Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13
NETWORK &
SYSTEM ADMINISTRATION MCIT 06103
C.M.N The OSI Model • OSI (Open Systems Interconnection) model - describes seven layers that computer systems use to communicate over a network.
• It was first developed by the International Organization for
Standardization, also called the ISO. (Its shortened name, ISO, is derived from a Greek word meaning equal.) Network engineers, hardware technicians, programmers, and network administrators still use the layers of the OSI model to communicate about networking technologies. OSI Model • You need to memorize the seven layers of the OSI model. Here’s a seven-word mnemonic that can help, or you can write your own: All People Seem To Need Data Processing
Now let’s take a look at each layer in the OSI model.
The layers are numbered in descending order, starting with Layer 7, the Application layer, at the top. Layer 7: Application Layer • Describes the interface between two applications, each on separate computers. • It is the Human-computer interaction layer, where apps can access network services. • includes protocols like HTTP, SMTP, POP3, IMAP4, FTP, and Telnet. Layer 6: Presentation Layer • Is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read. • For example, an email message can be encrypted at the Presentation layer by the email client or by the operating system. • It ensures data is in a usable format and it is where encryption of data occurs Layer 5: Session Layer • Describes how data between applications is synced and recovered if messages don’t arrive intact at the receiving application.
• For example, the Skype application works with the
operating system to establish and maintain a session between two end points for as long as a voice conversation or video conference is in progress.
• How are session interruptions handled in the session
layer. Layer 4: Transport Layer • Is responsible for transporting Application layer payloads from one application to another
• It takes data transferred in the session layer and
breaks it into segments on the transmitting end.
• It reassembles the segments on the receiving
end, turning it back into data that can be used in the session layer. • Eg. UDP and TCP UDP vs TCP • UDP (User Datagram Protocol) TCP (Transmission Control • Is a connection-less or best- Protocol) effort protocol. Why? • Is a connection-oriented • Does not guarantee delivery by protocol, it makes a connection first connecting and checking with the end host, checks whether data is received whether the data is received, and resends it if it is not. • It guarantees delivery (It takes longer) Layer 3: Network Layer • Is responsible for moving messages from one node to another until they reach the destination host. • Also known as the Internet Layer • The principal protocol used by the Network layer is IP (Internet Protocol). • Has two main functions: 1. Breaking segments into packets & reassembling the packets 2. Routing packets by discovering the best path across a physical network Layer 2: Data Link Layer • Is responsible for establishing and terminating a connection btn two physically-connected nodes on a network. • It breaks up packets into frames and sends them from source to destination. • The protocols at these layers are programmed into the firmware of a computer’s NIC and other networking hardware.
• It is composed of two parts:
1. LLC (Logical Link Control) 2. MAC(Media Access Control) Layer 1: Physical Layer • Is responsible for the physical cable or wireless connection btn network nodes. • It defines the connector, the electrical cable or wireless technology connecting the devices • Also transmits raw data (0s and 1s) End of Lesson