SlideShare a Scribd company logo
OSI mo
(OPEN SYSTEM
INTERCOMMUNICATION)
LAYERD
ARCHITECTURE
PHYSICAL LAYER
I. The Physical Layer provides a standardized interface to physical transmission
media, including :
a. Mechanical specification of electrical connectors and cables, for example
maximum cable length
b. Electrical specification of transmission line c. Bit-by-bit or symbol-by-symbol
delivery
II. On the sender side, the physical layer receives the data from Data Link Layer and
encodes it into signals to be transmitted onto the medium. On the receiver side, the
physical layer receives the signals from the transmission medium decodes it back
into data and sends it to the Data Link Layer as shown in the figure below:
ATTACKS
1.Interference, 2.jamming,
3.evaesdroppin
g,
4.traffic anaysis
PREVENTION
1.Encryption
2.Accescontr
ol measures
3.instrection
detection
system
DATA LINK LAYER
I. The Data Link layer adds reliability to the physical layer by
providing error detection and correction mechanisms.
II. On the sender side, the Data Link layer receives the data from
Network Layer and divides the stream of bits into fixed size
manageable units called as Frames and sends it to the physical
layer. On the receiver side, the data link layer receives the stream
of bits from the physical layer and regroups them into frames and
sends them to the Network layer. This process is called Framing.
It is shown in the figure below:
ATTACKS
1.mac
address
spoofing
2.denial of
service
3.man in
the middle
PREVENTATION
1.use a firewall to control traffic
between the network and the
outside world.
2use encryption to protect data as it
travels across the network.
3.use access control lists to allow
only authorized users to access the
network
NETWORK LAYER
I. The network layer makes sure that the data is delivered to the
receiver despite multiple intermediate devices.
II. The network layer at the sending side accepts data from the
transport layer, divides it into packets, adds addressing
information in the header and passes it to the data link layer. At
the receiving end the network layer receives the frames sent by
data link layer, converts them back into packets, verifies the
physical address (verifies if the receiver address matches with its
own address) and the send the packets to the transport layer.
ATTACKS
1.denial-of-
service(DOS) attck
2.Distributed
denial-of-
service(DDOS)atta
ck
3.SYN flood
PREVENTION
1.use a firewall
2.use encryption
3.use strong authentication
TRANSPORT LAYER
I. A logical address at network layer facilitates the transmission of data from source
to destination device. But the source and the destination both may be having
multiple processes communicating with each other. Hence it is important to deliver
the data not only from the sender to the receiver but from the correct process on the
sender to the correct process on the receiver. The transport layer takes care of
process to process delivery of data and makes sure that it is intact and in order.
II. At the sending side, the transport layer receives data from the session layer,
divides it into units called segments and sends it to the network layer. At the
receiving side, the transport layer receives packets from the network layer, converts
and arranges into proper sequence of segments and sends it to the session layer
ATTACKS
1.Denial of
service
2.spoof ip
3.inject
malicious
code
PREVENTION
1.use a firewall
2.use a vpn
3.use two-factor
SESSION LAYER
I. The session layer establishes a session between the communicating
devices called dialog and synchronizes their interaction. It is the
responsibility of the session layer to establish and synchronize the
dialogs. It is also called the network dialog controller.
II. The session layer at the sending side accepts data from the
presentation layer adds checkpoints to it called syn bits and passes
the data to the transport layer. At the receiving end the session layer
receives data from the transport layer removes the checkpoints
inserted previously and passes the data to the presentation layer.
III. The checkpoints or synchronization points is a way of informing the
status of the data transfer. Ex. A checkpoint after first 500 bits of data
will ensure that those 500 bits are not sent again in case of
retransmission at 650th bit.
ATTACKS
1.Hijackin
g
2.Session
fixation
3.session
splicing
PREVENTION
1.Encrypting all communication
between the client and server.
2.Authenticating all users
3.implementing a firewall
PRESENTATION LAYER
The sending and receiving devices may run on different
platforms (hardware, software and operating system). Hence it is
important that they understand the messages that are used for
communicating. Hence a translation service may be required
which is provided by the Presentation layers
ATTACKS
1.sql
injection
2.cross-site
scripting(XS
S)
3.session
hijacking
PREVENTION
1.keeping all software up to date
2.using a web application
firewall(WAF)
3.Disabling directory browsing
APPLICATION LAYER
I. The application layer enables the user to communicate its data
to the receiver by providingcertain services. For ex. Email is sent
using X.400 service.
ATTACKS
1.sql
injection
2.cross-
site
scripting
-buffer
overflow
-denial of
service
PREVENTION
1.use strong passwords
2.keep your software up to date.
3.use a web application
firewall(WAF)

