SlideShare a Scribd company logo
1 of 2
OSI REFERENCE MODEL: THE DRIVING FORCE BEHIND NETWORK
COMMUNICATION
Every message sent over the network --- even the simplest e-mail message --- must be divided
into discrete packets of data and routed via transmission media such as telephone lines. While
travelling from the sending computer to the receiving computer, each data package can take a
different path over the network. How do these messages get to their destination, intact and
accurate?
The Open System Interconnection (OSI) reference model, a communications standard developed
by the International Organization for Standardization (ISO), offers an answer. The OSI reference
model describes the flow of data in a network through seven layers, from user application to the
physical transmission media.
The top layer, the application layer, serves as the interface between the user and the network.
Using application software, such as an e-mail program, a user can type a message and specify a
recipient. The application then prepares the message doe delivery by converting the message data
into bits and attaching a header identifying the sending and receiving computers.
The presentation layer translates the converted messages data into a language the receiving
computer can process (ASCHII to EBCDIC for example ) and also may compress or encrypt the
data. Finally, the layer attaches another header specifying the language compression, and
encryption schemes.
The Session Layer, establishes and maintains communications session. A session is the period
between establishment of a connection transmission of the data, the termination , of the
connection.
The transport layer, also called the end-to-end layer, ensures that data arrives correctly and in
proper sequence. The transport layer divides the data into segments and creates a checksum, a
mathematical sum based on the data, and puts this information in the transport header. The
checksum later is used to determine if the data was scrambled during transmission.
The network layer routes the message from sender to receiver. This layer splits the data segments
from the transport layer into a smaller group of bits called packets. Next, it adds a header
containing the packet sequence, the receiving computer address, and routing information. The
network layer also manages network problems by rerouting packets to avoid network congestion.
The data link layer supervises the transmission of the message to the next network node by
specifying the network technology (such as Ethernet or token ring) and grouping data
accordingly. The data link layer, also calculates the checksum and keep a copy of each packet
until it receives confirmation that the packet arrived undamaged at the next node.
Finally, the physical layer encodes the packets into a signal recognized by the medium that will
carry them –such as an analog signal to be sent over a telephone line – and sends the packets
along that medium to receiving computer.
At the receiving computer, the process is reversed and the data moves back through the seven
layers from the physical layer to the application layer, which identifies the recipient, converts the
bits into readable data, removes some of the error-checking and control information from the
data, and directs it to the appropriate application. The next time you send process described the
OSI reference model, which ensures that your message travels safely over many networks to
your friend’s computer.

More Related Content

What's hot (20)

Mid term Topic
Mid term TopicMid term Topic
Mid term Topic
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Basic concept of networking
Basic concept of networkingBasic concept of networking
Basic concept of networking
 
OSI Draft
OSI DraftOSI Draft
OSI Draft
 
seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI model
 
Lecture2
Lecture2Lecture2
Lecture2
 
Lecture1
Lecture1Lecture1
Lecture1
 
Ch1 computer networks internet_encapsulation_4
Ch1 computer networks internet_encapsulation_4Ch1 computer networks internet_encapsulation_4
Ch1 computer networks internet_encapsulation_4
 
OSI Model
OSI ModelOSI Model
OSI Model
 
5th class
5th class5th class
5th class
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
2nd class
2nd class2nd class
2nd class
 
Class Note 01
Class Note 01Class Note 01
Class Note 01
 
OSI model
OSI modelOSI model
OSI model
 
Terms related to Computer network
Terms related to Computer networkTerms related to Computer network
Terms related to Computer network
 
Class Note 02
Class Note 02Class Note 02
Class Note 02
 
Chapter#4
Chapter#4Chapter#4
Chapter#4
 
Introduction to Networking and OSI Model
Introduction to Networking and OSI ModelIntroduction to Networking and OSI Model
Introduction to Networking and OSI Model
 
Presentation on osi layer
Presentation on osi layerPresentation on osi layer
Presentation on osi layer
 
Computer Network [OSI Model]
Computer Network [OSI Model]Computer Network [OSI Model]
Computer Network [OSI Model]
 

Similar to Osi reference model

Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptxTadeseBeyene
 
OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.muhammadsaudm19a
 
The open system Interconnection (OSI) reference.pptx
The open system Interconnection (OSI) reference.pptxThe open system Interconnection (OSI) reference.pptx
The open system Interconnection (OSI) reference.pptxwesendesta2
 
The Open Systems Interconnect (OSI) model has seven layers. this tex.pdf
The Open Systems Interconnect (OSI) model has seven layers. this tex.pdfThe Open Systems Interconnect (OSI) model has seven layers. this tex.pdf
The Open Systems Interconnect (OSI) model has seven layers. this tex.pdfharihelectronicspune
 
The OSI Reference Model layers, in order from top to bottomD. Appl.pdf
The OSI Reference Model layers, in order from top to bottomD. Appl.pdfThe OSI Reference Model layers, in order from top to bottomD. Appl.pdf
The OSI Reference Model layers, in order from top to bottomD. Appl.pdfrdtraders2007
 
OSI Reference Model
OSI Reference ModelOSI Reference Model
OSI Reference ModelAayushAryal2
 
Computer Network Unit-1 ppt
Computer Network Unit-1 pptComputer Network Unit-1 ppt
Computer Network Unit-1 pptvmdharxfr
 
DISTIBUTED OPERATING SYSTEM
DISTIBUTED  OPERATING SYSTEM DISTIBUTED  OPERATING SYSTEM
DISTIBUTED OPERATING SYSTEM AjithaG9
 
The Open Systems Interconnect (OSI) Model - IS AUDIT
The Open Systems Interconnect (OSI) Model - IS AUDITThe Open Systems Interconnect (OSI) Model - IS AUDIT
The Open Systems Interconnect (OSI) Model - IS AUDITShahzeb Pirzada
 

Similar to Osi reference model (20)

Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
 
OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.
 
