SlideShare a Scribd company logo
The OSI Model
(Open Systems Interconnection Model)
The OSI Model (Open Systems Interconnection Model) is a conceptual framework
used to describe the functions of a networking system. The OSI model characterizes
computing functions into a universal set of rules and requirements in order to
support interoper ability between different products and software.
OSI model is a tool used by IT professionals to actually model or trace the actual
flow of how data transfers in networks.
There are seven layers in OSI model.
Physical Layer
Functions of a Physical layer:
•Line Configuration: It defines the way how two or more devices can be
connected physically.
•Data Transmission: It defines the transmission mode whether it is simplex,
half-duplex or full-duplex mode between the two devices on the network.
•Topology: It defines the way how network devices are arranged.
•Signals: It determines the type of the signal used for transmitting the
information.
Data Link Layer
Functions of the Data-link layer
•Framing: The data link layer translates the physical's raw bit stream into
packets known as Frames. The Data link layer adds the header and trailer to
the frame. The header which is added to the frame contains the hardware
destination and source address.
•Physical Addressing: The Data link layer adds a header to the frame that
contains a destination address. The frame is transmitted to the destination
address mentioned in the header.
•Flow Control: Flow control is the main functionality of the Data-link layer. It
is the technique through which the constant data rate is maintained on both
the sides so that no data get corrupted. It ensures that the transmitting
station such as a server with higher processing speed does not exceed the
receiving station, with lower processing speed.
•Error Control: Error control is achieved by adding a calculated value CRC
(Cyclic Redundancy Check) that is placed to the Data link layer's trailer
which is added to the message frame before it is sent to the physical layer. If
any error seems to occurr, then the receiver sends the acknowledgment for
the retransmission of the corrupted frames.
•Access Control: When two or more devices are connected to the same
communication channel, then the data link layer protocols are used to
determine which device has control over the link at a given time.
Network Layer
Functions of Network Layer:
•Internetworking: An internetworking is the main responsibility of the
network layer. It provides a logical connection between different devices.
•Addressing: A Network layer adds the source and destination address to
the header of the frame. Addressing is used to identify the device on the
internet.
•Routing: Routing is the major component of the network layer, and it
determines the best optimal path out of the multiple paths from source to the
destination.
•Packetizing: A Network Layer receives the packets from the upper layer
and converts them into packets. This process is known as Packetizing. It is
achieved by internet protocol (IP).
Transport Layer
•Service-point addressing: Computers run several programs
simultaneously due to this reason, the transmission of data from source to
the destination not only from one computer to another computer but also
from one process to another process. The transport layer adds the header
that contains the address known as a service-point address or port address.
The responsibility of the network layer is to transmit the data from one
computer to another computer and the responsibility of the transport layer is
to transmit the message to the correct process.
•Segmentation and reassembly: When the transport layer receives the
message from the upper layer, it divides the message into multiple
segments, and each segment is assigned with a sequence number that
uniquely identifies each segment. When the message has arrived at the
destination, then the transport layer reassembles the message based on
their sequence numbers.
•Connection control: Transport layer provides two services Connection-
oriented service and connectionless service. A connectionless service treats
each segment as an individual packet, and they all travel in different routes
to reach the destination. A connection-oriented service makes a connection
with the transport layer at the destination machine before delivering the
packets. In connection-oriented service, all the packets travel in the single
route.
•Flow control: The transport layer also responsible for flow control but it is
performed end-to-end rather than across a single link.
•Error control: The transport layer is also responsible for Error control.
Error control is performed end-to-end rather than across the single link. The
sender transport layer ensures that message reach at the destination
without any error.
Session Layer
Functions of Session layer:
•Dialog control: Session layer acts as a dialog controller that creates a
dialog between two processes or we can say that it allows the
communication between two processes which can be either half-duplex or
full-duplex.
•Synchronization: Session layer adds some checkpoints when transmitting
the data in a sequence. If some error occurs in the middle of the
transmission of data, then the transmission will take place again from the
checkpoint. This process is known as Synchronization and recovery.
Presentation Layer
Functions of Presentation layer:
•Translation: The processes in two systems exchange the information in
the form of character strings, numbers and so on. Different computers use
different encoding methods, the presentation layer handles the
interoperability between the different encoding methods. It converts the data
from sender-dependent format into a common format and changes the
common format into receiver-dependent format at the receiving end.
•Encryption: Encryption is needed to maintain privacy. Encryption is a
process of converting the sender-transmitted information into another form
and sends the resulting message over the network.
•Compression: Data compression is a process of compressing the data,
i.e., it reduces the number of bits to be transmitted. Data compression is
very important in multimedia such as text, audio, video.
Application Layer
Functions of Application layer:
•File transfer, access, and management (FTAM): An application layer
allows a user to access the files in a remote computer, to retrieve the files
from a computer and to manage the files in a remote computer.
•Mail services: An application layer provides the facility for email forwarding
and storage.
•Directory services: An application provides the distributed database sources
and is used to provide that global information about various objects.
Refferences
www.google.com
www.javatpoint.com

