SlideShare a Scribd company logo
OSI model for web
application
Role of OSI layers when we open a webpage
Keep in mind that although the OSI model is what we study, we don't use OSI in real work networks. We use
the TCP/IP Network Model. The OSI model is still taught due to it's usefulness in separating concepts into
modules (layers). The OSI model is translated to the TCP/IP model.
Session
Our sessions are role of OSI layer when we open a webpage in a real world Example
User Launches a site in the browser
● You typically type an web address (Uniform resource locator) in a Web browser. Web browser uses
something called Hypertext Transfer Protocol which is an Application layer protocol.
● User tells their browser to
fetch a page from url
● Browser makes an HTTPS
request to url
● To fetch the required web
page it passes the request
to its HTTP protocol handler,
that is Layer 7 of the OSI
model, the Application layer
● HTTP protocol handler at Layer 7
recognizes that the request is for a secure
document, it passes the request to the TLS
library at Layer 5 and 6 of the OSI model.
These layers are called the Session and
Presentation layers.
● In order to open a secure channel, the TLS
library needs to establish a connection to
the destination
● It passes a connection request to TCP
which lives at Layer 4 of the OSI model, the
Transport layer
SSL and TLS together secure communications between
billions of computers, servers, Internet of Things (IoT)
devices, and embedded systems. The security provided
by an SSL/TLS Library depends on the underlying
strength of its cryptography which is used to encrypt
communications.
The TCP handler receives the
connection request. Then, it
creates a packet with the
“SYN” flag set — the first part
of the three-way handshake
with the remote server to
establish a connection
● After the TCP handler
has created a packet to
initiate a connection, it
passes the packet down
to IP which lives at OSI
Layer 3, also called the
Network Layer
● The network layer
receives the packet and
adds the correct IP
information to its
header. That informs
the internet routers
how to route the packet
to its destination IP
address.
● Now that the network
layer has a routable
packet, it passes it
down to Layer 2, the
Data-Link layer.
Lorem Ipsum
Lorem Ipsum Lorem Ipsum Lorem Ipsum
● The data-link layer adds the
router’s MAC address as the
local destination address,
allowing the router to send the
packet out to the Internet.
● In order for the packet to get
onto the basic networking
transmission technologies of
the network, it is then passed to
OSI Layer 1 or the Physical Layer
to complete the task.
Lorem Ipsum
75%
Lorem Ipsum Lorem Ipsum Lorem Ipsum
● The physical layer takes
the binary packet and
physically encodes it
onto network cabling
— or places it onto the
airwaves in the case of
a WiFi network — and
the packet begins its
journey across the local
network and out to the
wider Internet.
● Once the packet
reaches the
destination server,
the whole process
reverses and the
packet travels
back up the layers
of the OSI model.
Share Get feedback
02
03
OSI Model Mnemonics

More Related Content

What's hot

OSI layer by cisco
OSI layer by ciscoOSI layer by cisco
OSI layer by cisco
SMKN 3 Kota Tangerang
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
Michael Lamont
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
AIRTEL
 
Tcp
TcpTcp
Tcp
giaolvq
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
Dsunte Wilson
 
Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)
welcometofacebook
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
SMC Networks Europe
 
Frame relay
Frame relayFrame relay
Frame relay
Ayesha Maqsood
 
Osi model
Osi modelOsi model
Osi model
sayyed sabir
 
Introduction to vxlan
Introduction to vxlanIntroduction to vxlan
Introduction to vxlan
Mohammed Umair
 
Internetworking devices
Internetworking devicesInternetworking devices
Internetworking devices
Online
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentation
bcdran
 
Encor chapter 1_packet forwarding
Encor chapter 1_packet forwardingEncor chapter 1_packet forwarding
Encor chapter 1_packet forwarding
merhatsidikmelke
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
Rohit Singh
 
