SlideShare a Scribd company logo
ISO-OSI Model
• The OSI reference model
• Services in the OSI model
Topics
• OSI Reference Model - internationally
standardised network architecture.
• OSI = Open Systems Interconnection: deals
with open systems, i.e. systems open for
communications with other systems.
• Specified in ISO 7498.
• Model has 7 layers.
OSI Reference Model
• Layers 1-4 relate to
communications technology.
• Layers 5-7 relate to user
applications.
7-Layer OSI Model
Layer 7
Layer 6
Layer 5
Layer 4
Layer 3
Layer 2
Layer 1
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Communications subnet boundary
• Level at which applications access network
services.
– Represents services that directly support
software applications for file transfers,
database access, and electronic mail etc.
Layer 7: Application Layer
• Related to representation of transmitted
data
– Translates different data representations from
the Application layer into uniform standard
format
• Providing services for secure efficient data
transmission
– e.g. data encryption, and data compression.
Layer 6: Presentation Layer
• Allows two applications on different computers to
establish, use, and end a session.
– e.g. file transfer, remote login
• Establishes dialog control
– Regulates which side transmits, plus when and how
long it transmits.
• Performs token management and synchronization.
Layer 5: Session Layer
• Manages transmission packets
– Repackages long messages when necessary
into small packets for transmission
– Reassembles packets in correct order to get
the original message.
• Handles error recognition and recovery.
– Transport layer at receiving acknowledges
packet delivery.
– Resends missing packets
Layer 4: Transport Layer
• Manages addressing/routing of data within the
subnet
– Addresses messages and translates logical
addresses and names into physical addresses.
– Determines the route from the source to the
destination computer
– Manages traffic problems, such as switching, routing,
and controlling the congestion of data packets.
• Routing can be:
– Based on static tables
– determined at start of each session
– Individually determined for each packet, reflecting the
current network load.
Layer 3: Network Layer
 Packages raw bits from the Physical layer
into frames (logical, structured packets for
data).
 Provides reliable transmission of frames
 It waits for an acknowledgment from the
receiving computer.
 Retransmits frames for which
acknowledgement not received
Layer 2: Data Link Layer
• Transmits bits from one computer to another
• Regulates the transmission of a stream of bits
over a physical medium.
• Defines how the cable is attached to the network
adapter and what transmission technique is used
to send data over the cable. Deals with issues
like
– The definition of 0 and 1, e.g. how many volts represents a
1, and how long a bit lasts?
– Whether the channel is simplex or duplex?
– How many pins a connector has, and what the function of
each pin is?
Layer 1: Physical Layer
• Explicit
Presentation and
session layers
missing in Internet
Protocols
• Data Link and
Network Layers
redesigned
Internet Protocols vs OSI
Application
Presentation
Session
Transport
Network
Data Link
Physical
Application
TCP
IP
Network Interface
Hardware
• In OSI model, each layer provide services to
layer above, and ‘consumes’ services provided
by layer below.
• Active elements in a layer called entities.
• Entities in same layer in different machines
called peer entities.
Services in the OSI Model
• Layer N provides service to layer N+1
Layering Principles
(N+1) Entity
Service User
(N) Entity
Service Provider
(N+1) Entity
Service User
(N) Entity
Service Provider
Layer N Service
Access Point (SAP)
Layer N protocol
N+1
PDU
Layer N+1 protocol
SDU
PDU - Protocol Data Unit
SDU - Service Data Unit
N
PDU
N
PDU
• Layers can offer connection-oriented or
connectionless services.
• Connection-oriented like telephone system.
• Connectionless like postal system.
• Each service has an associated Quality-of-
service (e.g. reliable or unreliable).
Connections
• Reliable services never lose/corrupt data.
• Reliable service costs more.
• Typical application for reliable service is file
transfer.
• Typical application not needing reliable service
is voice traffic.
• Not all applications need connections.
Reliability
• Service = set of primitives provided by one
layer to layer above.
• Service defines what layer can do (but not how
it does it).
• Protocol = set of rules governing data
communication between peer entities, i.e.
format and meaning of frames/packets.
• Service/protocol decoupling very important.
Topics
Ad

More Related Content

Similar to Computer Networking: ISO-OSI Model and TCP/IP Model. (20)

osi.ppt
osi.pptosi.ppt
osi.ppt
LarryYork6
 
osi.ppt power point ppt computer network
osi.ppt power point ppt computer networkosi.ppt power point ppt computer network
osi.ppt power point ppt computer network
Tejaswini Vontela
 
OSI.pptx
OSI.pptxOSI.pptx
OSI.pptx
Gayathiri42
 
osi.ppt
osi.pptosi.ppt
osi.ppt
YumnaShahzaad
 
osi.ppt
osi.pptosi.ppt
osi.ppt
AshokRachapalli1
 
osi.ppt
osi.pptosi.ppt
osi.ppt
ubaidullah75790
 
osi.ppt
osi.pptosi.ppt
osi.ppt
swagatkarve
 
osi.ppt
osi.pptosi.ppt
osi.ppt
KowsalyaJayakumar2
 
osi.ppt
osi.pptosi.ppt
osi.ppt
parthashee3
 
osi Model 7 layers briefly described.ppt
osi Model 7 layers briefly described.pptosi Model 7 layers briefly described.ppt
osi Model 7 layers briefly described.ppt
MubasharMushtaq6
 