Osi model
Osi modelOsi model
Osi model
 
Computer networking
Computer networkingComputer networking
Computer networking
 
The open system Interconnection (OSI) reference.pptx
The open system Interconnection (OSI) reference.pptxThe open system Interconnection (OSI) reference.pptx
The open system Interconnection (OSI) reference.pptx
 
The Open Systems Interconnect (OSI) model has seven layers. this tex.pdf
The Open Systems Interconnect (OSI) model has seven layers. this tex.pdfThe Open Systems Interconnect (OSI) model has seven layers. this tex.pdf
The Open Systems Interconnect (OSI) model has seven layers. this tex.pdf
 
OSI MODEL.pptx
OSI MODEL.pptxOSI MODEL.pptx
OSI MODEL.pptx
 
computer network basics
computer network basicscomputer network basics
computer network basics
 
The Osi Model
The Osi ModelThe Osi Model
The Osi Model
 
The OSI Reference Model layers, in order from top to bottomD. Appl.pdf
The OSI Reference Model layers, in order from top to bottomD. Appl.pdfThe OSI Reference Model layers, in order from top to bottomD. Appl.pdf
The OSI Reference Model layers, in order from top to bottomD. Appl.pdf
 
Assignment3
Assignment3Assignment3
Assignment3
 
OSI Reference Model
OSI Reference ModelOSI Reference Model
OSI Reference Model
 
Computer Network Unit-1 ppt
Computer Network Unit-1 pptComputer Network Unit-1 ppt
Computer Network Unit-1 ppt
 
Notes on Class 3
Notes on Class 3Notes on Class 3
Notes on Class 3
 
DISTIBUTED OPERATING SYSTEM
DISTIBUTED  OPERATING SYSTEM DISTIBUTED  OPERATING SYSTEM
DISTIBUTED OPERATING SYSTEM
 
The Open Systems Interconnect (OSI) Model - IS AUDIT
The Open Systems Interconnect (OSI) Model - IS AUDITThe Open Systems Interconnect (OSI) Model - IS AUDIT
The Open Systems Interconnect (OSI) Model - IS AUDIT
 
Class notes 1
Class notes 1Class notes 1
Class notes 1
 
Osi model
Osi modelOsi model
Osi model
 
Osi model
Osi modelOsi model
Osi model
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
 

Recently uploaded

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Osi reference model

  • 1. OSI REFERENCE MODEL: THE DRIVING FORCE BEHIND NETWORK COMMUNICATION Every message sent over the network --- even the simplest e-mail message --- must be divided into discrete packets of data and routed via transmission media such as telephone lines. While travelling from the sending computer to the receiving computer, each data package can take a different path over the network. How do these messages get to their destination, intact and accurate? The Open System Interconnection (OSI) reference model, a communications standard developed by the International Organization for Standardization (ISO), offers an answer. The OSI reference model describes the flow of data in a network through seven layers, from user application to the physical transmission media. The top layer, the application layer, serves as the interface between the user and the network. Using application software, such as an e-mail program, a user can type a message and specify a recipient. The application then prepares the message doe delivery by converting the message data into bits and attaching a header identifying the sending and receiving computers. The presentation layer translates the converted messages data into a language the receiving computer can process (ASCHII to EBCDIC for example ) and also may compress or encrypt the data. Finally, the layer attaches another header specifying the language compression, and encryption schemes. The Session Layer, establishes and maintains communications session. A session is the period between establishment of a connection transmission of the data, the termination , of the connection. The transport layer, also called the end-to-end layer, ensures that data arrives correctly and in proper sequence. The transport layer divides the data into segments and creates a checksum, a mathematical sum based on the data, and puts this information in the transport header. The checksum later is used to determine if the data was scrambled during transmission. The network layer routes the message from sender to receiver. This layer splits the data segments from the transport layer into a smaller group of bits called packets. Next, it adds a header containing the packet sequence, the receiving computer address, and routing information. The network layer also manages network problems by rerouting packets to avoid network congestion. The data link layer supervises the transmission of the message to the next network node by specifying the network technology (such as Ethernet or token ring) and grouping data accordingly. The data link layer, also calculates the checksum and keep a copy of each packet until it receives confirmation that the packet arrived undamaged at the next node.
  • 2. Finally, the physical layer encodes the packets into a signal recognized by the medium that will carry them –such as an analog signal to be sent over a telephone line – and sends the packets along that medium to receiving computer. At the receiving computer, the process is reversed and the data moves back through the seven layers from the physical layer to the application layer, which identifies the recipient, converts the bits into readable data, removes some of the error-checking and control information from the data, and directs it to the appropriate application. The next time you send process described the OSI reference model, which ensures that your message travels safely over many networks to your friend’s computer.