More Related Content

What's hot

Computer networks-3
Computer networks-3Computer networks-3
Computer networks-3
MSA Technosoft
 
Class Note 01
Class Note 01Class Note 01
Class Note 01
Ridhy Chandro Modak
 
Chapter 3 final
Chapter 3 finalChapter 3 final
Chapter 3 final
ushabarad142
 
Class Note 02
Class Note 02Class Note 02
Class Note 02
Ridhy Chandro Modak
 
OSI Model
OSI ModelOSI Model
OSI Model
Rahul Bandhe
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
Šhæÿæñ Æhmęd
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
Sweta Kumari Barnwal
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
Bwsrang Basumatary
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
Nayan Sarma
 
Orientation to Computer Networks
Orientation to Computer NetworksOrientation to Computer Networks
Orientation to Computer Networks
Mukesh Chinta
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
Kak Yong
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iii
JAIGANESH SEKAR
 
Network and Protocol
 Network and Protocol Network and Protocol
Network and Protocol
Saif Muttair
 
Computer networks unit i
Computer networks    unit iComputer networks    unit i
Computer networks unit i
JAIGANESH SEKAR
 
COMPUTER NETWORKS UNIT 1
COMPUTER NETWORKS UNIT 1COMPUTER NETWORKS UNIT 1
COMPUTER NETWORKS UNIT 1
BON SECOURS COLLEGE FOR WOMEN
 
Protocols
ProtocolsProtocols
Protocols
Sonali Chawla
 
Network protocol
Network protocolNetwork protocol
Network protocol
PriyangaRajaram
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
Abdullaziz Tagawy
 
Computer network
Computer networkComputer network
Computer network
samiksha padgilwar
 
COMPUTER NETWORKS UNIT 3
COMPUTER NETWORKS UNIT 3COMPUTER NETWORKS UNIT 3
COMPUTER NETWORKS UNIT 3
BON SECOURS COLLEGE FOR WOMEN
 

What's hot (20)

Computer networks-3
Computer networks-3Computer networks-3
Computer networks-3
 
Class Note 01
Class Note 01Class Note 01
Class Note 01
 
Chapter 3 final
Chapter 3 finalChapter 3 final
Chapter 3 final
 
Class Note 02
Class Note 02Class Note 02
Class Note 02
 
OSI Model
OSI ModelOSI Model
OSI Model
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
Orientation to Computer Networks
Orientation to Computer NetworksOrientation to Computer Networks
Orientation to Computer Networks
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iii
 
Network and Protocol
 Network and Protocol Network and Protocol
Network and Protocol
 
Computer networks unit i
Computer networks    unit iComputer networks    unit i
Computer networks unit i
 
COMPUTER NETWORKS UNIT 1
COMPUTER NETWORKS UNIT 1COMPUTER NETWORKS UNIT 1
COMPUTER NETWORKS UNIT 1
 
Protocols
ProtocolsProtocols
Protocols
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
Computer network
Computer networkComputer network
Computer network
 
