SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
OSI Reference ModelOSI Reference Model
Sayyed sabir shahSayyed sabir shah
Department of technologyDepartment of technology
Sarhad university of information technologySarhad university of information technology
PeshawarPeshawar
The Need For Standards.The Need For Standards.
• Over the past couple of decades many of the networks that
were built used different hardware and software
implementations, as a result:
– They were incompatible and it became difficult for networks using
different specifications to communicate with each other.
• The companies involved in networks development realized
that they needed to move from proprietary networking
system into open system.
• Proprietary systems are privately developed, owned and
controlled.
– Disadvantages are:
• Leads to monopolistic environment.
• Slows down the development of networking products.
• Open system is the opposite of proprietary systems.
– Advantages are:
• Leads to competitive environment.
• Accelerates the development of networking products.
The Need for Standards.The Need for Standards.
• To address the problem of networks being
incompatible and unable to communicate with each
other, the International Organisation for
Standardisation (ISO) created a NETWORK
MODEL.
• This NETWORK MODEL would help the vendor to
create interoperable network implementations.
• This NETWORK MODEL is called OSI Reference
Model.
Layered Tasks.Layered Tasks.
• We use the concept of layerslayers in our daily life.
• As an example, let us consider two friends who
communicate through postal mail.
• The process of sending a letter to a friend would be
complex if there were no services available from the post
office.
• This process of sending mail can be divided into several
phases/activities and each phase/activities is called layer.
Figure.Figure. Tasks involved in sending a letterTasks involved in sending a letter
Hierarchy.Hierarchy.
• In the previous mail communication example, we saw that
three activities were performed at the sender side and
another three activities were preformed at the receiver side.
• The task of transporting the mail between the sender and
receiver is done by the carrier.
• On important thing is that tasks must be done in the order
given in the hierarchy.
– At the sender side, the letter must be written and dropped into the
mailbox before being picked up by the mail carrier and delivered to
the post office.
– At the receiver side, the letter must be dropped in the recipient
mailbox before being picked up and read by the recipient.
The OSI Reference Model.The OSI Reference Model.
• The model was developed by the International Organisation
for Standardisation (ISO) in 1984. It is now considered the
primary architectural model for inter-computer
communications.
• The Open Systems Interconnection (OSI) reference model is
a descriptive network scheme. It ensures greater
compatibility and interoperability between various types of
network technologies.
• The OSI model describes how information or data makes its
way from application programmes (such as spreadsheets)
through a network medium (such as wire) to another
application programme located on another network.
• The OSI reference model divides the problem of moving
information between computers over a network medium into
SEVEN smaller and more manageable problems .
• This separation into smaller more manageable functions is
known as layering.
A Layered Network Model.A Layered Network Model.
• The OSI Reference Model is composed of seven
layers, each specifying particular network functions.
– The process of breaking up the functions or tasks of
networking into layers reduces complexity and makes
learning easier to understand.
– It breaks the network communication into smaller,
simpler parts that are easier to develop.
– It allows different types of hardware and software to
communicate with each other.
– It prevents changes in one layer from affecting the other
layers.
Layers of OSI Reference Model.Layers of OSI Reference Model.
Encapsulation.Encapsulation.
• As the data flows down through the layers in the hierarchy,
each layer adds some extra information to the data in the
form of headers or tailors.
• This process of wrapping data with headers and tailors is
called encapsulation.
• These extra information are added for:
– To enable the opposite corresponding layer to take the right
operation on the data (to facilitate his work).
– To enable the network to transfer the data accurately from the
source to the destination.
• Through these information each layer actually
communicates with the opposite corresponding layer and
this is called peer-to-peer communication.
• At the receiver side De-Encapsulation take place.
Encapsulation.Encapsulation.
Physical Layer.Physical Layer.
• The physical layer performs the functions required to transmit a bit stream
over a physical medium.
• It deals with the mechanical and electrical specification of the transmission
media.
• The major duties performed by physical layer are:
– Physical characteristics of interface and media.
• Defines the characteristics of the interface between the devices and the
transmission media.
• It also defines the type of transmission medium.
– Representation of bits:
• Physical layer receives a steam of bits (sequence of 0s and 1s) without any
interruption.
• To be transmitted, bits must be encoded into a signals – electrical or optical.
• The physical layer defined the type of representation ( how 0s and 1s are changed
into signals).
– Data rate:
• The transmission rate – the number of bit per second- is also defined by the
physical layer.
• Repeater is a device of the physical layer.
• Physical layer protocols are encoding techniques (RZ, NRZ, Manchester etc).
Physical Layer.
Data Link Layer.Data Link Layer.
• The data link layer is responsible for moving frames from
one hop (node) to the next.
• The major duties of the data link layer are:
– Framing:
• The data link layer divides the stream of bits steam from the network
layer into manageable data units called frames.
– Physical addressing:
• If frame is to be distributed to different systems on the network, the
data link layer adds a header to the frame to define the sender and
receiver of the frame.
• Physical address is the MAC address, which is hard coded into NIC
and is of 48-bit represented by Hexadecimal format.
– Flow control:
• If the rate at which the data are absorbed by the receiver is less than the
rate produced in the sender, the data link layer imposes a flow control
mechanism to prevent overwhelming the receiver.
Data Link Layer.Data Link Layer.
– Error control:
