SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
Presented by: Eng. Ahmed Atef Elnaggar
Supervisor: Prof. Shawkat K.Guirguis
Department of Information Technology, Institute of Graduate Studies and Research, University of Alexandria, Egypt.
REFERENCE MODELS
OSI
model
layer
OSI model
name
Layer
Mnemonic
Function Protocols Words to remember
Hardware
Equipment
Equipment
Purpose
PDU
(Protocol
Data Unit)
TCP/IP
Model
Hybrid
Model
7 Application All away
This layer supports application and end-user processes.
Communication partners are identified, quality of service is identified,
user authentication and privacy are considered, and any constraints on
data syntax are identified. Everything at this layer is application-
specific. This layer provides application services for file transfers, e-
mail, and other network software services. Telnet and FTP are
applications that exist entirely in the application level. Tiered
application architectures are part of this layer.
HTTP (80,8080),
HTTPS (443),
TFTP (69),
FTP (20, 21),
IMAP (143),SMTP (25),
POP3 (110),SSH (22),
Telnet (23), DNS (53)
DHCP (67,68)
User interface,
Application,
Browser,
Represent data to user
Computer,
Gateway,
Firewall
Regular computer or
special gateway used to
combine network using
different communication
protocols, filtering traffic
APDU
(Encoded)
Application Application
6 presentation people pizza
This layer provides independence from differences in data
representation (e.g., encryption) by translating from application to
network format, and vice versa. The presentation layer works to
transform data into the form that the application layer can accept. This
layer formats and encrypts data to be sent across a network, providing
freedom from compatibility problems. It is sometimes called the
syntax layer.
MIME,
XDR,
SSL,
ASCII/EBCDIC,
JPEG,
MP3
Data format,
Coding,
Conversion,
Compression,
Language, Decryption
Encoding, Encryption
Computer,
Gateway
redirector
PPDU
Charter
5 Session seem sausage
This layer establishes, manages and terminates connections between
applications. The session layer sets up, coordinates, and terminates
conversations, exchanges, and dialogues between the applications at
each end. It deals with session and connection coordination.
NFS , SQL, RPC,
Named Pipes,
NetBIOS, SAP
User session (Establish,
Restart ,End)
Dialogues,
Data exchange,
Computer,
Gateway SPDU
4 Transport to throw
This layer provides transparent transfer of data between end systems,
or hosts, and is responsible for end-to-end error recovery and flow
control. It ensures complete data transfer.
TCP: transaction
control protocol
20 bytes Protocol 6
UDP: User data gram
8 bytes Protocol 17
TCP, UDP, Process address,
Segment, Encapsulation,
Reassemble, Decapsulation
Computer,
Advanced cable
tester, Brouter
TPDU
Segment
Transport Transport
3 Network need not
This layer provides switching and routing technologies, creating
logical paths, known as virtual circuits, for transmitting data from node
to node. Routing and forwarding are functions of this layer, as well as
addressing, internetworking, error handling, congestion control and
packet sequencing.
IPv4 (32bits), IPSec,
IPX, IPv6, RIP
Apple talk, ICMP,
ARP (48 bits), BGP,
RARP
Route, static or dynamic,
congestion ctrl,
IP, best path,
Logical address,
quality of service
Router,
Brouter, Frame
relay device,
ATM switch
Segment network into
smaller broadcast
domains.
packets Internet Network
2 Data link data do
At this layer, data packets are encoded and decoded into bits. It
furnishes transmission protocol knowledge and management and
handles errors in the physical layer, flow control and frame
synchronization. The data link layer is divided into two sub layers: The
Media Access Control (MAC) layer and the Logical Link Control
(LLC) layer. The MAC sub layer controls how a computer on the
network gains access to the data and permission to transmit it. The
LLC layer controls frame synchronization, flow control and error
checking.
Circuit switching,
Packet switching,
Ethernet, WIFI,
Token Ring, ATM,
FDDI, Frame Relay,
WAN, HDLC,
LLC 802.2,
MAC 802.3,802.5,
PPP, PPTP, L2TP
transmission errors, MAC
medium access control,
Flow control, Error check
Circuit switching,
Packet switching,
Framing, CRC
Physical address
WPA,WEP
Bridge, Switch,
NIC, ISDN
router,
Intelligent hub
Segment network into
smaller collision domains frames
Host to
network
Data link
1 Physical processing please
This layer conveys the bit stream – electrical impulse, light or radio
signal — through the network at the electrical and mechanical level. It
provides the hardware means of sending and receiving data on a
carrier, including defining cables, cards and physical aspects. Fast
Ethernet, RS232, and ATM are protocols with physical layer
components.
Bits,
RS 232,
V .35,
T1, E1, ISDN,
POTS, SONET,
DSL,
EIA/TIA
Bits, volts, 1 or 0, Cabling,
nanoseconds, transmission
directions, pins, Connector
mechanical, electrical, timing
and physical properties.
Repeaters,
Hubs, Multi-
port cabling,
Multiplexer,
TDR hubs
Oscilloscope,
Amplify
One collision and one
broadcast domain.
Bit Physical
Communication subnet boundary
The Open Systems Interconnection(OSI) model (ISO/IEC 7498-1) is a product of the Open Systems Interconnection effort at the International Organization for Standardization, It was provided by the work of Charles Bachman, Honeywell Info. Services by 1977.
TCP/IP request for Comments (RFC) 791 and 793 which was initially designed to meet the data communication needs of the U.S. Department of Defense (DOD), It was provided by the Advanced Research Projects Agency (ARPA, now called DARPA) of the U.S by 1969.
We will use the hybrid reference model as the framework.