COMPUTER NETWORKS UNIT 3
COMPUTER NETWORKS UNIT 3COMPUTER NETWORKS UNIT 3
COMPUTER NETWORKS UNIT 3
 

Similar to The OSI model

tcpiposi.pptx
tcpiposi.pptxtcpiposi.pptx
tcpiposi.pptx
JustinMathew73
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
Soumo Dhali
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
183JAIDEEP
 
Basics of Ethernet
Basics of Ethernet Basics of Ethernet
Basics of Ethernet
Pushpa Yakkala
 
Osi layer model
Osi layer modelOsi layer model
Osi layer model
IshworKhatiwada
 
Osi
OsiOsi
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
Zakirul Islam
 
Osi model
Osi modelOsi model
OSI Model
OSI ModelOSI Model
Osi model
Osi modelOsi model
Osi model
MdAnikKhan
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
Maksudujjaman
 
Network Connectivity and Protocols and OSI Model
Network Connectivity and Protocols and OSI ModelNetwork Connectivity and Protocols and OSI Model
Network Connectivity and Protocols and OSI Model
Thesis Scientist Private Limited
 
Osi model
Osi modelOsi model
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
PriyankaBhattacharya28
 
Dc2 t1
Dc2 t1Dc2 t1
Open Systems Interconnection (OSI)
Open Systems Interconnection (OSI)Open Systems Interconnection (OSI)
CN_ECE_6th SEM_OSI Layer.pptx
CN_ECE_6th SEM_OSI Layer.pptxCN_ECE_6th SEM_OSI Layer.pptx
CN_ECE_6th SEM_OSI Layer.pptx
subhash750762
 
Osi model
Osi modelOsi model
Osi model
NowrinJahanSiam
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
selvakumar_b1985
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
KarthicaMarasamy
 

Similar to The OSI model (20)

tcpiposi.pptx
tcpiposi.pptxtcpiposi.pptx
tcpiposi.pptx
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
Basics of Ethernet
Basics of Ethernet Basics of Ethernet
Basics of Ethernet
 
Osi layer model
Osi layer modelOsi layer model
Osi layer model
 
Osi
OsiOsi
Osi
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 
Osi model
Osi modelOsi model
Osi model
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Osi model
Osi modelOsi model
Osi model
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
 
Network Connectivity and Protocols and OSI Model
Network Connectivity and Protocols and OSI ModelNetwork Connectivity and Protocols and OSI Model
Network Connectivity and Protocols and OSI Model
 
Osi model
Osi modelOsi model
Osi model
 
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
 
Dc2 t1
Dc2 t1Dc2 t1
Dc2 t1
 
Open Systems Interconnection (OSI)
Open Systems Interconnection (OSI)Open Systems Interconnection (OSI)
Open Systems Interconnection (OSI)
 
CN_ECE_6th SEM_OSI Layer.pptx
CN_ECE_6th SEM_OSI Layer.pptxCN_ECE_6th SEM_OSI Layer.pptx
CN_ECE_6th SEM_OSI Layer.pptx
 
Osi model
Osi modelOsi model
Osi model
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
 

More from ShofiqulIslam38

Lab Room Topology design with Cisco Packet Tracer
Lab Room Topology  design with Cisco Packet TracerLab Room Topology  design with Cisco Packet Tracer
Lab Room Topology design with Cisco Packet Tracer
ShofiqulIslam38
 
Mail Server Configure with Cisco Packet Tracer
Mail Server Configure with Cisco Packet TracerMail Server Configure with Cisco Packet Tracer
Mail Server Configure with Cisco Packet Tracer
ShofiqulIslam38
 
DNS Server configure with Cisco Packet Tracer
DNS Server configure with Cisco Packet TracerDNS Server configure with Cisco Packet Tracer
DNS Server configure with Cisco Packet Tracer
ShofiqulIslam38
 
Metropolitan Area Network(MAN) design with Cisco Packet Tracer
Metropolitan  Area Network(MAN) design with Cisco Packet TracerMetropolitan  Area Network(MAN) design with Cisco Packet Tracer
Metropolitan Area Network(MAN) design with Cisco Packet Tracer
ShofiqulIslam38
 
