SlideShare a Scribd company logo
1 of 47
Download to read offline
OSI MODEL
Dr R Jegadeesan Prof & Head
Jyothishmathi Institute of Technology and Science,
karimnagar
1
• In the earliest era of networking, computers
could usually communicate only with
computers, which were from the similar
manufacturer.
• The purpose of OSI model is to show how to
facilitate communication between different
systems without requiring changes to its
underlying Hardware and Software.
2
• This model was developed by International
Standard Organization (ISO) in 1970’s
• OSI had two major components
➢ the Basic Reference Model or seven-layer
model
➢ set of specific protocols
• It is called as open system interconnection
because it is a system which is open for
communication with other systems
3
7 Layers of OSI model
• Layer 7. Application Layer
• Layer 6. Presentation Layer
• Layer 5. Session Layer
• Layer 4. Transport Layer
• Layer 3. Network Layer
• Layer 2. Data Link Layer
• Layer 1. Physical Layer
• PDNTSPA (Please Do Not Throw Sauce
Pizza Away)
4
5
• OSI model consists of 7 layers which is corresponds
to 3 sub groups
• First 3 layers---Physical, Data, Network layers are
network support layers
• They perform
➢physical connection
➢communication
➢transport timing from one device to another device
6
• The last three layers i.e session,presentation
application layers are user support layers
• They perform
➢Interoperability between unrelated software
systems
7
• The fourth layer called Transport layer
ensures that the transmitted data from lower
layers is in the required form as upper layers
need.
➢The upper three layers are implemented in
software.
➢The lower three layers are a combination of
hardware and software.
➢Physical layer is almost hardware.
8
Physical layer
• The physical layer is responsible for movements
of individual bits from one hop (node) to the
next.
• The physical layer coordinates the functions
required to carry a bit stream over a physical
medium.
9
The physical layer is also concerned with the
following:
• Physical characteristics of interfaces and
medium
• Representation of bits
• Data rate
• Line configuration
• Physical topology
• Transmission mode.
• Synchronization of bits
10
• Physical characteristics of interfaces and
medium:
The physical layer defines the
characteristics of the interface between the
devices and the transmission medium. It also
defines the type of transmission medium
• Representation of bits
The physical layer data
consists of a stream of bits (sequence of Os or 1s)
with no interpretation. To be transmitted, bits
must be encoded into signals--electrical or optical.
The physical layer defines the type of encoding
(how Os and 1 s are changed to signals).
11
• Data rate
➢ The transmission rate-the number of bits sent each
second-is also defined by the physical layer.
➢ In other words, the physical layer defines the duration
of a bit, which is how long it lasts.
Line configuration
➢ The physical layer is concerned with the connection of
devices to the media.
➢ In a point-to-point configuration, two devices are
connected through a dedicated link.
➢ In a multipoint configuration, a link is shared among
several devices.
12
• Physical topology
The physical topology defines how
devices are connected to make a network. Devices
can be connected by using a mesh topology (every
device is connected to every other device), a star
topology (devices are connected through a central
device), a ring topology (each device is connected to
the next, forming a ring), a bus topology (every
device is on a common link), or a hybrid topology
(this is a combination of two or more topologies).
• Transmission mode.
The physical layer also defines the direction of
transmission between two devices: simplex, half-
duplex, or full-duplex.
13
• Synchronization of bits
• The sender and receiver must use the same
bit rate.
• In other words, the sender and the receiver
clocks must be synchronized.
14
Data Link Layer
• The data link layer is responsible for moving
frames from one hop (node) to the next.
• The data link layer is often conceptually
divided into two sub layers:
➢ Logical Link Control (LLC)
➢ Media Access Control (MAC)
• It makes the physical layer appear error-free to
the upper layer (network layer)
15
• Logical link control refers to the functions
required for the establishment and control of
logical links between local devices on a
network.
• Media Access Control (MAC).
This refers to the procedures used
by devices to control access to the network
medium. Since many networks use a shared
medium it is necessary to have rules for
managing the medium to avoid conflicts
16
