SlideShare une entreprise Scribd logo
1  sur  20
OSI Model
   Open Systems Interconnection (OSI) is a set
    of internationally recognized, non-proprietary
    standards for networking and for operating
    system involved in networking functions.
7 Layers
7. Application Layer
                                 All
2.   Presentation Layer          People
3.   Session Layer               Seem
4.   Transport Layer             To
5.   Network Layer
                                 Need
                                 Data
6.   Data Link Layer
                                 Processing
7.   Physical Layer
Tasks involved in sending letter
LAYER 7 – The APPLICATION
              Layer
• The top layer of the OSI model
• Provides a set of interfaces for sending and
  receiving applications to gain access to and
  use network services, such as: networked file
  transfer, message handling and database
  query processing
• The application layer is responsible for
      providing services to the user.
LAYER 6 – The PRESENTATION Layer
•       Manages data-format information for networked
     communications (the network’s translator)
•        For outgoing messages, it converts data into a generic format
     for network transmission; for incoming messages, it converts data
     from the generic network format to a format that the receiving
     application can understand
•        This layer is also responsible for certain protocol conversions,
     data encryption/decryption, or data compression/decompression
•        A special software facility called a “redirector” operates at this
     layer to determine if a request is network related on not and
     forward network-related requests to an appropriate network
     resource
• The presentation layer is responsible for translation,
            compression, and encryption.
LAYER 5 – The SESSION Layer

•      Enables two networked resources to hold ongoing
    communications (called a session) across a network
•      Applications on either end of the session are able to ex
    hange data for the duration of the session
•      This layer is:
•       Responsible for initiating, maintaining and terminating
    sessions
•       Responsible for security and access control to session
    information (via session participant identification)
•      Responsible for synchronization services, and for
    checkpoint services
• The session layer is responsible for dialog
        control and synchronization.
LAYER 4 – The TRANSPORT Layer

•      Manages the transmission of data across a network
•       Manages the flow of data between parties by
    segmenting long data streams into smaller data chunks
    (based on allowed “packet” size for a given
    transmission medium)
•      Reassembles chunks into their original sequence at
    the receiving end
•       Provides acknowledgements of successful
    transmissions and requests resends for packets which
    arrive with errors
• The transport layer is responsible for the delivery
     of a message from one process to another.
LAYER 3 – The NETWORK Layer

•     Handles addressing messages for delivery, as
    well as translating logical network addresses and
    names into their physical counterparts
•      Responsible for deciding how to route
    transmissions between computers
•      This layer also handles the decisions needed
    to get data from one point to the next point along
    a network path
•      This layer also handles packet switching and
    network congestion control
• The network layer is responsible for the
    delivery of individual packets from
• the source host to the destination host.
LAYER 2 – The DATA LINK Layer

•      Handles special data frames (packets) between
    the Network layer and the Physical layer
•      At the receiving end, this layer packages raw
    data from the physical layer into data frames for
    delivery to the Network layer
•      At the sending end this layer handles
    conversion of data into raw formats that can be
    handled by the Physical Layer
• The data link layer is responsible for moving
    frames from one hop (node) to the next.
LAYER 1 – The PHYSICAL Layer

•       Converts bits into electronic signals for outgoing messages
•       Converts electronic signals into bits for incoming messages
•       This layer manages the interface between the the computer and
    the network medium (coax, twisted pair, etc.)
•       This layer tells the driver software for the MAU (media
    attachment unit, ex. network interface cards (NICs, modems, etc.))
    what needs to be sent across the medium
•       The bottom layer of the OSI model
•
• The physical layer is responsible for movements of
 • individual bits from one hop (node) to the next.
Remember
• A convenient aid for remembering the OSI
  layer names is to use the first letter of each
  word in the phrase:
•    All People Seem To Need Data Processing
4.osi model

Contenu connexe

Tendances

Types of Network
Types of NetworkTypes of Network
Types of NetworkAvishek Kar
 
Classification of Networks & Network topologies
Classification of Networks & Network topologiesClassification of Networks & Network topologies
Classification of Networks & Network topologiesPriyanka Nain
 
Communication and computer networks
Communication and computer networksCommunication and computer networks
Communication and computer networksRabail Khowaja
 
Network and types of network
Network and types of networkNetwork and types of network
Network and types of networkvivek jain
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking FundamentalsManjit Chavda
 
Categorize computer networks
Categorize computer networksCategorize computer networks
Categorize computer networksmyrajendra
 
Computer network
Computer networkComputer network
Computer networkAbdul Wahab
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networksHaider Ali Malik
 
Basic Concepts of Networking
Basic Concepts of NetworkingBasic Concepts of Networking
Basic Concepts of NetworkingVivin NL
 

Tendances (20)

COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 
Lan architecture
Lan architectureLan architecture
Lan architecture
 
Types of Network
Types of NetworkTypes of Network
Types of Network
 
Classification of Networks & Network topologies
Classification of Networks & Network topologiesClassification of Networks & Network topologies
Classification of Networks & Network topologies
 
types of network
types of networktypes of network
types of network
 
Communication and computer networks
Communication and computer networksCommunication and computer networks
Communication and computer networks
 
3.1.2 classification of network
3.1.2 classification of network3.1.2 classification of network
3.1.2 classification of network
 
Network and types of network
Network and types of networkNetwork and types of network
Network and types of network
 
Computer network
Computer networkComputer network
Computer network
 
Computer network
Computer networkComputer network
Computer network
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Computer networks
Computer networksComputer networks
Computer networks
 
Categorize computer networks
Categorize computer networksCategorize computer networks
Categorize computer networks
 
Computer network
Computer networkComputer network
Computer network
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Networking lec1 4
Networking lec1 4Networking lec1 4
Networking lec1 4
 
Basic Concepts of Networking
Basic Concepts of NetworkingBasic Concepts of Networking
Basic Concepts of Networking
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Computer networks
Computer networksComputer networks
Computer networks
 
Computer networks
Computer networksComputer networks
Computer networks
 

En vedette

En vedette (7)

Pcm pulse codemodulation-2
Pcm pulse codemodulation-2Pcm pulse codemodulation-2
Pcm pulse codemodulation-2
 
Primena racunara vezba 1 - ovladavanje windowsom new
Primena racunara   vezba 1 - ovladavanje windowsom newPrimena racunara   vezba 1 - ovladavanje windowsom new
Primena racunara vezba 1 - ovladavanje windowsom new
 
II prezentacija pdf
II prezentacija pdfII prezentacija pdf
II prezentacija pdf
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
1 multiplexing
1 multiplexing1 multiplexing
1 multiplexing
 
Rip ospf and bgp
Rip ospf and bgpRip ospf and bgp
Rip ospf and bgp
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 

Similaire à 4.osi model (20)

osi-model (open source interconnection)
osi-model (open source interconnection)osi-model (open source interconnection)
osi-model (open source interconnection)
 
Osi model
Osi modelOsi model
Osi model
 
Osi model
Osi modelOsi model
Osi model
 
UNIT 3 -OSI Model.ppt
UNIT 3 -OSI Model.pptUNIT 3 -OSI Model.ppt
UNIT 3 -OSI Model.ppt
 
Osi model(open system interconnection)
Osi model(open system interconnection)Osi model(open system interconnection)
Osi model(open system interconnection)
 
iso osi model
 iso osi model iso osi model
iso osi model
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
 
isoosimodel
isoosimodelisoosimodel
isoosimodel
 
open system interconnection referencemodel.ppt
open system interconnection referencemodel.pptopen system interconnection referencemodel.ppt
open system interconnection referencemodel.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
ch5-osi.pdf
ch5-osi.pdfch5-osi.pdf
ch5-osi.pdf
 
OSI layer (Network)
OSI layer (Network)OSI layer (Network)
OSI layer (Network)
 
Osi model
Osi modelOsi model
Osi model
 
Osi model
Osi modelOsi model
Osi model
 
OSI model
OSI modelOSI model
OSI model
 
Osi layer model
Osi layer modelOsi layer model
Osi layer model
 
The osi model
The osi modelThe osi model
The osi model
 
The OSI Model
The OSI ModelThe OSI Model
The OSI Model
 
Osi model
Osi modelOsi model
Osi model
 

Plus de Akshay Nagpurkar (20)

L6 mecse ncc
L6 mecse nccL6 mecse ncc
L6 mecse ncc
 
1 ip address
1 ip address1 ip address
1 ip address
 
1.network topology
1.network topology1.network topology
1.network topology
 
Dcunit4 transmission media
Dcunit4 transmission mediaDcunit4 transmission media
Dcunit4 transmission media
 
Ppl for students unit 4 and 5
Ppl for students unit 4 and 5Ppl for students unit 4 and 5
Ppl for students unit 4 and 5
 
Ppl for students unit 1,2 and 3
Ppl for students unit 1,2 and 3Ppl for students unit 1,2 and 3
Ppl for students unit 1,2 and 3
 
Ppl for students unit 4 and 5
Ppl for students unit 4 and 5Ppl for students unit 4 and 5
Ppl for students unit 4 and 5
 
234 rb trees2x2
234 rb trees2x2234 rb trees2x2
234 rb trees2x2
 
Ppl home assignment_unit4
Ppl home assignment_unit4Ppl home assignment_unit4
Ppl home assignment_unit4
 