Hybrid Topology design with Cisco Packet Tracer
Hybrid Topology design with Cisco Packet TracerHybrid Topology design with Cisco Packet Tracer
Hybrid Topology design with Cisco Packet Tracer
ShofiqulIslam38
 
Tree Topology design with Cisco Packet Tracer
Tree Topology design with Cisco Packet TracerTree Topology design with Cisco Packet Tracer
Tree Topology design with Cisco Packet Tracer
ShofiqulIslam38
 
Ring Topology design with Cisco Packet Tracer
Ring  Topology design with Cisco Packet TracerRing  Topology design with Cisco Packet Tracer
Ring Topology design with Cisco Packet Tracer
ShofiqulIslam38
 
Bus Topology design with Cisco Packet Tracer
Bus Topology design with Cisco Packet TracerBus Topology design with Cisco Packet Tracer
Bus Topology design with Cisco Packet Tracer
ShofiqulIslam38
 
Star Topology design with Cisco Packet Tracer
Star Topology design with Cisco Packet TracerStar Topology design with Cisco Packet Tracer
Star Topology design with Cisco Packet Tracer
ShofiqulIslam38
 
Mesh Topology design with Cisco Packet Tracer
Mesh Topology design with Cisco Packet TracerMesh Topology design with Cisco Packet Tracer
Mesh Topology design with Cisco Packet Tracer
ShofiqulIslam38
 

More from ShofiqulIslam38 (10)

Lab Room Topology design with Cisco Packet Tracer
Lab Room Topology  design with Cisco Packet TracerLab Room Topology  design with Cisco Packet Tracer
Lab Room Topology design with Cisco Packet Tracer
 
Mail Server Configure with Cisco Packet Tracer
Mail Server Configure with Cisco Packet TracerMail Server Configure with Cisco Packet Tracer
Mail Server Configure with Cisco Packet Tracer
 
DNS Server configure with Cisco Packet Tracer
DNS Server configure with Cisco Packet TracerDNS Server configure with Cisco Packet Tracer
DNS Server configure with Cisco Packet Tracer
 
Metropolitan Area Network(MAN) design with Cisco Packet Tracer
Metropolitan  Area Network(MAN) design with Cisco Packet TracerMetropolitan  Area Network(MAN) design with Cisco Packet Tracer
Metropolitan Area Network(MAN) design with Cisco Packet Tracer
 
Hybrid Topology design with Cisco Packet Tracer
Hybrid Topology design with Cisco Packet TracerHybrid Topology design with Cisco Packet Tracer
Hybrid Topology design with Cisco Packet Tracer
 
Tree Topology design with Cisco Packet Tracer
Tree Topology design with Cisco Packet TracerTree Topology design with Cisco Packet Tracer
Tree Topology design with Cisco Packet Tracer
 
Ring Topology design with Cisco Packet Tracer
Ring  Topology design with Cisco Packet TracerRing  Topology design with Cisco Packet Tracer
Ring Topology design with Cisco Packet Tracer
 
Bus Topology design with Cisco Packet Tracer
Bus Topology design with Cisco Packet TracerBus Topology design with Cisco Packet Tracer
Bus Topology design with Cisco Packet Tracer
 
Star Topology design with Cisco Packet Tracer
Star Topology design with Cisco Packet TracerStar Topology design with Cisco Packet Tracer
Star Topology design with Cisco Packet Tracer
 
Mesh Topology design with Cisco Packet Tracer
Mesh Topology design with Cisco Packet TracerMesh Topology design with Cisco Packet Tracer
Mesh Topology design with Cisco Packet Tracer
 

Recently uploaded

Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 

Recently uploaded (20)

Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 

The OSI model

  • 1. The OSI Model (Open Systems Interconnection Model)
  • 2. The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoper ability between different products and software. OSI model is a tool used by IT professionals to actually model or trace the actual flow of how data transfers in networks. There are seven layers in OSI model.
  • 3.
  • 4.
  • 5.
  • 7. Functions of a Physical layer: •Line Configuration: It defines the way how two or more devices can be connected physically. •Data Transmission: It defines the transmission mode whether it is simplex, half-duplex or full-duplex mode between the two devices on the network. •Topology: It defines the way how network devices are arranged. •Signals: It determines the type of the signal used for transmitting the information.
  • 9. Functions of the Data-link layer •Framing: The data link layer translates the physical's raw bit stream into packets known as Frames. The Data link layer adds the header and trailer to the frame. The header which is added to the frame contains the hardware destination and source address. •Physical Addressing: The Data link layer adds a header to the frame that contains a destination address. The frame is transmitted to the destination address mentioned in the header. •Flow Control: Flow control is the main functionality of the Data-link layer. It is the technique through which the constant data rate is maintained on both the sides so that no data get corrupted. It ensures that the transmitting station such as a server with higher processing speed does not exceed the receiving station, with lower processing speed.
  • 10. •Error Control: Error control is achieved by adding a calculated value CRC (Cyclic Redundancy Check) that is placed to the Data link layer's trailer which is added to the message frame before it is sent to the physical layer. If any error seems to occurr, then the receiver sends the acknowledgment for the retransmission of the corrupted frames. •Access Control: When two or more devices are connected to the same communication channel, then the data link layer protocols are used to determine which device has control over the link at a given time.
  • 12. Functions of Network Layer: •Internetworking: An internetworking is the main responsibility of the network layer. It provides a logical connection between different devices. •Addressing: A Network layer adds the source and destination address to the header of the frame. Addressing is used to identify the device on the internet. •Routing: Routing is the major component of the network layer, and it determines the best optimal path out of the multiple paths from source to the destination. •Packetizing: A Network Layer receives the packets from the upper layer and converts them into packets. This process is known as Packetizing. It is achieved by internet protocol (IP).
  • 14. •Service-point addressing: Computers run several programs simultaneously due to this reason, the transmission of data from source to the destination not only from one computer to another computer but also from one process to another process. The transport layer adds the header that contains the address known as a service-point address or port address. The responsibility of the network layer is to transmit the data from one computer to another computer and the responsibility of the transport layer is to transmit the message to the correct process. •Segmentation and reassembly: When the transport layer receives the message from the upper layer, it divides the message into multiple segments, and each segment is assigned with a sequence number that uniquely identifies each segment. When the message has arrived at the destination, then the transport layer reassembles the message based on their sequence numbers.
  • 15. •Connection control: Transport layer provides two services Connection- oriented service and connectionless service. A connectionless service treats each segment as an individual packet, and they all travel in different routes to reach the destination. A connection-oriented service makes a connection with the transport layer at the destination machine before delivering the packets. In connection-oriented service, all the packets travel in the single route. •Flow control: The transport layer also responsible for flow control but it is performed end-to-end rather than across a single link. •Error control: The transport layer is also responsible for Error control. Error control is performed end-to-end rather than across the single link. The sender transport layer ensures that message reach at the destination without any error.
  • 17. Functions of Session layer: •Dialog control: Session layer acts as a dialog controller that creates a dialog between two processes or we can say that it allows the communication between two processes which can be either half-duplex or full-duplex. •Synchronization: Session layer adds some checkpoints when transmitting the data in a sequence. If some error occurs in the middle of the transmission of data, then the transmission will take place again from the checkpoint. This process is known as Synchronization and recovery.
  • 19. Functions of Presentation layer: •Translation: The processes in two systems exchange the information in the form of character strings, numbers and so on. Different computers use different encoding methods, the presentation layer handles the interoperability between the different encoding methods. It converts the data from sender-dependent format into a common format and changes the common format into receiver-dependent format at the receiving end. •Encryption: Encryption is needed to maintain privacy. Encryption is a process of converting the sender-transmitted information into another form and sends the resulting message over the network. •Compression: Data compression is a process of compressing the data, i.e., it reduces the number of bits to be transmitted. Data compression is very important in multimedia such as text, audio, video.
  • 21. Functions of Application layer: •File transfer, access, and management (FTAM): An application layer allows a user to access the files in a remote computer, to retrieve the files from a computer and to manage the files in a remote computer. •Mail services: An application layer provides the facility for email forwarding and storage. •Directory services: An application provides the distributed database sources and is used to provide that global information about various objects.