More Related Content

Similar to osi model ppt (1).pptx

OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.
muhammadsaudm19a
 
Network internet
Network internetNetwork internet
Network internet
Kumar
 
Networks internet
Networks internetNetworks internet
Networks internet
Kumar
 
AD HOC.doc
AD HOC.docAD HOC.doc
AD HOC.doc
Sruthi kesani
 
important network terminologies
important network terminologiesimportant network terminologies
important network terminologies
evelyn
 
Glossary of introduction to networks
Glossary of introduction to networksGlossary of introduction to networks
Glossary of introduction to networks
evelyn
 
Domain 4 - Communications and Network Security
Domain 4  - Communications and Network SecurityDomain 4  - Communications and Network Security
Domain 4 - Communications and Network Security
Maganathin Veeraragaloo
 
seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI model
Manjeet MN
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
Soumo Dhali
 
Osi layer model
Osi layer modelOsi layer model
Osi layer model
IshworKhatiwada
 
Project on wifi ,LTE and Broadband devices
Project on wifi ,LTE and Broadband devicesProject on wifi ,LTE and Broadband devices
Project on wifi ,LTE and Broadband devices
Karan Kumar
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
inventionjournals
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
Aiman Hud
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communications
Mazin Alwaaly
 
Assignment 02
Assignment 02Assignment 02
Assignment 02
Robuilislam
 
Executive presentation3
Executive presentation3Executive presentation3
Executive presentation3
MIDAUTEL
 
BCE L-1 networking fundamentals 111.pptx
BCE L-1  networking fundamentals 111.pptxBCE L-1  networking fundamentals 111.pptx
BCE L-1 networking fundamentals 111.pptx
Kirti Verma
 
The Open Systems Interconnect (OSI) model has seven layers. this tex.pdf
The Open Systems Interconnect (OSI) model has seven layers. this tex.pdfThe Open Systems Interconnect (OSI) model has seven layers. this tex.pdf
The Open Systems Interconnect (OSI) model has seven layers. this tex.pdf
harihelectronicspune
 
Class notes 1
Class notes 1Class notes 1
Class notes 1
FaysalAhmed395259
 
Osi(1)
Osi(1)Osi(1)
Osi(1)
Nitesh Singh
 

Similar to osi model ppt (1).pptx (20)

OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.
 
Network internet
Network internetNetwork internet
Network internet
 
Networks internet
Networks internetNetworks internet
Networks internet
 
AD HOC.doc
AD HOC.docAD HOC.doc
AD HOC.doc
 
important network terminologies
important network terminologiesimportant network terminologies
important network terminologies
 
Glossary of introduction to networks
Glossary of introduction to networksGlossary of introduction to networks
Glossary of introduction to networks
 
Domain 4 - Communications and Network Security
Domain 4  - Communications and Network SecurityDomain 4  - Communications and Network Security
Domain 4 - Communications and Network Security
 
seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI model
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
 
Osi layer model
Osi layer modelOsi layer model
Osi layer model
 
Project on wifi ,LTE and Broadband devices
Project on wifi ,LTE and Broadband devicesProject on wifi ,LTE and Broadband devices
Project on wifi ,LTE and Broadband devices
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communications
 
Assignment 02
Assignment 02Assignment 02
Assignment 02
 
Executive presentation3
Executive presentation3Executive presentation3
Executive presentation3
 
BCE L-1 networking fundamentals 111.pptx
BCE L-1  networking fundamentals 111.pptxBCE L-1  networking fundamentals 111.pptx
BCE L-1 networking fundamentals 111.pptx
 