OSI MODEL AND ITS PROTOCOL
OSI MODEL AND ITS PROTOCOLOSI MODEL AND ITS PROTOCOL
OSI MODEL AND ITS PROTOCOL
Ikhlas Rahman
 
Ipv6
Ipv6Ipv6
Ipv6
maha5960
 
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)
tigerbt
 
OSI MODEL
    OSI MODEL    OSI MODEL
OSI MODEL
Ujjwal 'Shanu'
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
Siddique Ibrahim
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
Bry Cunal
 

What's hot (20)

OSI layer by cisco
OSI layer by ciscoOSI layer by cisco
OSI layer by cisco
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Tcp
TcpTcp
Tcp
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Frame relay
Frame relayFrame relay
Frame relay
 
Osi model
Osi modelOsi model
Osi model
 
Introduction to vxlan
Introduction to vxlanIntroduction to vxlan
Introduction to vxlan
 
Internetworking devices
Internetworking devicesInternetworking devices
Internetworking devices
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentation
 
Encor chapter 1_packet forwarding
Encor chapter 1_packet forwardingEncor chapter 1_packet forwarding
Encor chapter 1_packet forwarding
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
OSI MODEL AND ITS PROTOCOL
OSI MODEL AND ITS PROTOCOLOSI MODEL AND ITS PROTOCOL
OSI MODEL AND ITS PROTOCOL
 
Ipv6
Ipv6Ipv6
Ipv6
 
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)
 
OSI MODEL
    OSI MODEL    OSI MODEL
OSI MODEL
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 

Similar to Role of OSI Layer when we open a webpage

Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
kebeAman
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
azmerawAnna1
 
As we deep dive into TCPIP and OSI protocols, looking at each .docx
As we deep dive into TCPIP and OSI protocols, looking at each .docxAs we deep dive into TCPIP and OSI protocols, looking at each .docx
As we deep dive into TCPIP and OSI protocols, looking at each .docx
hanneloremccaffery
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manual
Jaya Prasanna
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
Serious_SamSoul
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.ppt
mohanravi1986
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Mina Riyahi
 
Private messenger
Private messengerPrivate messenger
Private messenger
Piyush Gaur
 
CSC1202_3_The_OSI_Reference_Model_-_V2.pdf
CSC1202_3_The_OSI_Reference_Model_-_V2.pdfCSC1202_3_The_OSI_Reference_Model_-_V2.pdf
CSC1202_3_The_OSI_Reference_Model_-_V2.pdf
BoostHub
 
CSC1202_3_The_OSI_Reference_Model_-_V2.pptx
CSC1202_3_The_OSI_Reference_Model_-_V2.pptxCSC1202_3_The_OSI_Reference_Model_-_V2.pptx
CSC1202_3_The_OSI_Reference_Model_-_V2.pptx
Muhammad Sohail
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
webhostingguy
 
Lecture 02 networking
Lecture 02 networkingLecture 02 networking
Lecture 02 networking
HNDE Labuduwa Galle
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
MD. Naimur Rahman
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP Layer
Netwax Lab
 
Private messenger
Private messengerPrivate messenger
Private messenger
Piyush Gaur
 
Ipc
IpcIpc
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communication
ijtsrd
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
Ankur Kumar
 
W14webposter
W14webposterW14webposter
W14webposter
s1150245
 
WAN & LAN Cluster with Diagrams and OSI explanation
WAN & LAN Cluster with Diagrams and OSI explanationWAN & LAN Cluster with Diagrams and OSI explanation
WAN & LAN Cluster with Diagrams and OSI explanation
Jonathan Reid
 

Similar to Role of OSI Layer when we open a webpage (20)

Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
As we deep dive into TCPIP and OSI protocols, looking at each .docx
As we deep dive into TCPIP and OSI protocols, looking at each .docxAs we deep dive into TCPIP and OSI protocols, looking at each .docx
As we deep dive into TCPIP and OSI protocols, looking at each .docx
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manual
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.ppt
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Private messenger
Private messengerPrivate messenger
Private messenger
 
