SlideShare a Scribd company logo
1 of 12
   Watch The Dawn of the Net
• Considered an open-standards protocol

• Seven layers to provide networked services

• Each layer has a specific function and must communicate with the layer
  above and below it

• Describes the functions for computers to communicate

• Published in 1984 by the International Organization for Standardization

• Because layers only communicate directly with the layer above and
  below it, newer technologies are able to be introduced at any layer and
  be used transparently by other layers.
•
• Demonstrated when web browsers are able to be used regardless of
  operating system or network hardware

                                   p6 (Doherty, Anderson & Maggiora, 2007)
The OSI Model                                       Physical
                What is it?
 Application    This layer converts output from layer 2 into
                electrical signals that can be transmitted over
 Presentation   the network.


   Session      Example
                Network cables (CAT 5, CAT 53, CAT 6, and
                fiber optic cables are some of the most
  Transport     common physical representations of networks.


   Network      For more information
                Physical Layer Video

  Data Link     Citation
                p6 (Doherty, Anderson & Maggiora, 2007)
   Physical

                  EDTech 541 Network Project
The OSI Model                                       Data Link
                What is it?
 Application    This layer adds a header which identifies the
                layer 3 protocol in addition to the destination
 Presentation   and source hardware address (MAC address)


   Session
                Example
                This layer refers to wireless, local area networks
  Transport     (LANs), and wide area networks (MANs).

                For more information
   Network      Data Link Layer Video

                Citation
  Data Link     p6 (Doherty, Anderson & Maggiora, 2007)


   Physical

                  EDTech 541 Network Project
The OSI Model                                      Network
                What is it?
 Application    This is where most communication layers do
                their work. This layer adds a header to the
 Presentation   beginning of the packet to identify the source
                and destination

   Session
                Example
  Transport     Routers are responsible for directing network
                traffic from a specific location to another
                location through packets.
   Network
                For more information
                Network Layer Video
  Data Link
                Citation
                p7 (Doherty, Anderson & Maggiora, 2007)
   Physical

                  EDTech 541 Network Project
The OSI Model                                    Transport
                What is it?
 Application    This layer takes data from the application and
                breaks it into smaller pieces and adds a
 Presentation   header to identify the sending/receiving
                application. These pieces of data along with
                their headers are called packets.
   Session
                Example
                HTTPS and SSL are often seen when shopping
  Transport     online or engaging in secure transactions.

                For more information
   Network      Transport Layer Video

                Citation
  Data Link     p7 (Doherty, Anderson & Maggiora, 2007)


   Physical

                  EDTech 541 Network Project
The OSI Model                                            Session
                What is it?
 Application    This layer is responsible for managing
                connections between hosts.
 Presentation
                Example
   Session      Video Conferencing (Skype, Google Voice,
                WebEx, Go2Meeting). When functioning
                properly, this layer allows for the audio and
  Transport     video to be streamed synchronously.

                For more information
   Network      Session Layer Video

                Citation
  Data Link     p7 (Doherty, Anderson & Maggiora, 2007)


   Physical

                  EDTech 541 Network Project
The OSI Model                                  Presentation
                What is it?
 Application    This layer formats the data for the application.

 Presentation
                Example
                Accessing Secure Content. The presentation
   Session      layer is where encryption and decryption for
                secure content occurs. It is his layer which
                communicates with the application to display
  Transport     the data session layer to obtain the data.

                For more information
   Network      Presentation Layer video

                Citation
  Data Link     p7 (Doherty, Anderson & Maggiora, 2007)


   Physical

                  EDTech 541 Network Project
The OSI Model                                  Application
                What is it?
 Application    Provides services to a user or an application

 Presentation
                Example
                Sending Email. The application layer takes the
   Session      data from the email application and prepares
                it to be transmitted through the network and
                layers 6, 5, 4, 3, 2, and 1
  Transport
                For more information
                The Application Layer
   Network
                Citation
                p7 (Doherty, Anderson & Maggiora, 2007)
  Data Link

   Physical

                  EDTech 541 Network Project
   While watching The Dawn of the Net, see
    if you can identify examples of the seven
    layers of the OSI model.