Ppl home assignment_unit5
Ppl home assignment_unit5Ppl home assignment_unit5
Ppl home assignment_unit5
 
3 multiplexing-wdm
3 multiplexing-wdm3 multiplexing-wdm
3 multiplexing-wdm
 
2 multiplexing
2 multiplexing2 multiplexing
2 multiplexing
 
Modulation techniq of modem
Modulation techniq of modemModulation techniq of modem
Modulation techniq of modem
 
Ppl home assignment_unit3
Ppl home assignment_unit3Ppl home assignment_unit3
Ppl home assignment_unit3
 
Ppl home assignment_unit2
Ppl home assignment_unit2Ppl home assignment_unit2
Ppl home assignment_unit2
 
Ppl home assignment_unit1
Ppl home assignment_unit1Ppl home assignment_unit1
Ppl home assignment_unit1
 
Ppl syllabus new
Ppl syllabus newPpl syllabus new
Ppl syllabus new
 
Ppl for students unit 1,2 and 3
Ppl for students unit 1,2 and 3Ppl for students unit 1,2 and 3
Ppl for students unit 1,2 and 3
 
Pentium
PentiumPentium
Pentium
 
Mpmc
MpmcMpmc
Mpmc
 

Dernier

MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

4.osi model

  • 2. Open Systems Interconnection (OSI) is a set of internationally recognized, non-proprietary standards for networking and for operating system involved in networking functions.
  • 3. 7 Layers 7. Application Layer All 2. Presentation Layer People 3. Session Layer Seem 4. Transport Layer To 5. Network Layer Need Data 6. Data Link Layer Processing 7. Physical Layer
  • 4. Tasks involved in sending letter
  • 5. LAYER 7 – The APPLICATION Layer • The top layer of the OSI model • Provides a set of interfaces for sending and receiving applications to gain access to and use network services, such as: networked file transfer, message handling and database query processing
  • 6. • The application layer is responsible for providing services to the user.
  • 7. LAYER 6 – The PRESENTATION Layer • Manages data-format information for networked communications (the network’s translator) • For outgoing messages, it converts data into a generic format for network transmission; for incoming messages, it converts data from the generic network format to a format that the receiving application can understand • This layer is also responsible for certain protocol conversions, data encryption/decryption, or data compression/decompression • A special software facility called a “redirector” operates at this layer to determine if a request is network related on not and forward network-related requests to an appropriate network resource
  • 8. • The presentation layer is responsible for translation, compression, and encryption.
  • 9. LAYER 5 – The SESSION Layer • Enables two networked resources to hold ongoing communications (called a session) across a network • Applications on either end of the session are able to ex hange data for the duration of the session • This layer is: • Responsible for initiating, maintaining and terminating sessions • Responsible for security and access control to session information (via session participant identification) • Responsible for synchronization services, and for checkpoint services
  • 10. • The session layer is responsible for dialog control and synchronization.
  • 11. LAYER 4 – The TRANSPORT Layer • Manages the transmission of data across a network • Manages the flow of data between parties by segmenting long data streams into smaller data chunks (based on allowed “packet” size for a given transmission medium) • Reassembles chunks into their original sequence at the receiving end • Provides acknowledgements of successful transmissions and requests resends for packets which arrive with errors
  • 12. • The transport layer is responsible for the delivery of a message from one process to another.
  • 13. LAYER 3 – The NETWORK Layer • Handles addressing messages for delivery, as well as translating logical network addresses and names into their physical counterparts • Responsible for deciding how to route transmissions between computers • This layer also handles the decisions needed to get data from one point to the next point along a network path • This layer also handles packet switching and network congestion control
  • 14. • The network layer is responsible for the delivery of individual packets from • the source host to the destination host.
  • 15. LAYER 2 – The DATA LINK Layer • Handles special data frames (packets) between the Network layer and the Physical layer • At the receiving end, this layer packages raw data from the physical layer into data frames for delivery to the Network layer • At the sending end this layer handles conversion of data into raw formats that can be handled by the Physical Layer
  • 16. • The data link layer is responsible for moving frames from one hop (node) to the next.
  • 17. LAYER 1 – The PHYSICAL Layer • Converts bits into electronic signals for outgoing messages • Converts electronic signals into bits for incoming messages • This layer manages the interface between the the computer and the network medium (coax, twisted pair, etc.) • This layer tells the driver software for the MAU (media attachment unit, ex. network interface cards (NICs, modems, etc.)) what needs to be sent across the medium • The bottom layer of the OSI model •
  • 18. • The physical layer is responsible for movements of • individual bits from one hop (node) to the next.
  • 19. Remember • A convenient aid for remembering the OSI layer names is to use the first letter of each word in the phrase: • All People Seem To Need Data Processing