SlideShare a Scribd company logo
1 of 31
OSI

Physical Layer: http://learn-networking.com/network-
design/the-difference-between-straight-through-
crossover-and-rollover-cables

The Physical Layer is the copper, fiber, or wireless that
connects network devices. The bits that arrive here are
encoded according to the protocols that govern their
type of end device. The control code is added to
indicate the beginning and ending of each frame of bits.
The encoded bits are transformed into signals
(voltage, light, or radio waves) and sent to the
destination device.
The Data-Link layer arranges the bits it receives into
frames and provides synchronization, error control and
flow control. It has two sub layers that are the logical link
control and media access control. It begins the process of
encapsulation and adds a trailer and header. The source
and destination addresses are included along with frame
check sequence values, quality of service, and type of
protocol for whatever media is present. It links the
hardware and software layers together.
Network Layer

Translates addresses from logical to physical and visa-
versa the other way. This is where addressing the
networks and subnetting comes into play.




Encapsulation of frames: IP header, source IP
address, destination IP address.

All available common network layer protocols.




                                  can’t wait! Dynamically
                                           done for me
Type of service determines the priority of the packet
and looks for the Quality of Service to decide who goes
first. EX: Voice transmits faster than e-mail.
Time to Live ensures a packet can’t get stuck looping in
to infinity.
Protocol determines which type of data packet it is:
ICMP, TCP, UDP
The header checksum provides a security measure to
make sure the data is exactly how it was from
origination to destination.
Packet Length is between
Routing:




Carrying Data end to end:
Transport Layer: Visual Version
Source Port
Address or name of remote host
                     destination Port
                                     Connection State
The top three layers

Application Layer: Is the first step to getting data onto
the network.

Three primary functions:
1. Coding and conversion of application layer data to
   ensure that data from the source device can be
   interpreted by the appropriate application on the
   destination device.
2. Compression of the data so that it can be
   decompressed by the destination device.
3. Encryption of the data for transmission and
   decryption of data by the destination device.

Applications are computer programs with which the user
interacts and that initiate the data transfer process at
the user’s request.
Services are background programs that provide the
connection between the application layer and the lower
layers of the networking model.


The most widely-known TCP/IP Application layer
protocols are those that provide for the exchange of
user information. These protocols specify the format
and control information necessary for many of the
common Internet communication functions. Among
these TCP/IP protocols are:
DNS: TCP/UDP port 53




Telnet: TCP port 23




SMTP:TCP port 25, POP:UDP port 110



                         DHDHCP: UDP port 67



                             port 80a




                       TCP ports 20 and 21

More Related Content

What's hot

TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcp
Agrippa Mungazi
 

What's hot (20)

Basic Concepts of Computer Networking
 Basic Concepts of Computer Networking Basic Concepts of Computer Networking
Basic Concepts of Computer Networking
 
Cn
CnCn
Cn
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Network Protocol
Network ProtocolNetwork Protocol
Network Protocol
 
Networking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
Networking Essentials Lesson 02 - Standards and OSI - Eric VanderburgNetworking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
Networking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
 
Internet stack protocol
Internet stack protocolInternet stack protocol
Internet stack protocol
 
Communication protocol presentation
Communication protocol presentationCommunication protocol presentation
Communication protocol presentation
 
Tcp/ip model and protocol
Tcp/ip model and protocolTcp/ip model and protocol
Tcp/ip model and protocol
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
Osi & ip presentation
Osi & ip presentationOsi & ip presentation
Osi & ip presentation
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Osi model
Osi modelOsi model
Osi model
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcp
 

Viewers also liked (9)

Mazzotti alternanza scuola lavoro
Mazzotti alternanza scuola lavoroMazzotti alternanza scuola lavoro
Mazzotti alternanza scuola lavoro
 
Stage classi quarte ppt
Stage  classi quarte pptStage  classi quarte ppt
Stage classi quarte ppt
 
Illustrating Freedom: 'Martin Luther King and the Montgomery Story' as a Rhet...
Illustrating Freedom: 'Martin Luther King and the Montgomery Story' as a Rhet...Illustrating Freedom: 'Martin Luther King and the Montgomery Story' as a Rhet...
Illustrating Freedom: 'Martin Luther King and the Montgomery Story' as a Rhet...
 