• The data link layer adds reliability to the physical layer by adding
mechanism to detect and retransmit damaged or lost frames.
• It also uses a mechanism to prevent duplication of frames.
• Error control is normally achieved through a trailer added to the end of
the frame.
– Access control:
• The data link layer protocol has to determine that how to get access to
the link in case when two or more devices are connected to the same
link.
• The PDU of the data link layer is called frame.
• Data Link layer protocols are CSMA/CD, CSMA/CA,
Token Passing etc.
Node-to-Node Delivery.
Data Link Layer.
Network Layer.Network Layer.
• The network layer is responsible for the source -to-
destination delivery of a packet possibly across
multiple networks.
– It two systems are connected to the same link, there is
usually no need for a network layer.
– However, if the two systems are attached to different
networks with connecting devices between the networks,
there is need for the network layer to accomplish the
delivery.
• The major duties performed by the network layer
are:
Network Layer.Network Layer.
– Logical addressing:
• The physical addressing implemented by the data link layer handles the
addressing problem locally.
• If a packet passes the network boundary, we need another addressing
system to perform the source and destination delivery.
• The network layer adds a header to the segment received from the
transport layer containing the logical addresses of the sender and
receiver.
• Logical address is also called IP address which is of 32-bits and
represented in decimal format.
– Routing:
• To route the packets from the source to destination in an internetwork,
the router uses network layer information.
• The PDU of network layer is called packet.
• Network layer protocols are IP, IPX, AppleTalk.
Network Layer.Network Layer.
Source-to-Destination Delivery.Source-to-Destination Delivery.
Transport Layer.Transport Layer.
• The transport layer is responsible for process-to-process
delivery of the entire message.
• The major duties performed by the transport layer are:
– Port address:
• Computers often running several processes (running programs) at the
same time:
• Each running process open a logical port on the computer.
• The transport layer header must therefore include a type of address
called port address.
• The network layer gets each packet to the correct computer, the
transport layer get the entire message to the correct process on that
computer.
– Segmentation and reassembly:
• A message received form the upper layers is divided into transmittable
segments, each segment contains a sequence number.
• These number enables the transport layer to reassemble the message
correctly upon arrival at the destination and to identify and replace
packets that were lost in the transmission.
Transport Layer.Transport Layer.
– Connection Control:
• The transport layer can be either connectionless or connection
oriented.
• A connection oriented transport layer makes a logical connection with
the transport layer at the destination machine first before delivering the
packets.
• After all the data are transferred, the connection is terminated.
– Flow control:
• Like data link layer, the transport layer is resposnsible for flow control.
• However, flow control at this layer is performed end to end rather than
across a single link (Hop-to-Hop).
– Error control:
• Like data link layer, the transport layer is responsible for error control.
• However, error control at this layer is performed end to end rather than
across a single link (Hop-to-Hop).
• Transport layer 4 protocols include TCP (Transmission
Control Protocol) and UDP (User Datagram Protocol).
Transport Layer.Transport Layer.
Reliable Process-to-Process Delivery.Reliable Process-to-Process Delivery.
Session Layer.Session Layer.
• The session layer defines how to establish, maintaining and
terminates session between two communication hosts.
• The major duties of the session layer are:
– Synchronization:
• For lengthy transaction (file transfer), the user may choose to establish
synchronization points associated with the transfer. If a fault develops
during a transaction, the dialog may be restarted at an agreed
synchronization point.
– Dialog control:
• Session layer determines that which role is to be played at any given
time by a host.
– Duplex: Two-way simultaneous.
– Half-Duplex: Two-way alternate.
– Simplex: One-way.
• Session layer protocols are SQL, ASP(AppleTalk Session
Protocol), Remote Procedure Call (RPC), X Window
System.
Session Layer.Session Layer.
Presentation Layer.Presentation Layer.
• The presentation layer ensures that the information that the
application layer of one system sends out is readable by the
application layer of another system.
• The major duties of the presentation layer are:
– Format conversion:
• Convert message from one format into another format .i.e. for ASCII
to EBCEDIC or vice versa.
– Compression.
• Compress the message to take less bandwidth on the transmission
media and less time for transmission.
– Encryption:
• Convert the message into a form that will not be readable by others.
• Provides security to the message.
• Protocols of the presentation layer are JPEG, MPEG, ASCII,
EBCDIC etc.
Presentation Layer.Presentation Layer.
Application Layer.Application Layer.
• The application layer is the OSI layer that is closest to the
user.
• It provides network services to the user’s applications (.i.e.
spreadsheet etc).
• The major duties are:
– Mail service:
• It provides network services for the email application.
– File transfer and Access:
• It provides network services for a user to access files on a remote
computer, to retrieve files from a remote computer for use in the local
computer and to manage or control files in a remote computer locally.
– World Wide Web:
• It provides network services to access the World Wide Web.
Application Layer.Application Layer.
Summary.Summary.
• There was no standard for networks in the early days and as a result it was
difficult for networks to communicate with each other.
• The International Organisation for Standardisation (ISO) recognised this.
and researched various network schemes, and in 1984 introduced the Open
Systems Interconnection (OSI) reference model.
• The OSI reference model has standards which ensure vendors greater
compatibility and interoperability between various types of network
technologies.
• The OSI reference model organizes network functions into seven
numbered layers.
• Each layer provides a service to the layer above it in the protocol
specification and communicates with the same layer’s software or
hardware on other computers.
Summary of the Layers.Summary of the Layers.