Contenu connexe

Tendances

Computer network (Lecture 1)
Computer network (Lecture 1)Computer network (Lecture 1)
Computer network (Lecture 1)
Vishwajit Nandi
 

Tendances (20)

predicate logic example
predicate logic examplepredicate logic example
predicate logic example
 
IEEE 802 standards
IEEE 802 standardsIEEE 802 standards
IEEE 802 standards
 
2. data and signals
2. data and signals2. data and signals
2. data and signals
 
Physical layer ppt
Physical layer pptPhysical layer ppt
Physical layer ppt
 
Osi model in networking
Osi model in networkingOsi model in networking
Osi model in networking
 
Remote login
Remote loginRemote login
Remote login
 
HOPFIELD NETWORK
HOPFIELD NETWORKHOPFIELD NETWORK
HOPFIELD NETWORK
 
neural network
neural networkneural network
neural network
 
If then rule in fuzzy logic and fuzzy implications
If then rule  in fuzzy logic and fuzzy implicationsIf then rule  in fuzzy logic and fuzzy implications
If then rule in fuzzy logic and fuzzy implications
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
 
Tcp and udp ports
Tcp and udp portsTcp and udp ports
Tcp and udp ports
 
Socket Programming
Socket ProgrammingSocket Programming
Socket Programming
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Computer network (Lecture 1)
Computer network (Lecture 1)Computer network (Lecture 1)
Computer network (Lecture 1)
 
Data communication - Lecture-01
Data communication - Lecture-01 Data communication - Lecture-01
Data communication - Lecture-01
 
Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)
 
Layered Architecture
Layered ArchitectureLayered Architecture
Layered Architecture
 
Parallel computing
Parallel computingParallel computing
Parallel computing
 
Defuzzification
DefuzzificationDefuzzification
Defuzzification
 
Data comm and networking
Data comm and networkingData comm and networking
Data comm and networking
 

En vedette

Osi model explained with wireshark
Osi model explained with wiresharkOsi model explained with wireshark
Osi model explained with wireshark
Joshua Kathiravan
 
Network topology....sajal
Network topology....sajalNetwork topology....sajal
Network topology....sajal
Sajal Das
 
Intelligent networks
Intelligent networksIntelligent networks
Intelligent networks
Akhil Kumar
 
جدران الحماية
جدران الحمايةجدران الحماية
جدران الحماية
alimashi
 
Intelligent Networks
Intelligent NetworksIntelligent Networks
Intelligent Networks
Faraz Shahid
 

En vedette (20)

Osi model explained with wireshark
Osi model explained with wiresharkOsi model explained with wireshark
Osi model explained with wireshark
 
Topologies
TopologiesTopologies
Topologies
 
Network topology....sajal
Network topology....sajalNetwork topology....sajal
Network topology....sajal
 
Wireshark - presentation
Wireshark - presentationWireshark - presentation
Wireshark - presentation
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Atm
AtmAtm
Atm
 
Intelligent networks
Intelligent networksIntelligent networks
Intelligent networks
 
Semantic web
Semantic webSemantic web
Semantic web
 
Mobile commerce
Mobile commerceMobile commerce
Mobile commerce
 
Congestionin Data Networks
Congestionin Data NetworksCongestionin Data Networks
Congestionin Data Networks
 
جدران الحماية
جدران الحمايةجدران الحماية
جدران الحماية
 
Firewall
FirewallFirewall
Firewall
 
Mobile commerce 2
Mobile commerce 2Mobile commerce 2
Mobile commerce 2
 
NETWORK TOPOLOGIES
NETWORK TOPOLOGIESNETWORK TOPOLOGIES
NETWORK TOPOLOGIES
 
Forouzan isdn
Forouzan isdnForouzan isdn
Forouzan isdn
 
4G
4G4G
4G
 
Object-oriented analysis and design
Object-oriented analysis and designObject-oriented analysis and design
Object-oriented analysis and design
 