ITST G. Mazzotti - Presentazione viaggi 2014
ITST G. Mazzotti - Presentazione viaggi 2014ITST G. Mazzotti - Presentazione viaggi 2014
ITST G. Mazzotti - Presentazione viaggi 2014
 
Welch v powerpoint1
Welch v powerpoint1Welch v powerpoint1
Welch v powerpoint1
 
Truecrypt
TruecryptTruecrypt
Truecrypt
 
Graphs
GraphsGraphs
Graphs
 
Sony history [balu]
Sony history [balu]Sony history [balu]
Sony history [balu]
 
Eco presentation Ukraine 2012
Eco presentation Ukraine 2012Eco presentation Ukraine 2012
Eco presentation Ukraine 2012
 

Similar to Osi

Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
manish jha
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressing
Anitha Selvan
 

Similar to Osi (20)

01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.
 
Assignment3
Assignment3Assignment3
Assignment3
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics Requriement
 
seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI model
 
Presentation (1)
Presentation (1)Presentation (1)
Presentation (1)
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressing
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
 
NOS Unit.pdf
NOS Unit.pdfNOS Unit.pdf
NOS Unit.pdf
 
computer network basics
computer network basicscomputer network basics
computer network basics
 
Mid term Topic
Mid term TopicMid term Topic
Mid term Topic
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference Model
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1
 

Recently uploaded

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 

Osi

  • 1. OSI Physical Layer: http://learn-networking.com/network- design/the-difference-between-straight-through- crossover-and-rollover-cables The Physical Layer is the copper, fiber, or wireless that connects network devices. The bits that arrive here are encoded according to the protocols that govern their type of end device. The control code is added to indicate the beginning and ending of each frame of bits. The encoded bits are transformed into signals (voltage, light, or radio waves) and sent to the destination device.
  • 2. The Data-Link layer arranges the bits it receives into frames and provides synchronization, error control and flow control. It has two sub layers that are the logical link control and media access control. It begins the process of encapsulation and adds a trailer and header. The source and destination addresses are included along with frame check sequence values, quality of service, and type of protocol for whatever media is present. It links the hardware and software layers together.
  • 3. Network Layer Translates addresses from logical to physical and visa- versa the other way. This is where addressing the networks and subnetting comes into play. Encapsulation of frames: IP header, source IP address, destination IP address. All available common network layer protocols. can’t wait! Dynamically done for me
  • 4. Type of service determines the priority of the packet and looks for the Quality of Service to decide who goes first. EX: Voice transmits faster than e-mail. Time to Live ensures a packet can’t get stuck looping in to infinity. Protocol determines which type of data packet it is: ICMP, TCP, UDP The header checksum provides a security measure to make sure the data is exactly how it was from origination to destination. Packet Length is between
  • 6.
  • 7.
  • 8.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Source Port Address or name of remote host destination Port Connection State
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. The top three layers Application Layer: Is the first step to getting data onto the network. Three primary functions: 1. Coding and conversion of application layer data to ensure that data from the source device can be interpreted by the appropriate application on the destination device. 2. Compression of the data so that it can be decompressed by the destination device. 3. Encryption of the data for transmission and decryption of data by the destination device. Applications are computer programs with which the user interacts and that initiate the data transfer process at the user’s request. Services are background programs that provide the connection between the application layer and the lower layers of the networking model. The most widely-known TCP/IP Application layer protocols are those that provide for the exchange of user information. These protocols specify the format and control information necessary for many of the common Internet communication functions. Among these TCP/IP protocols are:
  • 31. DNS: TCP/UDP port 53 Telnet: TCP port 23 SMTP:TCP port 25, POP:UDP port 110 DHDHCP: UDP port 67 port 80a TCP ports 20 and 21