• Other responsibilities of the data link layer
include the following
• Framing
• Physical addressing.
• Flow control
• Error control
• Access control
17
Framing
The data link layer divides the stream of bits received
from the network layer into manageable data units
called frames.
Physical addressing
If frames are to be distributed to different systems on
the network, the data link layer adds a header to the
frame to define the sender and/or receiver of the frame.
18
• Flow control.
If the rate at which the data are absorbed by the receiver
is less than the rate at which data are produced in the
sender, the data link layer imposes a flow control
mechanism (Stop-and-Wait and Sliding Window) to
avoid overwhelming the receiver.
• Error control
The data link layer adds reliability to the physical layer
by adding mechanisms to detect and retransmit damaged
or lost frames. It also uses a mechanism to recognize
duplicate frames. Error control is normally achieved
through a trailer added to the end of the frame.
19
• Access control.
When two or more devices are connected to
the same link, data link layer protocols
determines which device has control over the
link at any given time.
20
Network layer
• The network layer is responsible for the
delivery of individual packets from the source
host to the destination host.
• The data link layer oversees the delivery of
the frames between two systems on the same
network (links), the network layer ensures
that each packet gets from its point of origin
to its final destination.
21
• If two systems are connected to the same link,
there is usually no need for a network layer.
However, if the two systems are attached to
different networks (links) with connecting
devices between the networks (links), there is
often a need for the network layer to
accomplish source-to-destination delivery.
22
Other responsibilities of the network layer
include the following
• Logical addressing
• Routing
23
Logical addressing
➢ The physical addressing implemented by the
data link layer handles the addressing problem
locally.
➢If a packet passes the network boundary, we
need another addressing system to help
distinguish the source and destination systems.
➢ The network layer adds a header to the packet
coming from the upper layer that, among other
things, includes the logical addresses of the
sender and receiver.
24
Routing
• When independent networks or links are
connected to create internetworks (network of
networks) or a large network, the connecting
devices (called routers or switches) route or
switch the packets to their final destination.
This is called routing.
25
Transport Layer
• The transport layer is responsible for the delivery
of a message from one process to another.
• A process is an application program running on a
host.
• Application programs include word processors;
database programs; Web browsers; drawing,
paint, and image editing programs; and social
communication application programs
26
• The network layer supervise source-to-
destination delivery of individual packets, it does
not recognize any relationship between those
packets. It treats each one independently, as
though each piece belonged to a separate
message, whether or not it does.
• The transport layer, on the other hand, ensures
that the whole message arrives intact and in
order, overseeing both error control and flow
control at the source-to-destination level.
27
Other responsibilities of the transport layer include the
following
• Service-point addressing
• Segmentation and reassembly
• Connection control
• Flow control
• Error control
28
Service-point addressing
• There may be number of programs running at the
same time on a computer.
• For this purpose, source-to-destination delivery
should also include process-to-process delivery.
• Data must be transferred from a specific process
(running program) on one computer to a specific
process or another computer and to accomplish this,
port address is required.
• Thus, transport layer includes service-point address
(also referred to as port address) in the header.
• Using these port addresses transport layer delivers the
packets to the correct process.
29
Segmentation and reassembly
• A message is divided into transmittable
segments, with each segment containing a
sequence number.
• These numbers enable the transport layer to
reassemble the message correctly upon
arriving at the destination and to identify and
replace packets that were lost in transmission.
30
Connection control
• Transport layer provides either connection-
oriented or connectionless service.
• In connection-oriented service, transport layer
establishes a connection with the transport layer