Contenu connexe

Tendances

Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Alan Mark
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaMukesh Chinta
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switchinghoanv
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networkingHarshita Yadav
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking FundamentalsManjit Chavda
 
Network servers
Network serversNetwork servers
Network serversOnline
 
network hardware
network hardwarenetwork hardware
network hardwaretumetr1
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link LayerAbdullaziz Tagawy
 

Tendances (20)

Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission Media
 
Network software
Network softwareNetwork software
Network software
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
OSI Layers
OSI LayersOSI Layers
OSI Layers
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
 
WAN Technologies slide show
WAN Technologies slide showWAN Technologies slide show
WAN Technologies slide show
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Network servers
Network serversNetwork servers
Network servers
 
network hardware
network hardwarenetwork hardware
network hardware
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
Network switch
Network switchNetwork switch
Network switch
 

Similaire à OSI Reference Model Explained in Detail

06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.pptssuserf7cd2b
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.pptssuserf7cd2b
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocolNayan Sarma
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx183JAIDEEP
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet ProtocoltxMosesOkumu4
 
Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Ammar Shafiq
 
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptxKaythry P
 
Client Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxClient Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxDevChaudhari17
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and modelsshahin raj
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)Tutun Juhana
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Zakirul Islam
 

Similaire à OSI Reference Model Explained in Detail (20)

06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
Dc2 t1
Dc2 t1Dc2 t1
Dc2 t1
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
OSI Model.pdf
OSI Model.pdfOSI Model.pdf
OSI Model.pdf
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
 
Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)
 
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptx
 
Chap 2 network models
Chap 2 network modelsChap 2 network models
Chap 2 network models
 
