PHYSICAL LAYER:
1. The physical layer is the first layer of the OSI model from the bottom, responsible for transmitting
data as signals over a physical medium, It converts data from the data link layer into signals for
transmission.
2. The physical layer deals with hardware components, such as cables and connectors, which can be
guided (wired) or unguided (wireless).
3. Different types of cables and connectors have unique functionalities, such as twisted pair, coaxial,
and optical fiber cables, and UTP, BNC, and MGRT connectors.
4. Physical topology is discussed in the physical layer, including star, mesh, bus, and point-to-point
topologies.
5. Key hardware components in the physical layer include repeaters and hubs, which help maintain
signal quality and create multipoint connections.
6. In the physical layer Transmission modes include simplex, half-duplex, and full-duplex, which
determine the direction of signal transmission.
7. Multiplexing is a technique used in the physical layer to divide channels into smaller sub-channels
to allow multiple signals to be transmitted simultaneously.
8. The main function of the physical layer is to convert data into signals, transmit them, and convert
them back into data at the receiver end.
DATA LINK LAYER:
1. The data link layer is the second layer in the OSI model, responsible for providing hop-to-hop or
node-to-node delivery of data within a network.
2. The data link layer uses MAC addresses or physical addresses to provide communication within a
network.
3. The primary function of the data link layer is to ensure data is transferred from one node to
another within a network, following proper channels and routers.
4. The data link layer is responsible for flow control, determining the speed at which data is sent to
prevent network congestion and data loss.
5. Various methods and protocols, such as stop-and-wait, go-back-N, and selective repeat, are used
in the data link layer to control the flow of data.
6. The data link layer is also responsible for error control, detecting and correcting errors in data
transmission to ensure accurate data delivery.
Network Layer:
1. The Network Layer, the third layer in the OSI model, is responsible for Host-to-Host or Source-to-
Destination delivery, also known as Machine-to-Machine delivery.
2. The Network Layer uses Logical Addressing (IP addressing) to identify the network and host for
delivering messages.
3. Logical Addressing consists of a Network ID and Host ID, which helps determine the correct
network and machine to send the message.
4. Routing is a critical function of the Network Layer, which decides the best path for a message to
travel from source to destination.
5. Routers, switches, and other devices at the Network Layer use routing protocols to ensure
messages follow a standard set of instructions, enabling efficient communication, Protocols include
RIP and OSPF.
6. Fragmentation is another responsibility of the Network Layer, which breaks down large packets
into smaller fragments to fit the capacity of intermediate devices.
TRANSPORT LAYER:
The video is about the transport layer, which is the 4th layer in the OSI model.
The transport layer takes data from the application layer and passes it to the network
layer.
The main responsibility of the transport layer is end-to-end delivery, also known as port-
to-port delivery.
Port-to-port delivery is the process of delivering data from one application to another
application on a different machine.
Each application on a machine has a unique port number, which is used to identify the
application.
The transport layer uses two major protocols: TCP and UDP.
TCP provides reliability, in-order delivery, and error control, while UDP is simpler and
faster, but does not provide reliability.
Error control in TCP is done using the checksum method, which detects errors in the data.
Congestion control and flow control are also responsibilities of the transport layer.
Congestion control is used to avoid network congestion, while flow control is used to
control the speed and size of messages sent by the sender.
The transport layer divides data from the application layer into segments, which are then
sent to the network layer.
Multiplexing and de-multiplexing are also responsibilities of the transport layer.
Multiplexing is the process of sending data from multiple applications to the network
layer, while de-multiplexing is the process of sending data from the network layer to the
appropriate application.
SESSION LAYER:
The session layer is the fifth layer in the OSI model.
The main is responsible for establishing a session between two workstations that want to exchange
data.
Authentication is the first responsibility of the session layer:
It checks the identity of the user by validating the username and password provided by the user.
After successful authentication, the server grants authorization to the user, which includes a set of
privileges.
Authorization allows the user to access only the things that have been authorized from the server.
Session restoration or checkpointing is another responsibility of the session layer:
It saves the state and values of the system being used.
Session beans are used to save the values and restore the session when needed.
Session restoration allows the user to resume the session where they left off, like in the case of
Mozilla Firefox tabs or Gmail.
Some companies may not allow session restoration to ensure security and prevent session hijacking.
Checkpointing is used in downloading large files to resume the download from the last checkpoint,
saving time and performance.
The session layer helps in webinars, web conferencing, and live TV by providing synchronization and
flow control:
Synchronization ensures that audio and video are playing at the same time.
Flow control prevents lip sync problems and ensures smooth communication.
The session layer is not provided by the operating system; instead, it is the responsibility of the
application being used.
The session layer includes authentication, authorization, session restoration, and synchronization.
PRESENTATION LAYER:
The three main functionalities that are generally associated with the presentation layer are code
conversion, data formatting, and encryption/decryption.
The presentation layer is responsible for code conversion, which involves converting data from one
format to another. For example, if an application on Machine 1 uses ASCII code and needs to send
data to an application on Machine 2 that uses EBCDIC code, the presentation layer handles this
conversion.
The presentation layer is also responsible for formatting the data to ensure it is properly displayed to
the user. This involves converting the data into a format that the application layer can use.
Encryption and decryption are another responsibility of the presentation layer. Encryption is used to
ensure data confidentiality and prevent unauthorized access. This is particularly important in the
context of cyber security and protecting sensitive data.
Data compression is another functionality of the presentation layer. This involves removing
redundant data to reduce the size of the data being transmitted. This can help improve network
performance.
It's important to note that the coding of the presentation layer is not the responsibility of the
operating system. Instead, it's the responsibility of the application layer that uses the presentation
layer.
The presentation layer provides these functionalities to help the application layer properly represent
the data.
APPLICATION LAYER:
Application layer − It is the topmost layer of the network that is responsible for
sending application requests by the user to the lower levels. Typical applications
include file transfer, E-mail, remote logon, data entry, etc.