at the destination before transmitting segments
and terminates the connection when all the data
is transferred.
• In connectionless service, transport layer treats
each segment as individual packet and transmits
it to the transport layer at destination.
31
• Flow control.
Data link layer provides flow control of data
across a single link. Transport layer, on the
other hand is also responsible for flow control
which is performed end to end.
• Error control
Transport layer also performs error checking.
Error control takes place end to end. Transport
layer at the sending machine ensures that the
entire message is delivered at the receiving
machine without an error.
32
Session layer
• The session layer is responsible for dialog control
and synchronization.
• The session layer is the network dialog controller. It
establishes, maintains, and synchronizes the
interaction among communicating systems.
33
Specific responsibilities of the session layer
include the following:
• Dialog control
• Synchronization.
➢ Dialog control
The session layer allows two systems to enter
into a dialog (communication process) These
dialogs can take place either in half-duplex
or full duplex mode. It is useful in video
conferencing.
34
• Synchronization
The session layer allows a process to add
checkpoints, or synchronization points, to a stream
of data.
• For example
If a system is sending a file of 2000 pages, it is
advisable to insert checkpoints after every 100 pages
to ensure that each 100-page unit is received and
acknowledged independently. In this case, if a crash
happens during the transmission of page 523, the
only pages that need to be resent after system
recovery are pages 501 to 523. Pages previous to 501
need not be resent
35
Presentation Layer
• The presentation layer is responsible for
translation, compression, and encryption.
• So this presentation layer is concerned with
the syntax and semantics of the information
exchanged between two systems
36
Specific responsibilities of the presentation
layer include the following:
➢Translation
➢Encryption
➢Compression
37
Translation
• The processes (running programs) in two systems are
usually exchanging information in the form of
character strings, numbers, and so on.
• The information must be changed to bit streams
before being transmitted.
• Because different computers use different encoding
systems, the presentation layer is responsible for
interoperability between these different encoding
methods.
• The presentation layer at the sender changes the
information from its sender-dependent format into a
common format.
• The presentation layer at the receiving machine
changes the common format into its receiver-
dependent format. 38
Encryption
• To carry sensitive information, a system must
be able to ensure privacy.
• Encryption means that the sender transforms
the original information to another form and
sends the resulting message out over the
network.
• Decryption reverses the original process to
transform the message back to its original
form.
39
Compression
• Data compression refers to a process of
encoding data using less number of bits.
• This procedure reduces the number of bits
used to symbolize the information.
• It is important while transmitting multimedia
information such as text, audio and video
40
Application Layer
• The application layer is responsible for
providing services to the user.
• The application layer enables the user, whether
human or software, to access the network
• It provides user interfaces and support for
services such as electronic mail, remote file
access and transfer, shared database
management, and other types of distributed
information services.
41
Specific services provided by the application
layer include the following:
• Mail services
• File Transfer, Access, and Management.
• Network Virtual Terminal.
42
Mail services
• Using this application e-mails can be
forwarded to another device.
File transfer, access, and management
• This application allows a user
• to access files in a remote host.
• to transfer files from a remote computer for use
in the local computer,
• and to manage or control files in a remote
computer locally.
43
Network Virtual Terminal
• It is a software version. Using this software the
user can log on to a computer that is remotely
connected on the network.
• When the user's computer wants to communicate
with the remote host, it communicates with the
virtual terminal that converts the data in the
intermediary format used by the virtual terminal
and sends it to the remote host.
• After processing the data the remote host replies
to the terminal in the reverse order.
44
45
46
Thank you
47