OSI transmission model_7layers for communication .ppt
OSI  transmission model_7layers  for communication .pptOSI  transmission model_7layers  for communication .ppt
OSI transmission model_7layers for communication .ppt
ManimegalaM3
 
Osi
OsiOsi
Osi
sabitha sairam
 
1_Operating System.ppt
1_Operating System.ppt1_Operating System.ppt
1_Operating System.ppt
SproohaAthalye
 
Unit -I OSI Model in cs3591 Computer networks
Unit -I OSI Model in cs3591 Computer networksUnit -I OSI Model in cs3591 Computer networks
Unit -I OSI Model in cs3591 Computer networks
vengaimarbhan1
 
osi.ppt
osi.pptosi.ppt
osi.ppt
FatimaHameed31
 
Dc2 t1
Dc2 t1Dc2 t1
Dc2 t1
Nachiket Rajput
 
OSI Model.ppt
OSI Model.pptOSI Model.ppt
OSI Model.ppt
ShantanuBhushanMishr
 
ch5-osi.pdf
ch5-osi.pdfch5-osi.pdf
ch5-osi.pdf
ssuserc8e1481
 
open system interconnection referencemodel.ppt
open system interconnection referencemodel.pptopen system interconnection referencemodel.ppt
open system interconnection referencemodel.ppt
AnkitaAggarwal68
 
OSI Model
OSI ModelOSI Model
OSI Model
DINESH KAMBLE
 

Recently uploaded (20)

AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Ad

Computer Networking: ISO-OSI Model and TCP/IP Model.

  • 2. • The OSI reference model • Services in the OSI model Topics
  • 3. • OSI Reference Model - internationally standardised network architecture. • OSI = Open Systems Interconnection: deals with open systems, i.e. systems open for communications with other systems. • Specified in ISO 7498. • Model has 7 layers. OSI Reference Model
  • 4. • Layers 1-4 relate to communications technology. • Layers 5-7 relate to user applications. 7-Layer OSI Model Layer 7 Layer 6 Layer 5 Layer 4 Layer 3 Layer 2 Layer 1 Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Communications subnet boundary
  • 5. • Level at which applications access network services. – Represents services that directly support software applications for file transfers, database access, and electronic mail etc. Layer 7: Application Layer
  • 6. • Related to representation of transmitted data – Translates different data representations from the Application layer into uniform standard format • Providing services for secure efficient data transmission – e.g. data encryption, and data compression. Layer 6: Presentation Layer
  • 7. • Allows two applications on different computers to establish, use, and end a session. – e.g. file transfer, remote login • Establishes dialog control – Regulates which side transmits, plus when and how long it transmits. • Performs token management and synchronization. Layer 5: Session Layer
  • 8. • Manages transmission packets – Repackages long messages when necessary into small packets for transmission – Reassembles packets in correct order to get the original message. • Handles error recognition and recovery. – Transport layer at receiving acknowledges packet delivery. – Resends missing packets Layer 4: Transport Layer
  • 9. • Manages addressing/routing of data within the subnet – Addresses messages and translates logical addresses and names into physical addresses. – Determines the route from the source to the destination computer – Manages traffic problems, such as switching, routing, and controlling the congestion of data packets. • Routing can be: – Based on static tables – determined at start of each session – Individually determined for each packet, reflecting the current network load. Layer 3: Network Layer
  • 10.  Packages raw bits from the Physical layer into frames (logical, structured packets for data).  Provides reliable transmission of frames  It waits for an acknowledgment from the receiving computer.  Retransmits frames for which acknowledgement not received Layer 2: Data Link Layer
  • 11. • Transmits bits from one computer to another • Regulates the transmission of a stream of bits over a physical medium. • Defines how the cable is attached to the network adapter and what transmission technique is used to send data over the cable. Deals with issues like – The definition of 0 and 1, e.g. how many volts represents a 1, and how long a bit lasts? – Whether the channel is simplex or duplex? – How many pins a connector has, and what the function of each pin is? Layer 1: Physical Layer
  • 12. • Explicit Presentation and session layers missing in Internet Protocols • Data Link and Network Layers redesigned Internet Protocols vs OSI Application Presentation Session Transport Network Data Link Physical Application TCP IP Network Interface Hardware
  • 13. • In OSI model, each layer provide services to layer above, and ‘consumes’ services provided by layer below. • Active elements in a layer called entities. • Entities in same layer in different machines called peer entities. Services in the OSI Model
  • 14. • Layer N provides service to layer N+1 Layering Principles (N+1) Entity Service User (N) Entity Service Provider (N+1) Entity Service User (N) Entity Service Provider Layer N Service Access Point (SAP) Layer N protocol N+1 PDU Layer N+1 protocol SDU PDU - Protocol Data Unit SDU - Service Data Unit N PDU N PDU
  • 15. • Layers can offer connection-oriented or connectionless services. • Connection-oriented like telephone system. • Connectionless like postal system. • Each service has an associated Quality-of- service (e.g. reliable or unreliable). Connections
  • 16. • Reliable services never lose/corrupt data. • Reliable service costs more. • Typical application for reliable service is file transfer. • Typical application not needing reliable service is voice traffic. • Not all applications need connections. Reliability
  • 17. • Service = set of primitives provided by one layer to layer above. • Service defines what layer can do (but not how it does it). • Protocol = set of rules governing data communication between peer entities, i.e. format and meaning of frames/packets. • Service/protocol decoupling very important. Topics