CSC1202_3_The_OSI_Reference_Model_-_V2.pdf
CSC1202_3_The_OSI_Reference_Model_-_V2.pdfCSC1202_3_The_OSI_Reference_Model_-_V2.pdf
CSC1202_3_The_OSI_Reference_Model_-_V2.pdf
 
CSC1202_3_The_OSI_Reference_Model_-_V2.pptx
CSC1202_3_The_OSI_Reference_Model_-_V2.pptxCSC1202_3_The_OSI_Reference_Model_-_V2.pptx
CSC1202_3_The_OSI_Reference_Model_-_V2.pptx
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
Lecture 02 networking
Lecture 02 networkingLecture 02 networking
Lecture 02 networking
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP Layer
 
Private messenger
Private messengerPrivate messenger
Private messenger
 
Ipc
IpcIpc
Ipc
 
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communication
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
W14webposter
W14webposterW14webposter
W14webposter
 
WAN & LAN Cluster with Diagrams and OSI explanation
WAN & LAN Cluster with Diagrams and OSI explanationWAN & LAN Cluster with Diagrams and OSI explanation
WAN & LAN Cluster with Diagrams and OSI explanation
 

Recently uploaded

Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 

Recently uploaded (20)

Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 

Role of OSI Layer when we open a webpage

  • 1. OSI model for web application Role of OSI layers when we open a webpage
  • 2. Keep in mind that although the OSI model is what we study, we don't use OSI in real work networks. We use the TCP/IP Network Model. The OSI model is still taught due to it's usefulness in separating concepts into modules (layers). The OSI model is translated to the TCP/IP model.
  • 3.
  • 4. Session Our sessions are role of OSI layer when we open a webpage in a real world Example User Launches a site in the browser ● You typically type an web address (Uniform resource locator) in a Web browser. Web browser uses something called Hypertext Transfer Protocol which is an Application layer protocol.
  • 5. ● User tells their browser to fetch a page from url ● Browser makes an HTTPS request to url ● To fetch the required web page it passes the request to its HTTP protocol handler, that is Layer 7 of the OSI model, the Application layer
  • 6. ● HTTP protocol handler at Layer 7 recognizes that the request is for a secure document, it passes the request to the TLS library at Layer 5 and 6 of the OSI model. These layers are called the Session and Presentation layers. ● In order to open a secure channel, the TLS library needs to establish a connection to the destination ● It passes a connection request to TCP which lives at Layer 4 of the OSI model, the Transport layer SSL and TLS together secure communications between billions of computers, servers, Internet of Things (IoT) devices, and embedded systems. The security provided by an SSL/TLS Library depends on the underlying strength of its cryptography which is used to encrypt communications.
  • 7. The TCP handler receives the connection request. Then, it creates a packet with the “SYN” flag set — the first part of the three-way handshake with the remote server to establish a connection ● After the TCP handler has created a packet to initiate a connection, it passes the packet down to IP which lives at OSI Layer 3, also called the Network Layer
  • 8. ● The network layer receives the packet and adds the correct IP information to its header. That informs the internet routers how to route the packet to its destination IP address. ● Now that the network layer has a routable packet, it passes it down to Layer 2, the Data-Link layer. Lorem Ipsum Lorem Ipsum Lorem Ipsum Lorem Ipsum
  • 9. ● The data-link layer adds the router’s MAC address as the local destination address, allowing the router to send the packet out to the Internet. ● In order for the packet to get onto the basic networking transmission technologies of the network, it is then passed to OSI Layer 1 or the Physical Layer to complete the task. Lorem Ipsum 75% Lorem Ipsum Lorem Ipsum Lorem Ipsum
  • 10. ● The physical layer takes the binary packet and physically encodes it onto network cabling — or places it onto the airwaves in the case of a WiFi network — and the packet begins its journey across the local network and out to the wider Internet.
  • 11. ● Once the packet reaches the destination server, the whole process reverses and the packet travels back up the layers of the OSI model. Share Get feedback 02 03