More Related Content

What's hot

Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 Protocol
Miles Kevin Galario
 

What's hot (20)

Basics of networking and routing
Basics of networking and routingBasics of networking and routing
Basics of networking and routing
 
Chap 1 introduction
Chap 1 introductionChap 1 introduction
Chap 1 introduction
 
Iso layers
Iso layersIso layers
Iso layers
 
lecture 4.pptx
lecture 4.pptxlecture 4.pptx
lecture 4.pptx
 
Osi layer model
Osi layer modelOsi layer model
Osi layer model
 
Overview of an OSI reference Model
Overview of an OSI reference ModelOverview of an OSI reference Model
Overview of an OSI reference Model
 
L 1
L   1L   1
L 1
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Mac
MacMac
Mac
 
Data Link Layer
Data Link Layer Data Link Layer
Data Link Layer
 
Switching
Switching Switching
Switching
 
Types of topology
Types of topologyTypes of topology
Types of topology
 
Data comminication network
Data comminication networkData comminication network
Data comminication network
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
 
Atm work
Atm workAtm work
Atm work
 
OSI MODEL AND ITS LAYERS FUNCTION
OSI  MODEL AND ITS LAYERS FUNCTIONOSI  MODEL AND ITS LAYERS FUNCTION
OSI MODEL AND ITS LAYERS FUNCTION
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 Protocol
 
Osi model
Osi modelOsi model
Osi model
 
Different types of Topology
Different types of TopologyDifferent types of Topology
Different types of Topology
 
The ISO_OSI Reference Model
The ISO_OSI Reference ModelThe ISO_OSI Reference Model
The ISO_OSI Reference Model
 

Similar to Open Systems Interconnection (OSI)

tcpiposi.pptx
tcpiposi.pptxtcpiposi.pptx
tcpiposi.pptx
JustinMathew73
 
Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)
Ammar Shafiq
 
Network internet
Network internetNetwork internet
Network internet
Kumar
 
Networks internet
Networks internetNetworks internet
Networks internet
Kumar
 

Similar to Open Systems Interconnection (OSI) (20)

unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
The OSI model
 The OSI model The OSI model
The OSI model
 
Network Connectivity and Protocols and OSI Model
Network Connectivity and Protocols and OSI ModelNetwork Connectivity and Protocols and OSI Model
Network Connectivity and Protocols and OSI Model
 
CN_ECE_6th SEM_OSI Layer.pptx
CN_ECE_6th SEM_OSI Layer.pptxCN_ECE_6th SEM_OSI Layer.pptx
CN_ECE_6th SEM_OSI Layer.pptx
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
 
tcpiposi.pptx
tcpiposi.pptxtcpiposi.pptx
tcpiposi.pptx
 
OSI model layers 7 Types of OSI Model Edifyclue.pdf
OSI model layers  7 Types of OSI Model  Edifyclue.pdfOSI model layers  7 Types of OSI Model  Edifyclue.pdf
OSI model layers 7 Types of OSI Model Edifyclue.pdf
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)
 
OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.
 
Unit 2.1 - OSI Model.ppt Physical Layer
Unit 2.1 - OSI Model.ppt  Physical LayerUnit 2.1 - OSI Model.ppt  Physical Layer
Unit 2.1 - OSI Model.ppt Physical Layer
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
Dc2 t1
Dc2 t1Dc2 t1
Dc2 t1
 
Open System interconnection OSI Model.pptx
Open System interconnection OSI Model.pptxOpen System interconnection OSI Model.pptx
Open System interconnection OSI Model.pptx
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
Computer Network Unit-1 ppt
Computer Network Unit-1 pptComputer Network Unit-1 ppt
Computer Network Unit-1 ppt
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
 
Network internet
Network internetNetwork internet
Network internet
 
Networks internet
Networks internetNetworks internet
Networks internet
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 

More from Jyothishmathi Institute of Technology and Science Karimnagar

More from Jyothishmathi Institute of Technology and Science Karimnagar (20)

JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING- GUI Programming with Swing - The Swing ButtonsJAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
 
JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING - The Collections Framework JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING - The Collections Framework
 
JAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING- Exception handling - MultithreadingJAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING- Exception handling - Multithreading
 
JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O
 
Java programming -Object-Oriented Thinking- Inheritance
Java programming -Object-Oriented Thinking- InheritanceJava programming -Object-Oriented Thinking- Inheritance
Java programming -Object-Oriented Thinking- Inheritance
 
WEB TECHNOLOGIES JavaScript
WEB TECHNOLOGIES JavaScriptWEB TECHNOLOGIES JavaScript
WEB TECHNOLOGIES JavaScript
 
WEB TECHNOLOGIES JSP
WEB TECHNOLOGIES  JSPWEB TECHNOLOGIES  JSP
WEB TECHNOLOGIES JSP
 
WEB TECHNOLOGIES Servlet
WEB TECHNOLOGIES ServletWEB TECHNOLOGIES Servlet
WEB TECHNOLOGIES Servlet
 
