model
Osi modelOsi model
Osi model
 
OsI reference model
OsI reference modelOsI reference model
OsI reference model
 
Lecture2
Lecture2Lecture2
Lecture2
 
Osi model
Osi modelOsi model
Osi model
 
Practical Wireless, Ethernet and TCP/IP Networking
Practical Wireless, Ethernet and TCP/IP NetworkingPractical Wireless, Ethernet and TCP/IP Networking
Practical Wireless, Ethernet and TCP/IP Networking
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi model
 
7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
 
Learn basics of ip addressing
Learn basics of  ip addressingLearn basics of  ip addressing
Learn basics of ip addressing
 

Recently uploaded

Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 

Recently uploaded (20)

Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 

Osi Model Lambert K

  • 1. What is the OSI model? Network Architecture and Analysis Professor Peter Fall 2009 Kersey Lambert
  • 2. Physical Layer Information is carried over wires as bits (1’s and 0’s) and converted into electrical pulses. This layer handles the physical connections within the computer and from terminal to terminal and completes no error checking.
  • 3. OSI Model OSI stands for Open Systems Interconnection. There are seven layers in the OSI Model, as seen in this diagram. http://www.novell.com/info/primer/prim05.html It was widely adopted because it offers a high level of interoperability. OSI stands for Open Systems Interconnection. There are seven layers in the OSI Model, as seen in this diagram. It was widely adopted because it offers a high level of interoperability. OSI stands for Open Systems Interconnection. There are seven layers in the OSI Model, as seen in this diagram. It was widely adopted because it offers a high level of interoperability. OSI stands for Open Systems Interconnection. There are seven layers in the OSI Model, as seen in this diagram. http://www.novell.com/info/primer/prim05.html It was widely adopted because it offers a high level of interoperability. OSI stands for Open Systems Interconnection. There are seven layers in the OSI Model, as seen in this diagram. http://www.novell.com/info/primer/prim05.html
  • 4. Data Link Layer Headers and trailers are added to create frames which allow the computer to know where frames begin and end. No data is interpreted, only encapsulated for the network layer. Packets are checked for errors at this layer.
  • 5. Network Layer Receives segmented data, adds logical addressing information, and creates packets. This layer handles virtual connections throughout the network and between other networks. Routes and relays data between nodes. IP-Internet Protocol is the standard used to connect networks.
  • 6. Transport Layer Maximum transmission units are determined here. If units are too large, they are segmented with sequence identifiers. Ensures that packet arrive complete and in the correct sequence. This layer also contains checksum, flow control and acknowledgement data.
  • 7. Session Layer PDU’s are received, transmission speed is detected, and a session header is added. TCP-Transmission Control Protocol functions at this layer. This layer “establishes, manages, and terminates sessions between applications” (Novell’s networking primer, 2009). Sessions are dialogues between presentation layers of sending and receiving computers.
  • 8. Presentation Layer Information is encrypted, as needed, and PDU’s (Protocol Data Units) are sent through. FTAM-File Transfer, Access, and Management and VTP-Virtual Terminal Protocol are part of this layer. Developed by DoD as part of the TCP/IP suite of protocols (Novell’s network primer, 2009). This layer “converts incoming and outgoing data from one presentation format to another” (Novell’s networking primer, 2009).
  • 9. Application Layer This layer uses FTP-File Transport Protocol, Telnet, HTTP-Hypertext Transfer Protocol, and SMTP-Simple Mail Transfer Protocol. This layer “performs high-level services such as making sure necessary resources are present…and authenticating users when appropriate” (Novell’s networking primer, 2009). Processes requests and transfers them down through the layers and across the network.