SlideShare a Scribd company logo
1 of 2
OSI REFERENCE MODEL: THE DRIVING FORCE BEHIND NETWORK
COMMUNICATION
Every message sent over the network --- even the simplest e-mail message --- must be divided
into discrete packets of data and routed via transmission media such as telephone lines. While
travelling from the sending computer to the receiving computer, each data package can take a
different path over the network. How do these messages get to their destination, intact and
accurate?
The Open System Interconnection (OSI) reference model, a communications standard developed
by the International Organization for Standardization (ISO), offers an answer. The OSI reference
model describes the flow of data in a network through seven layers, from user application to the
physical transmission media.
The top layer, the application layer, serves as the interface between the user and the network.
Using application software, such as an e-mail program, a user can type a message and specify a
recipient. The application then prepares the message doe delivery by converting the message data
into bits and attaching a header identifying the sending and receiving computers.
The presentation layer translates the converted messages data into a language the receiving
computer can process (ASCHII to EBCDIC for example ) and also may compress or encrypt the
data. Finally, the layer attaches another header specifying the language compression, and
encryption schemes.
The Session Layer, establishes and maintains communications session. A session is the period
between establishment of a connection transmission of the data, the termination , of the
connection.
The transport layer, also called the end-to-end layer, ensures that data arrives correctly and in
proper sequence. The transport layer divides the data into segments and creates a checksum, a
mathematical sum based on the data, and puts this information in the transport header. The
checksum later is used to determine if the data was scrambled during transmission.
The network layer routes the message from sender to receiver. This layer splits the data segments
from the transport layer into a smaller group of bits called packets. Next, it adds a header
containing the packet sequence, the receiving computer address, and routing information. The
network layer also manages network problems by rerouting packets to avoid network congestion.
The data link layer supervises the transmission of the message to the next network node by
specifying the network technology (such as Ethernet or token ring) and grouping data
accordingly. The data link layer, also calculates the checksum and keep a copy of each packet
until it receives confirmation that the packet arrived undamaged at the next node.
Finally, the physical layer encodes the packets into a signal recognized by the medium that will
carry them –such as an analog signal to be sent over a telephone line – and sends the packets
along that medium to receiving computer.
At the receiving computer, the process is reversed and the data moves back through the seven
layers from the physical layer to the application layer, which identifies the recipient, converts the
bits into readable data, removes some of the error-checking and control information from the
data, and directs it to the appropriate application. The next time you send process described the
OSI reference model, which ensures that your message travels safely over many networks to
your friend’s computer.

More Related Content

What's hot (20)

Mid term Topic
Mid term TopicMid term Topic
Mid term Topic
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Basic concept of networking
Basic concept of networkingBasic concept of networking
Basic concept of networking
 
OSI Draft
OSI DraftOSI Draft
OSI Draft
 
seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI model
 
Lecture2
Lecture2Lecture2
Lecture2
 
Lecture1
Lecture1Lecture1
Lecture1
 
Ch1 computer networks internet_encapsulation_4
Ch1 computer networks internet_encapsulation_4Ch1 computer networks internet_encapsulation_4
Ch1 computer networks internet_encapsulation_4
 
OSI Model
OSI ModelOSI Model
OSI Model
 
5th class
5th class5th class
5th class
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
2nd class
2nd class2nd class
2nd class
 
Class Note 01
Class Note 01Class Note 01
Class Note 01
 
OSI model
OSI modelOSI model
OSI model
 
Terms related to Computer network
Terms related to Computer networkTerms related to Computer network
Terms related to Computer network
 
Class Note 02
Class Note 02Class Note 02
Class Note 02
 
Chapter#4
Chapter#4Chapter#4
Chapter#4
 
Introduction to Networking and OSI Model
Introduction to Networking and OSI ModelIntroduction to Networking and OSI Model
Introduction to Networking and OSI Model
 
Presentation on osi layer
Presentation on osi layerPresentation on osi layer
Presentation on osi layer
 
Computer Network [OSI Model]
Computer Network [OSI Model]Computer Network [OSI Model]
Computer Network [OSI Model]
 

Similar to Osi reference model

Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptxTadeseBeyene
 
OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.muhammadsaudm19a
 
The open system Interconnection (OSI) reference.pptx
The open system Interconnection (OSI) reference.pptxThe open system Interconnection (OSI) reference.pptx
The open system Interconnection (OSI) reference.pptxwesendesta2
 
The Open Systems Interconnect (OSI) model has seven layers. this tex.pdf
The Open Systems Interconnect (OSI) model has seven layers. this tex.pdfThe Open Systems Interconnect (OSI) model has seven layers. this tex.pdf
The Open Systems Interconnect (OSI) model has seven layers. this tex.pdfharihelectronicspune
 
The OSI Reference Model layers, in order from top to bottomD. Appl.pdf
The OSI Reference Model layers, in order from top to bottomD. Appl.pdfThe OSI Reference Model layers, in order from top to bottomD. Appl.pdf
The OSI Reference Model layers, in order from top to bottomD. Appl.pdfrdtraders2007
 
OSI Reference Model
OSI Reference ModelOSI Reference Model
OSI Reference ModelAayushAryal2
 
Computer Network Unit-1 ppt
Computer Network Unit-1 pptComputer Network Unit-1 ppt
Computer Network Unit-1 pptvmdharxfr
 
DISTIBUTED OPERATING SYSTEM
DISTIBUTED  OPERATING SYSTEM DISTIBUTED  OPERATING SYSTEM
DISTIBUTED OPERATING SYSTEM AjithaG9
 
The Open Systems Interconnect (OSI) Model - IS AUDIT
The Open Systems Interconnect (OSI) Model - IS AUDITThe Open Systems Interconnect (OSI) Model - IS AUDIT
The Open Systems Interconnect (OSI) Model - IS AUDITShahzeb Pirzada
 

Similar to Osi reference model (20)

Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
 
OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.
 