 Ready to apply your skills? Play the OSI
  Game
 Find real world examples of the OSI
  Model
Works Cited

Doherty, J., Anderson, N., & Maggiora, P. (2007). Cisco networking
simplified. (2 ed.). Cisco Press.

More Related Content

What's hot

Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsAngelo Corsaro
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolAngelo Corsaro
 
Rise of Network Virtualization
Rise of Network VirtualizationRise of Network Virtualization
Rise of Network VirtualizationArinto Murdopo
 
Vortex II -- The Industrial IoT Connectivity Standard
Vortex II -- The  Industrial IoT  Connectivity StandardVortex II -- The  Industrial IoT  Connectivity Standard
Vortex II -- The Industrial IoT Connectivity StandardAngelo Corsaro
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
 
The Data Distribution Service Tutorial
The Data Distribution Service TutorialThe Data Distribution Service Tutorial
The Data Distribution Service TutorialAngelo Corsaro
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
 
2012 - 2013 DOTNET IEEE PROJECT TITLES
2012 - 2013 DOTNET IEEE PROJECT TITLES2012 - 2013 DOTNET IEEE PROJECT TITLES
2012 - 2013 DOTNET IEEE PROJECT TITLESJPINFOTECH JAYAPRAKASH
 
A Survey on IPv6 Secure Link Local Communication Models, Techniques and Tools
A Survey on IPv6 Secure Link Local Communication Models, Techniques and ToolsA Survey on IPv6 Secure Link Local Communication Models, Techniques and Tools
A Survey on IPv6 Secure Link Local Communication Models, Techniques and ToolsIJARIDEA Journal
 
Network service in open stack cloud
Network service in open stack cloudNetwork service in open stack cloud
Network service in open stack cloudYaohui Jin
 
11.providing security to wireless packet networks by using optimized security...
11.providing security to wireless packet networks by using optimized security...11.providing security to wireless packet networks by using optimized security...
11.providing security to wireless packet networks by using optimized security...Alexander Decker
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio SignalsGufran karim
 
Cisco Network Convergence System: Building the Foundation for the Internet of...
Cisco Network Convergence System: Building the Foundation for the Internet of...Cisco Network Convergence System: Building the Foundation for the Internet of...
Cisco Network Convergence System: Building the Foundation for the Internet of...Cisco Service Provider
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceIJERA Editor
 

What's hot (20)

Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained Envionrments
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
Rise of Network Virtualization
Rise of Network VirtualizationRise of Network Virtualization
Rise of Network Virtualization
 
Vortex II -- The Industrial IoT Connectivity Standard
Vortex II -- The  Industrial IoT  Connectivity StandardVortex II -- The  Industrial IoT  Connectivity Standard
Vortex II -- The Industrial IoT Connectivity Standard
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
The Data Distribution Service Tutorial
The Data Distribution Service TutorialThe Data Distribution Service Tutorial
The Data Distribution Service Tutorial
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation UnitMIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
2012 - 2013 DOTNET IEEE PROJECT TITLES
2012 - 2013 DOTNET IEEE PROJECT TITLES2012 - 2013 DOTNET IEEE PROJECT TITLES
2012 - 2013 DOTNET IEEE PROJECT TITLES
 
It3116411644
It3116411644It3116411644
It3116411644
 
27 30
27 3027 30
27 30
 
Project titles abstract_2012
Project titles abstract_2012Project titles abstract_2012
Project titles abstract_2012
 
A Survey on IPv6 Secure Link Local Communication Models, Techniques and Tools
A Survey on IPv6 Secure Link Local Communication Models, Techniques and ToolsA Survey on IPv6 Secure Link Local Communication Models, Techniques and Tools
A Survey on IPv6 Secure Link Local Communication Models, Techniques and Tools
 
cBox_eureka11
cBox_eureka11cBox_eureka11
cBox_eureka11
 
LIFI
LIFILIFI
LIFI
 
Network service in open stack cloud
Network service in open stack cloudNetwork service in open stack cloud
Network service in open stack cloud
 