WEB TECHNOLOGIES XML
WEB TECHNOLOGIES XMLWEB TECHNOLOGIES XML
WEB TECHNOLOGIES XML
 
WEB TECHNOLOGIES- PHP Programming
WEB TECHNOLOGIES-  PHP ProgrammingWEB TECHNOLOGIES-  PHP Programming
WEB TECHNOLOGIES- PHP Programming
 
Compiler Design- Machine Independent Optimizations
Compiler Design- Machine Independent OptimizationsCompiler Design- Machine Independent Optimizations
Compiler Design- Machine Independent Optimizations
 
COMPILER DESIGN Run-Time Environments
COMPILER DESIGN Run-Time EnvironmentsCOMPILER DESIGN Run-Time Environments
COMPILER DESIGN Run-Time Environments
 
COMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Syntax Directed TranslationCOMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Syntax Directed Translation
 
COMPILER DESIGN- Syntax Analysis
COMPILER DESIGN- Syntax AnalysisCOMPILER DESIGN- Syntax Analysis
COMPILER DESIGN- Syntax Analysis
 
COMPILER DESIGN- Introduction & Lexical Analysis:
COMPILER DESIGN- Introduction & Lexical Analysis: COMPILER DESIGN- Introduction & Lexical Analysis:
COMPILER DESIGN- Introduction & Lexical Analysis:
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
 
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash FunctionsCRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
 
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key CiphersCRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Open Systems Interconnection (OSI)