The Open Systems Interconnect (OSI) model has seven layers. this tex.pdf
The Open Systems Interconnect (OSI) model has seven layers. this tex.pdfThe Open Systems Interconnect (OSI) model has seven layers. this tex.pdf
The Open Systems Interconnect (OSI) model has seven layers. this tex.pdf
 
Class notes 1
Class notes 1Class notes 1
Class notes 1
 
Osi(1)
Osi(1)Osi(1)
Osi(1)
 

Recently uploaded

一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 

Recently uploaded (11)

一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 

osi model ppt (1).pptx

  • 3. PHYSICAL LAYER I. The Physical Layer provides a standardized interface to physical transmission media, including : a. Mechanical specification of electrical connectors and cables, for example maximum cable length b. Electrical specification of transmission line c. Bit-by-bit or symbol-by-symbol delivery II. On the sender side, the physical layer receives the data from Data Link Layer and encodes it into signals to be transmitted onto the medium. On the receiver side, the physical layer receives the signals from the transmission medium decodes it back into data and sends it to the Data Link Layer as shown in the figure below:
  • 6. DATA LINK LAYER I. The Data Link layer adds reliability to the physical layer by providing error detection and correction mechanisms. II. On the sender side, the Data Link layer receives the data from Network Layer and divides the stream of bits into fixed size manageable units called as Frames and sends it to the physical layer. On the receiver side, the data link layer receives the stream of bits from the physical layer and regroups them into frames and sends them to the Network layer. This process is called Framing. It is shown in the figure below:
  • 8. PREVENTATION 1.use a firewall to control traffic between the network and the outside world. 2use encryption to protect data as it travels across the network. 3.use access control lists to allow only authorized users to access the network
  • 9. NETWORK LAYER I. The network layer makes sure that the data is delivered to the receiver despite multiple intermediate devices. II. The network layer at the sending side accepts data from the transport layer, divides it into packets, adds addressing information in the header and passes it to the data link layer. At the receiving end the network layer receives the frames sent by data link layer, converts them back into packets, verifies the physical address (verifies if the receiver address matches with its own address) and the send the packets to the transport layer.
  • 11. PREVENTION 1.use a firewall 2.use encryption 3.use strong authentication
  • 12. TRANSPORT LAYER I. A logical address at network layer facilitates the transmission of data from source to destination device. But the source and the destination both may be having multiple processes communicating with each other. Hence it is important to deliver the data not only from the sender to the receiver but from the correct process on the sender to the correct process on the receiver. The transport layer takes care of process to process delivery of data and makes sure that it is intact and in order. II. At the sending side, the transport layer receives data from the session layer, divides it into units called segments and sends it to the network layer. At the receiving side, the transport layer receives packets from the network layer, converts and arranges into proper sequence of segments and sends it to the session layer
  • 14. PREVENTION 1.use a firewall 2.use a vpn 3.use two-factor
  • 15. SESSION LAYER I. The session layer establishes a session between the communicating devices called dialog and synchronizes their interaction. It is the responsibility of the session layer to establish and synchronize the dialogs. It is also called the network dialog controller. II. The session layer at the sending side accepts data from the presentation layer adds checkpoints to it called syn bits and passes the data to the transport layer. At the receiving end the session layer receives data from the transport layer removes the checkpoints inserted previously and passes the data to the presentation layer. III. The checkpoints or synchronization points is a way of informing the status of the data transfer. Ex. A checkpoint after first 500 bits of data will ensure that those 500 bits are not sent again in case of retransmission at 650th bit.
  • 17. PREVENTION 1.Encrypting all communication between the client and server. 2.Authenticating all users 3.implementing a firewall
  • 18. PRESENTATION LAYER The sending and receiving devices may run on different platforms (hardware, software and operating system). Hence it is important that they understand the messages that are used for communicating. Hence a translation service may be required which is provided by the Presentation layers
  • 20. PREVENTION 1.keeping all software up to date 2.using a web application firewall(WAF) 3.Disabling directory browsing
  • 21. APPLICATION LAYER I. The application layer enables the user to communicate its data to the receiver by providingcertain services. For ex. Email is sent using X.400 service.
  • 23. PREVENTION 1.use strong passwords 2.keep your software up to date. 3.use a web application firewall(WAF)