11.providing security to wireless packet networks by using optimized security...
11.providing security to wireless packet networks by using optimized security...11.providing security to wireless packet networks by using optimized security...
11.providing security to wireless packet networks by using optimized security...
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio Signals
 
Cisco Network Convergence System: Building the Foundation for the Internet of...
Cisco Network Convergence System: Building the Foundation for the Internet of...Cisco Network Convergence System: Building the Foundation for the Internet of...
Cisco Network Convergence System: Building the Foundation for the Internet of...
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
 

Viewers also liked

082512 us supreme court response (HINDI)
082512   us supreme court response (HINDI)082512   us supreme court response (HINDI)
082512 us supreme court response (HINDI)VogelDenise
 
031808 obama speech (turkish)
031808   obama speech (turkish)031808   obama speech (turkish)
031808 obama speech (turkish)VogelDenise
 
FRED MALEK (Wikipedia Information)
FRED MALEK (Wikipedia Information)FRED MALEK (Wikipedia Information)
FRED MALEK (Wikipedia Information)VogelDenise
 
Kenneth and Mamie Clark (BABY DOLL EXPERIMENT)
Kenneth and Mamie Clark (BABY DOLL EXPERIMENT)Kenneth and Mamie Clark (BABY DOLL EXPERIMENT)
Kenneth and Mamie Clark (BABY DOLL EXPERIMENT)VogelDenise
 
Latvian thank you to republic of ecuador (asylum of julian assange)
Latvian   thank you to  republic of ecuador (asylum of julian assange)Latvian   thank you to  republic of ecuador (asylum of julian assange)
Latvian thank you to republic of ecuador (asylum of julian assange)VogelDenise
 
Russian thank you to republic of ecuador (asylum of julian assange)
Russian   thank you to  republic of ecuador (asylum of julian assange)Russian   thank you to  republic of ecuador (asylum of julian assange)
Russian thank you to republic of ecuador (asylum of julian assange)VogelDenise
 
050113 fax to judy clarke (boston marathon bombing) - chinese (traditional)
050113   fax to judy clarke (boston marathon bombing) - chinese (traditional)050113   fax to judy clarke (boston marathon bombing) - chinese (traditional)
050113 fax to judy clarke (boston marathon bombing) - chinese (traditional)VogelDenise
 
Norwegian thank you to republic of ecuador (asylum of julian assange)
Norwegian   thank you to  republic of ecuador (asylum of julian assange)Norwegian   thank you to  republic of ecuador (asylum of julian assange)
Norwegian thank you to republic of ecuador (asylum of julian assange)VogelDenise
 
071310 obama email (japanese)
071310   obama email (japanese)071310   obama email (japanese)
071310 obama email (japanese)VogelDenise
 
072712 usa ku klux klan runned government - swahili
072712 usa ku klux klan runned government - swahili072712 usa ku klux klan runned government - swahili
072712 usa ku klux klan runned government - swahiliVogelDenise
 
092909 EMAIL TO OLYMPIC COMMITTEE (LATVIAN)
092909   EMAIL TO OLYMPIC COMMITTEE (LATVIAN)092909   EMAIL TO OLYMPIC COMMITTEE (LATVIAN)
092909 EMAIL TO OLYMPIC COMMITTEE (LATVIAN)VogelDenise
 
072712 usa ku klux klan runned government - hindi
072712 usa ku klux klan runned government - hindi072712 usa ku klux klan runned government - hindi
072712 usa ku klux klan runned government - hindiVogelDenise
 
LITHUANIAN hillary clinton stingers
LITHUANIAN   hillary clinton stingersLITHUANIAN   hillary clinton stingers
LITHUANIAN hillary clinton stingersVogelDenise
 
YIDDISH hillary clinton stingers
YIDDISH   hillary clinton stingersYIDDISH   hillary clinton stingers
YIDDISH hillary clinton stingersVogelDenise
 
082512 us supreme court response (ESPERANTO)
082512   us supreme court response (ESPERANTO)082512   us supreme court response (ESPERANTO)
082512 us supreme court response (ESPERANTO)VogelDenise
 