Client Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxClient Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptx
 
Basics of Ethernet
Basics of Ethernet Basics of Ethernet
Basics of Ethernet
 
OSI Model.ppt
OSI Model.pptOSI Model.ppt
OSI Model.ppt
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and models
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
 
ch5-osi.pdf
ch5-osi.pdfch5-osi.pdf
ch5-osi.pdf
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
tcpiposi.pptx
tcpiposi.pptxtcpiposi.pptx
tcpiposi.pptx
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 

Plus de sayyed sabir (20)

Workbreakdownstructureppt 130410021152-phpapp02
Workbreakdownstructureppt 130410021152-phpapp02Workbreakdownstructureppt 130410021152-phpapp02
Workbreakdownstructureppt 130410021152-phpapp02
 
Automatic door using arduino
Automatic door using arduinoAutomatic door using arduino
Automatic door using arduino
 
Importance of coal water slurry
Importance of coal water slurryImportance of coal water slurry
Importance of coal water slurry
 
(Week 15)
(Week 15)(Week 15)
(Week 15)
 
(Week 14)
(Week 14)(Week 14)
(Week 14)
 
(Week 13)
(Week 13)(Week 13)
(Week 13)
 
(Week 12)
(Week 12)(Week 12)
(Week 12)
 
(Week 11)
(Week 11)(Week 11)
(Week 11)
 
(Week 10)
(Week 10)(Week 10)
(Week 10)
 
(Week 9)
(Week 9)(Week 9)
(Week 9)
 
(Week 8)
(Week 8)(Week 8)
(Week 8)
 
(Week 7)
(Week 7)(Week 7)
(Week 7)
 
(Week 6)
(Week 6)(Week 6)
(Week 6)
 
(Week 5)
(Week 5)(Week 5)
(Week 5)
 
(Week 4)
(Week 4)(Week 4)
(Week 4)
 
(Week 3)
(Week 3)(Week 3)
(Week 3)
 
(Week 2)
(Week 2)(Week 2)
(Week 2)
 
(Week 1)
(Week 1)(Week 1)
(Week 1)
 
Transmission modes
Transmission modesTransmission modes
Transmission modes
 
Ch3 4 v1
Ch3 4 v1Ch3 4 v1
Ch3 4 v1
 

Dernier

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 

Dernier (20)