  • 1. OSI MODEL Dr R Jegadeesan Prof & Head Jyothishmathi Institute of Technology and Science, karimnagar 1
  • 2. • In the earliest era of networking, computers could usually communicate only with computers, which were from the similar manufacturer. • The purpose of OSI model is to show how to facilitate communication between different systems without requiring changes to its underlying Hardware and Software. 2
  • 3. • This model was developed by International Standard Organization (ISO) in 1970’s • OSI had two major components ➢ the Basic Reference Model or seven-layer model ➢ set of specific protocols • It is called as open system interconnection because it is a system which is open for communication with other systems 3
  • 4. 7 Layers of OSI model • Layer 7. Application Layer • Layer 6. Presentation Layer • Layer 5. Session Layer • Layer 4. Transport Layer • Layer 3. Network Layer • Layer 2. Data Link Layer • Layer 1. Physical Layer • PDNTSPA (Please Do Not Throw Sauce Pizza Away) 4
  • 5. 5
  • 6. • OSI model consists of 7 layers which is corresponds to 3 sub groups • First 3 layers---Physical, Data, Network layers are network support layers • They perform ➢physical connection ➢communication ➢transport timing from one device to another device 6
  • 7. • The last three layers i.e session,presentation application layers are user support layers • They perform ➢Interoperability between unrelated software systems 7
  • 8. • The fourth layer called Transport layer ensures that the transmitted data from lower layers is in the required form as upper layers need. ➢The upper three layers are implemented in software. ➢The lower three layers are a combination of hardware and software. ➢Physical layer is almost hardware. 8
  • 9. Physical layer • The physical layer is responsible for movements of individual bits from one hop (node) to the next. • The physical layer coordinates the functions required to carry a bit stream over a physical medium. 9
  • 10. The physical layer is also concerned with the following: • Physical characteristics of interfaces and medium • Representation of bits • Data rate • Line configuration • Physical topology • Transmission mode. • Synchronization of bits 10
  • 11. • Physical characteristics of interfaces and medium: The physical layer defines the characteristics of the interface between the devices and the transmission medium. It also defines the type of transmission medium • Representation of bits The physical layer data consists of a stream of bits (sequence of Os or 1s) with no interpretation. To be transmitted, bits must be encoded into signals--electrical or optical. The physical layer defines the type of encoding (how Os and 1 s are changed to signals). 11
  • 12. • Data rate ➢ The transmission rate-the number of bits sent each second-is also defined by the physical layer. ➢ In other words, the physical layer defines the duration of a bit, which is how long it lasts. Line configuration ➢ The physical layer is concerned with the connection of devices to the media. ➢ In a point-to-point configuration, two devices are connected through a dedicated link. ➢ In a multipoint configuration, a link is shared among several devices. 12
  • 13. • Physical topology The physical topology defines how devices are connected to make a network. Devices can be connected by using a mesh topology (every device is connected to every other device), a star topology (devices are connected through a central device), a ring topology (each device is connected to the next, forming a ring), a bus topology (every device is on a common link), or a hybrid topology (this is a combination of two or more topologies). • Transmission mode. The physical layer also defines the direction of transmission between two devices: simplex, half- duplex, or full-duplex. 13
  • 14. • Synchronization of bits • The sender and receiver must use the same bit rate. • In other words, the sender and the receiver clocks must be synchronized. 14
  • 15. Data Link Layer • The data link layer is responsible for moving frames from one hop (node) to the next. • The data link layer is often conceptually divided into two sub layers: ➢ Logical Link Control (LLC) ➢ Media Access Control (MAC) • It makes the physical layer appear error-free to the upper layer (network layer) 15
  • 16. • Logical link control refers to the functions required for the establishment and control of logical links between local devices on a network. • Media Access Control (MAC). This refers to the procedures used by devices to control access to the network medium. Since many networks use a shared medium it is necessary to have rules for managing the medium to avoid conflicts 16
  • 17. • Other responsibilities of the data link layer include the following • Framing • Physical addressing. • Flow control • Error control • Access control 17
  • 18. Framing The data link layer divides the stream of bits received from the network layer into manageable data units called frames. Physical addressing If frames are to be distributed to different systems on the network, the data link layer adds a header to the frame to define the sender and/or receiver of the frame. 18
  • 19. • Flow control. If the rate at which the data are absorbed by the receiver is less than the rate at which data are produced in the sender, the data link layer imposes a flow control mechanism (Stop-and-Wait and Sliding Window) to avoid overwhelming the receiver. • Error control The data link layer adds reliability to the physical layer by adding mechanisms to detect and retransmit damaged or lost frames. It also uses a mechanism to recognize duplicate frames. Error control is normally achieved through a trailer added to the end of the frame. 19
  • 20. • Access control. When two or more devices are connected to the same link, data link layer protocols determines which device has control over the link at any given time. 20
  • 21. Network layer • The network layer is responsible for the delivery of individual packets from the source host to the destination host. • The data link layer oversees the delivery of the frames between two systems on the same network (links), the network layer ensures that each packet gets from its point of origin to its final destination. 21
  • 22. • If two systems are connected to the same link, there is usually no need for a network layer. However, if the two systems are attached to different networks (links) with connecting devices between the networks (links), there is often a need for the network layer to accomplish source-to-destination delivery. 22
  • 23. Other responsibilities of the network layer include the following • Logical addressing • Routing 23
  • 24. Logical addressing ➢ The physical addressing implemented by the data link layer handles the addressing problem locally. ➢If a packet passes the network boundary, we need another addressing system to help distinguish the source and destination systems. ➢ The network layer adds a header to the packet coming from the upper layer that, among other things, includes the logical addresses of the sender and receiver. 24