CHINESE (Simplified) hillary clinton stingers
CHINESE (Simplified)   hillary clinton stingersCHINESE (Simplified)   hillary clinton stingers
CHINESE (Simplified) hillary clinton stingersVogelDenise
 
BARACK OBAMA- UNDERSTANDING WILLIE LYNCH (Czech)
BARACK OBAMA- UNDERSTANDING WILLIE LYNCH (Czech)BARACK OBAMA- UNDERSTANDING WILLIE LYNCH (Czech)
BARACK OBAMA- UNDERSTANDING WILLIE LYNCH (Czech)VogelDenise
 
071310 obama email (esperanto)
071310   obama email (esperanto)071310   obama email (esperanto)
071310 obama email (esperanto)VogelDenise
 
071310 obama email (arabic)
071310   obama email (arabic)071310   obama email (arabic)
071310 obama email (arabic)VogelDenise
 
092812 david addington article (esperanto)
092812   david addington article (esperanto)092812   david addington article (esperanto)
092812 david addington article (esperanto)VogelDenise
 

Viewers also liked (20)

082512 us supreme court response (HINDI)
082512   us supreme court response (HINDI)082512   us supreme court response (HINDI)
082512 us supreme court response (HINDI)
 
031808 obama speech (turkish)
031808   obama speech (turkish)031808   obama speech (turkish)
031808 obama speech (turkish)
 
FRED MALEK (Wikipedia Information)
FRED MALEK (Wikipedia Information)FRED MALEK (Wikipedia Information)
FRED MALEK (Wikipedia Information)
 
Kenneth and Mamie Clark (BABY DOLL EXPERIMENT)
Kenneth and Mamie Clark (BABY DOLL EXPERIMENT)Kenneth and Mamie Clark (BABY DOLL EXPERIMENT)
Kenneth and Mamie Clark (BABY DOLL EXPERIMENT)
 
Latvian thank you to republic of ecuador (asylum of julian assange)
Latvian   thank you to  republic of ecuador (asylum of julian assange)Latvian   thank you to  republic of ecuador (asylum of julian assange)
Latvian thank you to republic of ecuador (asylum of julian assange)
 
Russian thank you to republic of ecuador (asylum of julian assange)
Russian   thank you to  republic of ecuador (asylum of julian assange)Russian   thank you to  republic of ecuador (asylum of julian assange)
Russian thank you to republic of ecuador (asylum of julian assange)
 
050113 fax to judy clarke (boston marathon bombing) - chinese (traditional)
050113   fax to judy clarke (boston marathon bombing) - chinese (traditional)050113   fax to judy clarke (boston marathon bombing) - chinese (traditional)
050113 fax to judy clarke (boston marathon bombing) - chinese (traditional)
 
Norwegian thank you to republic of ecuador (asylum of julian assange)
Norwegian   thank you to  republic of ecuador (asylum of julian assange)Norwegian   thank you to  republic of ecuador (asylum of julian assange)
Norwegian thank you to republic of ecuador (asylum of julian assange)
 
071310 obama email (japanese)
071310   obama email (japanese)071310   obama email (japanese)
071310 obama email (japanese)
 
072712 usa ku klux klan runned government - swahili
072712 usa ku klux klan runned government - swahili072712 usa ku klux klan runned government - swahili
072712 usa ku klux klan runned government - swahili
 
092909 EMAIL TO OLYMPIC COMMITTEE (LATVIAN)
092909   EMAIL TO OLYMPIC COMMITTEE (LATVIAN)092909   EMAIL TO OLYMPIC COMMITTEE (LATVIAN)
092909 EMAIL TO OLYMPIC COMMITTEE (LATVIAN)
 
072712 usa ku klux klan runned government - hindi
072712 usa ku klux klan runned government - hindi072712 usa ku klux klan runned government - hindi
072712 usa ku klux klan runned government - hindi
 
LITHUANIAN hillary clinton stingers
LITHUANIAN   hillary clinton stingersLITHUANIAN   hillary clinton stingers
LITHUANIAN hillary clinton stingers
 