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 

OSI Reference Model Explained in Detail

  • 1. OSI Reference ModelOSI Reference Model Sayyed sabir shahSayyed sabir shah Department of technologyDepartment of technology Sarhad university of information technologySarhad university of information technology PeshawarPeshawar
  • 2. The Need For Standards.The Need For Standards. • Over the past couple of decades many of the networks that were built used different hardware and software implementations, as a result: – They were incompatible and it became difficult for networks using different specifications to communicate with each other. • The companies involved in networks development realized that they needed to move from proprietary networking system into open system. • Proprietary systems are privately developed, owned and controlled. – Disadvantages are: • Leads to monopolistic environment. • Slows down the development of networking products. • Open system is the opposite of proprietary systems. – Advantages are: • Leads to competitive environment. • Accelerates the development of networking products.
  • 3. The Need for Standards.The Need for Standards. • To address the problem of networks being incompatible and unable to communicate with each other, the International Organisation for Standardisation (ISO) created a NETWORK MODEL. • This NETWORK MODEL would help the vendor to create interoperable network implementations. • This NETWORK MODEL is called OSI Reference Model.
  • 4. Layered Tasks.Layered Tasks. • We use the concept of layerslayers in our daily life. • As an example, let us consider two friends who communicate through postal mail. • The process of sending a letter to a friend would be complex if there were no services available from the post office. • This process of sending mail can be divided into several phases/activities and each phase/activities is called layer.
  • 5. Figure.Figure. Tasks involved in sending a letterTasks involved in sending a letter
  • 6. Hierarchy.Hierarchy. • In the previous mail communication example, we saw that three activities were performed at the sender side and another three activities were preformed at the receiver side. • The task of transporting the mail between the sender and receiver is done by the carrier. • On important thing is that tasks must be done in the order given in the hierarchy. – At the sender side, the letter must be written and dropped into the mailbox before being picked up by the mail carrier and delivered to the post office. – At the receiver side, the letter must be dropped in the recipient mailbox before being picked up and read by the recipient.
  • 7. The OSI Reference Model.The OSI Reference Model. • The model was developed by the International Organisation for Standardisation (ISO) in 1984. It is now considered the primary architectural model for inter-computer communications. • The Open Systems Interconnection (OSI) reference model is a descriptive network scheme. It ensures greater compatibility and interoperability between various types of network technologies. • The OSI model describes how information or data makes its way from application programmes (such as spreadsheets) through a network medium (such as wire) to another application programme located on another network. • The OSI reference model divides the problem of moving information between computers over a network medium into SEVEN smaller and more manageable problems . • This separation into smaller more manageable functions is known as layering.
  • 8. A Layered Network Model.A Layered Network Model. • The OSI Reference Model is composed of seven layers, each specifying particular network functions. – The process of breaking up the functions or tasks of networking into layers reduces complexity and makes learning easier to understand. – It breaks the network communication into smaller, simpler parts that are easier to develop. – It allows different types of hardware and software to communicate with each other. – It prevents changes in one layer from affecting the other layers.
  • 9. Layers of OSI Reference Model.Layers of OSI Reference Model.
  • 10. Encapsulation.Encapsulation. • As the data flows down through the layers in the hierarchy, each layer adds some extra information to the data in the form of headers or tailors. • This process of wrapping data with headers and tailors is called encapsulation. • These extra information are added for: – To enable the opposite corresponding layer to take the right operation on the data (to facilitate his work). – To enable the network to transfer the data accurately from the source to the destination. • Through these information each layer actually communicates with the opposite corresponding layer and this is called peer-to-peer communication. • At the receiver side De-Encapsulation take place.
  • 12. Physical Layer.Physical Layer. • The physical layer performs the functions required to transmit a bit stream over a physical medium. • It deals with the mechanical and electrical specification of the transmission media. • The major duties performed by physical layer are: – Physical characteristics of interface and media. • Defines the characteristics of the interface between the devices and the transmission media. • It also defines the type of transmission medium. – Representation of bits: • Physical layer receives a steam of bits (sequence of 0s and 1s) without any interruption. • To be transmitted, bits must be encoded into a signals – electrical or optical. • The physical layer defined the type of representation ( how 0s and 1s are changed into signals). – Data rate: • The transmission rate – the number of bit per second- is also defined by the physical layer. • Repeater is a device of the physical layer. • Physical layer protocols are encoding techniques (RZ, NRZ, Manchester etc).
  • 14. Data Link Layer.Data Link Layer. • The data link layer is responsible for moving frames from one hop (node) to the next. • The major duties of the data link layer are: – Framing: • The data link layer divides the stream of bits steam from the network layer into manageable data units called frames. – Physical addressing: • If frame is to be distributed to different systems on the network, the data link layer adds a header to the frame to define the sender and receiver of the frame. • Physical address is the MAC address, which is hard coded into NIC and is of 48-bit represented by Hexadecimal format. – Flow control: • If the rate at which the data are absorbed by the receiver is less than the rate produced in the sender, the data link layer imposes a flow control mechanism to prevent overwhelming the receiver.