Intelligent Networks
Intelligent NetworksIntelligent Networks
Intelligent Networks
 
Introduction to PROFINET - Derek Lane of Wago
Introduction to PROFINET -  Derek Lane of WagoIntroduction to PROFINET -  Derek Lane of Wago
Introduction to PROFINET - Derek Lane of Wago
 

Similaire à OSI layers

Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)
Sri Prasanna
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
ahmady
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdf
Arumugam90
 

Similaire à OSI layers (20)

nv.ppt
nv.pptnv.ppt
nv.ppt
 
Chapter 5 introduction to computer communication networks
Chapter 5   introduction to computer communication networksChapter 5   introduction to computer communication networks
Chapter 5 introduction to computer communication networks
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area Networks
 
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network ModelsSYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
OSI (open systems interconnection) Model
OSI (open systems interconnection) ModelOSI (open systems interconnection) Model
OSI (open systems interconnection) Model
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdf
 
Jaimin chp-1 - introduction - 2011 batch
Jaimin   chp-1  - introduction - 2011 batchJaimin   chp-1  - introduction - 2011 batch
Jaimin chp-1 - introduction - 2011 batch
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day 1
Ccna day 1Ccna day 1
Ccna day 1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

OSI layers

  • 1. Presented by: Eng. Ahmed Atef Elnaggar Supervisor: Prof. Shawkat K.Guirguis Department of Information Technology, Institute of Graduate Studies and Research, University of Alexandria, Egypt. REFERENCE MODELS OSI model layer OSI model name Layer Mnemonic Function Protocols Words to remember Hardware Equipment Equipment Purpose PDU (Protocol Data Unit) TCP/IP Model Hybrid Model 7 Application All away This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application- specific. This layer provides application services for file transfers, e- mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer. HTTP (80,8080), HTTPS (443), TFTP (69), FTP (20, 21), IMAP (143),SMTP (25), POP3 (110),SSH (22), Telnet (23), DNS (53) DHCP (67,68) User interface, Application, Browser, Represent data to user Computer, Gateway, Firewall Regular computer or special gateway used to combine network using different communication protocols, filtering traffic APDU (Encoded) Application Application 6 presentation people pizza This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer. MIME, XDR, SSL, ASCII/EBCDIC, JPEG, MP3 Data format, Coding, Conversion, Compression, Language, Decryption Encoding, Encryption Computer, Gateway redirector PPDU Charter 5 Session seem sausage This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination. NFS , SQL, RPC, Named Pipes, NetBIOS, SAP User session (Establish, Restart ,End) Dialogues, Data exchange, Computer, Gateway SPDU 4 Transport to throw This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer. TCP: transaction control protocol 20 bytes Protocol 6 UDP: User data gram 8 bytes Protocol 17 TCP, UDP, Process address, Segment, Encapsulation, Reassemble, Decapsulation Computer, Advanced cable tester, Brouter TPDU Segment Transport Transport 3 Network need not This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing. IPv4 (32bits), IPSec, IPX, IPv6, RIP Apple talk, ICMP, ARP (48 bits), BGP, RARP Route, static or dynamic, congestion ctrl, IP, best path, Logical address, quality of service Router, Brouter, Frame relay device, ATM switch Segment network into smaller broadcast domains. packets Internet Network 2 Data link data do At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking. Circuit switching, Packet switching, Ethernet, WIFI, Token Ring, ATM, FDDI, Frame Relay, WAN, HDLC, LLC 802.2, MAC 802.3,802.5, PPP, PPTP, L2TP transmission errors, MAC medium access control, Flow control, Error check Circuit switching, Packet switching, Framing, CRC Physical address WPA,WEP Bridge, Switch, NIC, ISDN router, Intelligent hub Segment network into smaller collision domains frames Host to network Data link 1 Physical processing please This layer conveys the bit stream – electrical impulse, light or radio signal — through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components. Bits, RS 232, V .35, T1, E1, ISDN, POTS, SONET, DSL, EIA/TIA Bits, volts, 1 or 0, Cabling, nanoseconds, transmission directions, pins, Connector mechanical, electrical, timing and physical properties. Repeaters, Hubs, Multi- port cabling, Multiplexer, TDR hubs Oscilloscope, Amplify One collision and one broadcast domain. Bit Physical Communication subnet boundary The Open Systems Interconnection(OSI) model (ISO/IEC 7498-1) is a product of the Open Systems Interconnection effort at the International Organization for Standardization, It was provided by the work of Charles Bachman, Honeywell Info. Services by 1977. TCP/IP request for Comments (RFC) 791 and 793 which was initially designed to meet the data communication needs of the U.S. Department of Defense (DOD), It was provided by the Advanced Research Projects Agency (ARPA, now called DARPA) of the U.S by 1969. We will use the hybrid reference model as the framework.