YIDDISH hillary clinton stingers
YIDDISH   hillary clinton stingersYIDDISH   hillary clinton stingers
YIDDISH hillary clinton stingers
 
082512 us supreme court response (ESPERANTO)
082512   us supreme court response (ESPERANTO)082512   us supreme court response (ESPERANTO)
082512 us supreme court response (ESPERANTO)
 
CHINESE (Simplified) hillary clinton stingers
CHINESE (Simplified)   hillary clinton stingersCHINESE (Simplified)   hillary clinton stingers
CHINESE (Simplified) hillary clinton stingers
 
BARACK OBAMA- UNDERSTANDING WILLIE LYNCH (Czech)
BARACK OBAMA- UNDERSTANDING WILLIE LYNCH (Czech)BARACK OBAMA- UNDERSTANDING WILLIE LYNCH (Czech)
BARACK OBAMA- UNDERSTANDING WILLIE LYNCH (Czech)
 
071310 obama email (esperanto)
071310   obama email (esperanto)071310   obama email (esperanto)
071310 obama email (esperanto)
 
071310 obama email (arabic)
071310   obama email (arabic)071310   obama email (arabic)
071310 obama email (arabic)
 
092812 david addington article (esperanto)
092812   david addington article (esperanto)092812   david addington article (esperanto)
092812 david addington article (esperanto)
 

Similar to OSI Model Explained in Under 40

osi-tcp.pptx..................................
osi-tcp.pptx..................................osi-tcp.pptx..................................
osi-tcp.pptx..................................DeepakM509554
 
Lalit bhati ppt osi
Lalit bhati ppt osiLalit bhati ppt osi
Lalit bhati ppt osiLalit Bhati
 
Mode of Data Flow in the OSI Model
Mode of Data Flow in the OSI ModelMode of Data Flow in the OSI Model
Mode of Data Flow in the OSI Modelijiert bestjournal
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP ModelTapan Khilar
 
Routers BY RAJIT(9816115641)
Routers BY RAJIT(9816115641)Routers BY RAJIT(9816115641)
Routers BY RAJIT(9816115641)C.U
 
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docxRunning Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docxtodd521
 
Chapter 4
Chapter 4Chapter 4
Chapter 4asguna
 
Network Layered Models Rroosend
Network Layered Models RroosendNetwork Layered Models Rroosend
Network Layered Models Rroosendrroosend
 
3G Wireless Access, Abstract
3G Wireless Access, Abstract3G Wireless Access, Abstract
3G Wireless Access, AbstractVictoria Burke
 
Osi model (open systems interconnection)
Osi model (open systems interconnection)Osi model (open systems interconnection)
Osi model (open systems interconnection)maria afzal
 

Similar to OSI Model Explained in Under 40 (20)

1-03-OSI.ppt
1-03-OSI.ppt1-03-OSI.ppt
1-03-OSI.ppt
 
Networks
Networks Networks
Networks
 
osi-tcp.pptx..................................
osi-tcp.pptx..................................osi-tcp.pptx..................................
osi-tcp.pptx..................................
 
Lalit bhati ppt osi
Lalit bhati ppt osiLalit bhati ppt osi
Lalit bhati ppt osi
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Mode of Data Flow in the OSI Model
Mode of Data Flow in the OSI ModelMode of Data Flow in the OSI Model
Mode of Data Flow in the OSI Model
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
 
Network layers
Network layersNetwork layers
Network layers
 
Class work4
Class work4Class work4
Class work4
 
Routers BY RAJIT(9816115641)
Routers BY RAJIT(9816115641)Routers BY RAJIT(9816115641)
Routers BY RAJIT(9816115641)
 
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docxRunning Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Osi model
Osi modelOsi model
Osi model
 
THE OSI MODEL
THE OSI MODEL THE OSI MODEL
THE OSI MODEL
 
Network Layered Models Rroosend
Network Layered Models RroosendNetwork Layered Models Rroosend
Network Layered Models Rroosend
 