  • 25. Routing • When independent networks or links are connected to create internetworks (network of networks) or a large network, the connecting devices (called routers or switches) route or switch the packets to their final destination. This is called routing. 25
  • 26. Transport Layer • The transport layer is responsible for the delivery of a message from one process to another. • A process is an application program running on a host. • Application programs include word processors; database programs; Web browsers; drawing, paint, and image editing programs; and social communication application programs 26
  • 27. • The network layer supervise source-to- destination delivery of individual packets, it does not recognize any relationship between those packets. It treats each one independently, as though each piece belonged to a separate message, whether or not it does. • The transport layer, on the other hand, ensures that the whole message arrives intact and in order, overseeing both error control and flow control at the source-to-destination level. 27
  • 28. Other responsibilities of the transport layer include the following • Service-point addressing • Segmentation and reassembly • Connection control • Flow control • Error control 28
  • 29. Service-point addressing • There may be number of programs running at the same time on a computer. • For this purpose, source-to-destination delivery should also include process-to-process delivery. • Data must be transferred from a specific process (running program) on one computer to a specific process or another computer and to accomplish this, port address is required. • Thus, transport layer includes service-point address (also referred to as port address) in the header. • Using these port addresses transport layer delivers the packets to the correct process. 29
  • 30. Segmentation and reassembly • A message is divided into transmittable segments, with each segment containing a sequence number. • These numbers enable the transport layer to reassemble the message correctly upon arriving at the destination and to identify and replace packets that were lost in transmission. 30
  • 31. Connection control • Transport layer provides either connection- oriented or connectionless service. • In connection-oriented service, transport layer establishes a connection with the transport layer at the destination before transmitting segments and terminates the connection when all the data is transferred. • In connectionless service, transport layer treats each segment as individual packet and transmits it to the transport layer at destination. 31
  • 32. • Flow control. Data link layer provides flow control of data across a single link. Transport layer, on the other hand is also responsible for flow control which is performed end to end. • Error control Transport layer also performs error checking. Error control takes place end to end. Transport layer at the sending machine ensures that the entire message is delivered at the receiving machine without an error. 32
  • 33. Session layer • The session layer is responsible for dialog control and synchronization. • The session layer is the network dialog controller. It establishes, maintains, and synchronizes the interaction among communicating systems. 33
  • 34. Specific responsibilities of the session layer include the following: • Dialog control • Synchronization. ➢ Dialog control The session layer allows two systems to enter into a dialog (communication process) These dialogs can take place either in half-duplex or full duplex mode. It is useful in video conferencing. 34
  • 35. • Synchronization The session layer allows a process to add checkpoints, or synchronization points, to a stream of data. • For example If a system is sending a file of 2000 pages, it is advisable to insert checkpoints after every 100 pages to ensure that each 100-page unit is received and acknowledged independently. In this case, if a crash happens during the transmission of page 523, the only pages that need to be resent after system recovery are pages 501 to 523. Pages previous to 501 need not be resent 35
  • 36. Presentation Layer • The presentation layer is responsible for translation, compression, and encryption. • So this presentation layer is concerned with the syntax and semantics of the information exchanged between two systems 36
  • 37. Specific responsibilities of the presentation layer include the following: ➢Translation ➢Encryption ➢Compression 37
  • 38. Translation • The processes (running programs) in two systems are usually exchanging information in the form of character strings, numbers, and so on. • The information must be changed to bit streams before being transmitted. • Because different computers use different encoding systems, the presentation layer is responsible for interoperability between these different encoding methods. • The presentation layer at the sender changes the information from its sender-dependent format into a common format. • The presentation layer at the receiving machine changes the common format into its receiver- dependent format. 38
  • 39. Encryption • To carry sensitive information, a system must be able to ensure privacy. • Encryption means that the sender transforms the original information to another form and sends the resulting message out over the network. • Decryption reverses the original process to transform the message back to its original form. 39
  • 40. Compression • Data compression refers to a process of encoding data using less number of bits. • This procedure reduces the number of bits used to symbolize the information. • It is important while transmitting multimedia information such as text, audio and video 40
  • 41. Application Layer • The application layer is responsible for providing services to the user. • The application layer enables the user, whether human or software, to access the network • It provides user interfaces and support for services such as electronic mail, remote file access and transfer, shared database management, and other types of distributed information services. 41
  • 42. Specific services provided by the application layer include the following: • Mail services • File Transfer, Access, and Management. • Network Virtual Terminal. 42
  • 43. Mail services • Using this application e-mails can be forwarded to another device. File transfer, access, and management • This application allows a user • to access files in a remote host. • to transfer files from a remote computer for use in the local computer, • and to manage or control files in a remote computer locally. 43
  • 44. Network Virtual Terminal • It is a software version. Using this software the user can log on to a computer that is remotely connected on the network. • When the user's computer wants to communicate with the remote host, it communicates with the virtual terminal that converts the data in the intermediary format used by the virtual terminal and sends it to the remote host. • After processing the data the remote host replies to the terminal in the reverse order. 44
  • 45. 45
  • 46. 46