Osi model
Osi modelOsi model
Osi model
 
Computer networking
Computer networkingComputer networking
Computer networking
 
The open system Interconnection (OSI) reference.pptx
The open system Interconnection (OSI) reference.pptxThe open system Interconnection (OSI) reference.pptx
The open system Interconnection (OSI) reference.pptx
 
The Open Systems Interconnect (OSI) model has seven layers. this tex.pdf
The Open Systems Interconnect (OSI) model has seven layers. this tex.pdfThe Open Systems Interconnect (OSI) model has seven layers. this tex.pdf
The Open Systems Interconnect (OSI) model has seven layers. this tex.pdf
 
OSI MODEL.pptx
OSI MODEL.pptxOSI MODEL.pptx
OSI MODEL.pptx
 
computer network basics
computer network basicscomputer network basics
computer network basics
 
The Osi Model
The Osi ModelThe Osi Model
The Osi Model
 
The OSI Reference Model layers, in order from top to bottomD. Appl.pdf
The OSI Reference Model layers, in order from top to bottomD. Appl.pdfThe OSI Reference Model layers, in order from top to bottomD. Appl.pdf
The OSI Reference Model layers, in order from top to bottomD. Appl.pdf
 
Assignment3
Assignment3Assignment3
Assignment3
 
OSI Reference Model
OSI Reference ModelOSI Reference Model
OSI Reference Model
 
Computer Network Unit-1 ppt
Computer Network Unit-1 pptComputer Network Unit-1 ppt
Computer Network Unit-1 ppt
 
Notes on Class 3
Notes on Class 3Notes on Class 3
Notes on Class 3
 
DISTIBUTED OPERATING SYSTEM
DISTIBUTED  OPERATING SYSTEM DISTIBUTED  OPERATING SYSTEM
DISTIBUTED OPERATING SYSTEM
 
The Open Systems Interconnect (OSI) Model - IS AUDIT
The Open Systems Interconnect (OSI) Model - IS AUDITThe Open Systems Interconnect (OSI) Model - IS AUDIT
The Open Systems Interconnect (OSI) Model - IS AUDIT
 
Class notes 1
Class notes 1Class notes 1
Class notes 1
 
Osi model
Osi modelOsi model
Osi model
 
Osi model
Osi modelOsi model
Osi model
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Osi reference model

  • 1. OSI REFERENCE MODEL: THE DRIVING FORCE BEHIND NETWORK COMMUNICATION Every message sent over the network --- even the simplest e-mail message --- must be divided into discrete packets of data and routed via transmission media such as telephone lines. While travelling from the sending computer to the receiving computer, each data package can take a different path over the network. How do these messages get to their destination, intact and accurate? The Open System Interconnection (OSI) reference model, a communications standard developed by the International Organization for Standardization (ISO), offers an answer. The OSI reference model describes the flow of data in a network through seven layers, from user application to the physical transmission media. The top layer, the application layer, serves as the interface between the user and the network. Using application software, such as an e-mail program, a user can type a message and specify a recipient. The application then prepares the message doe delivery by converting the message data into bits and attaching a header identifying the sending and receiving computers. The presentation layer translates the converted messages data into a language the receiving computer can process (ASCHII to EBCDIC for example ) and also may compress or encrypt the data. Finally, the layer attaches another header specifying the language compression, and encryption schemes. The Session Layer, establishes and maintains communications session. A session is the period between establishment of a connection transmission of the data, the termination , of the connection. The transport layer, also called the end-to-end layer, ensures that data arrives correctly and in proper sequence. The transport layer divides the data into segments and creates a checksum, a mathematical sum based on the data, and puts this information in the transport header. The checksum later is used to determine if the data was scrambled during transmission. The network layer routes the message from sender to receiver. This layer splits the data segments from the transport layer into a smaller group of bits called packets. Next, it adds a header containing the packet sequence, the receiving computer address, and routing information. The network layer also manages network problems by rerouting packets to avoid network congestion. The data link layer supervises the transmission of the message to the next network node by specifying the network technology (such as Ethernet or token ring) and grouping data accordingly. The data link layer, also calculates the checksum and keep a copy of each packet until it receives confirmation that the packet arrived undamaged at the next node.
  • 2. Finally, the physical layer encodes the packets into a signal recognized by the medium that will carry them –such as an analog signal to be sent over a telephone line – and sends the packets along that medium to receiving computer. At the receiving computer, the process is reversed and the data moves back through the seven layers from the physical layer to the application layer, which identifies the recipient, converts the bits into readable data, removes some of the error-checking and control information from the data, and directs it to the appropriate application. The next time you send process described the OSI reference model, which ensures that your message travels safely over many networks to your friend’s computer.