  • 15. Data Link Layer.Data Link Layer. – Error control: • The data link layer adds reliability to the physical layer by adding mechanism to detect and retransmit damaged or lost frames. • It also uses a mechanism to prevent duplication of frames. • Error control is normally achieved through a trailer added to the end of the frame. – Access control: • The data link layer protocol has to determine that how to get access to the link in case when two or more devices are connected to the same link. • The PDU of the data link layer is called frame. • Data Link layer protocols are CSMA/CD, CSMA/CA, Token Passing etc.
  • 18. Network Layer.Network Layer. • The network layer is responsible for the source -to- destination delivery of a packet possibly across multiple networks. – It two systems are connected to the same link, there is usually no need for a network layer. – However, if the two systems are attached to different networks with connecting devices between the networks, there is need for the network layer to accomplish the delivery. • The major duties performed by the network layer are:
  • 19. Network Layer.Network Layer. – Logical addressing: • The physical addressing implemented by the data link layer handles the addressing problem locally. • If a packet passes the network boundary, we need another addressing system to perform the source and destination delivery. • The network layer adds a header to the segment received from the transport layer containing the logical addresses of the sender and receiver. • Logical address is also called IP address which is of 32-bits and represented in decimal format. – Routing: • To route the packets from the source to destination in an internetwork, the router uses network layer information. • The PDU of network layer is called packet. • Network layer protocols are IP, IPX, AppleTalk.
  • 22. Transport Layer.Transport Layer. • The transport layer is responsible for process-to-process delivery of the entire message. • The major duties performed by the transport layer are: – Port address: • Computers often running several processes (running programs) at the same time: • Each running process open a logical port on the computer. • The transport layer header must therefore include a type of address called port address. • The network layer gets each packet to the correct computer, the transport layer get the entire message to the correct process on that computer. – Segmentation and reassembly: • A message received form the upper layers is divided into transmittable segments, each segment contains a sequence number. • These number enables the transport layer to reassemble the message correctly upon arrival at the destination and to identify and replace packets that were lost in the transmission.
  • 23. Transport Layer.Transport Layer. – Connection Control: • The transport layer can be either connectionless or connection oriented. • A connection oriented transport layer makes a logical connection with the transport layer at the destination machine first before delivering the packets. • After all the data are transferred, the connection is terminated. – Flow control: • Like data link layer, the transport layer is resposnsible for flow control. • However, flow control at this layer is performed end to end rather than across a single link (Hop-to-Hop). – Error control: • Like data link layer, the transport layer is responsible for error control. • However, error control at this layer is performed end to end rather than across a single link (Hop-to-Hop). • Transport layer 4 protocols include TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).
  • 25. Reliable Process-to-Process Delivery.Reliable Process-to-Process Delivery.
  • 26. Session Layer.Session Layer. • The session layer defines how to establish, maintaining and terminates session between two communication hosts. • The major duties of the session layer are: – Synchronization: • For lengthy transaction (file transfer), the user may choose to establish synchronization points associated with the transfer. If a fault develops during a transaction, the dialog may be restarted at an agreed synchronization point. – Dialog control: • Session layer determines that which role is to be played at any given time by a host. – Duplex: Two-way simultaneous. – Half-Duplex: Two-way alternate. – Simplex: One-way. • Session layer protocols are SQL, ASP(AppleTalk Session Protocol), Remote Procedure Call (RPC), X Window System.
  • 28. Presentation Layer.Presentation Layer. • The presentation layer ensures that the information that the application layer of one system sends out is readable by the application layer of another system. • The major duties of the presentation layer are: – Format conversion: • Convert message from one format into another format .i.e. for ASCII to EBCEDIC or vice versa. – Compression. • Compress the message to take less bandwidth on the transmission media and less time for transmission. – Encryption: • Convert the message into a form that will not be readable by others. • Provides security to the message. • Protocols of the presentation layer are JPEG, MPEG, ASCII, EBCDIC etc.
  • 30. Application Layer.Application Layer. • The application layer is the OSI layer that is closest to the user. • It provides network services to the user’s applications (.i.e. spreadsheet etc). • The major duties are: – Mail service: • It provides network services for the email application. – File transfer and Access: • It provides network services for a user to access files on a remote computer, to retrieve files from a remote computer for use in the local computer and to manage or control files in a remote computer locally. – World Wide Web: • It provides network services to access the World Wide Web.
  • 32. Summary.Summary. • There was no standard for networks in the early days and as a result it was difficult for networks to communicate with each other. • The International Organisation for Standardisation (ISO) recognised this. and researched various network schemes, and in 1984 introduced the Open Systems Interconnection (OSI) reference model. • The OSI reference model has standards which ensure vendors greater compatibility and interoperability between various types of network technologies. • The OSI reference model organizes network functions into seven numbered layers. • Each layer provides a service to the layer above it in the protocol specification and communicates with the same layer’s software or hardware on other computers.
  • 33. Summary of the Layers.Summary of the Layers.