3G Wireless Access, Abstract
3G Wireless Access, Abstract3G Wireless Access, Abstract
3G Wireless Access, Abstract
 
Osi model (open systems interconnection)
Osi model (open systems interconnection)Osi model (open systems interconnection)
Osi model (open systems interconnection)
 

OSI Model Explained in Under 40

  • 1.
  • 2. Watch The Dawn of the Net
  • 3. • Considered an open-standards protocol • Seven layers to provide networked services • Each layer has a specific function and must communicate with the layer above and below it • Describes the functions for computers to communicate • Published in 1984 by the International Organization for Standardization • Because layers only communicate directly with the layer above and below it, newer technologies are able to be introduced at any layer and be used transparently by other layers. • • Demonstrated when web browsers are able to be used regardless of operating system or network hardware p6 (Doherty, Anderson & Maggiora, 2007)
  • 4. The OSI Model Physical What is it? Application This layer converts output from layer 2 into electrical signals that can be transmitted over Presentation the network. Session Example Network cables (CAT 5, CAT 53, CAT 6, and fiber optic cables are some of the most Transport common physical representations of networks. Network For more information Physical Layer Video Data Link Citation p6 (Doherty, Anderson & Maggiora, 2007) Physical EDTech 541 Network Project
  • 5. The OSI Model Data Link What is it? Application This layer adds a header which identifies the layer 3 protocol in addition to the destination Presentation and source hardware address (MAC address) Session Example This layer refers to wireless, local area networks Transport (LANs), and wide area networks (MANs). For more information Network Data Link Layer Video Citation Data Link p6 (Doherty, Anderson & Maggiora, 2007) Physical EDTech 541 Network Project
  • 6. The OSI Model Network What is it? Application This is where most communication layers do their work. This layer adds a header to the Presentation beginning of the packet to identify the source and destination Session Example Transport Routers are responsible for directing network traffic from a specific location to another location through packets. Network For more information Network Layer Video Data Link Citation p7 (Doherty, Anderson & Maggiora, 2007) Physical EDTech 541 Network Project
  • 7. The OSI Model Transport What is it? Application This layer takes data from the application and breaks it into smaller pieces and adds a Presentation header to identify the sending/receiving application. These pieces of data along with their headers are called packets. Session Example HTTPS and SSL are often seen when shopping Transport online or engaging in secure transactions. For more information Network Transport Layer Video Citation Data Link p7 (Doherty, Anderson & Maggiora, 2007) Physical EDTech 541 Network Project
  • 8. The OSI Model Session What is it? Application This layer is responsible for managing connections between hosts. Presentation Example Session Video Conferencing (Skype, Google Voice, WebEx, Go2Meeting). When functioning properly, this layer allows for the audio and Transport video to be streamed synchronously. For more information Network Session Layer Video Citation Data Link p7 (Doherty, Anderson & Maggiora, 2007) Physical EDTech 541 Network Project
  • 9. The OSI Model Presentation What is it? Application This layer formats the data for the application. Presentation Example Accessing Secure Content. The presentation Session layer is where encryption and decryption for secure content occurs. It is his layer which communicates with the application to display Transport the data session layer to obtain the data. For more information Network Presentation Layer video Citation Data Link p7 (Doherty, Anderson & Maggiora, 2007) Physical EDTech 541 Network Project
  • 10. The OSI Model Application What is it? Application Provides services to a user or an application Presentation Example Sending Email. The application layer takes the Session data from the email application and prepares it to be transmitted through the network and layers 6, 5, 4, 3, 2, and 1 Transport For more information The Application Layer Network Citation p7 (Doherty, Anderson & Maggiora, 2007) Data Link Physical EDTech 541 Network Project
  • 11. While watching The Dawn of the Net, see if you can identify examples of the seven layers of the OSI model.  Ready to apply your skills? Play the OSI Game  Find real world examples of the OSI Model
  • 12. Works Cited Doherty, J., Anderson, N., & Maggiora, P. (2007). Cisco networking simplified. (2 ed.). Cisco Press.

Editor's Notes

  1. Cathy
  2. All