SlideShare a Scribd company logo
chp1:OSI MODEL
 OSI model
 Data encapsulation and decapsulation within the OSI model context
OSI MODEL
The Open Systems Interconnection (OSI) was created in 1984 by ISO, is a
reference framework that explains the process of transmitting data between
computers. It is divided into seven layers that work together to carry out
specialised network functions as shown in Figure
Omnya Ashraf.Network (chp1 OSI MODEL.).pptx
The seven layers of the OSI reference model
are described in more detail
1. Physical Layer
The physical layer is responsible for the physical cable or
wireless connection between network nodes. It defines the
connector, the electrical cable or wireless technology
connecting the devices, and is responsible for transmission
of the raw data, which is simply a series of 0s and 1s, while
taking care of bit rate control
Functions of the Physical Layer
• Bit Synchronization: The physical layer provides the synchronization of the bits by
providing a clock. This clock controls both sender and receiver thus providing synchronization
at the bit level.
• Bit Rate Control: The Physical layer also defines the transmission rate i.e. the number of
bits sent per second.
• Physical Topologies: Physical layer specifies how the different, devices/nodes are
arranged in a network i.e. bus, star, or mesh topology.
• Transmission Mode: Physical layer also defines how the data flows between the two
connected devices. The various transmission modes possible are Simplex, half-duplex and
full-duplex.
2.Data Link Layer – Layer 2
The data link layer is responsible for the node-to-node delivery of the message. The
main function of this layer is to make sure data transfer is error-free from one node
to another, over the physical layer. When a packet arrives in a network, it is the
responsibility of the DLL to transmit it to the Host using its MAC address.
The Data Link Layer is divided into two sublayers:
 Logical Link Control (LLC)
 Media Access Control (MAC)
The packet received from the Network layer is further divided into frames depending on the frame
size of the NIC(Network Interface Card). DLL also encapsulates Sender and Receiver’s MAC
address in the header.
The Receiver’s MAC address is obtained by placing an ARP(Address Resolution Protocol) request
onto the wire asking “Who has that IP address?” and the destination host will reply with its MAC
address.
Functions of the Data Link Layer
• Framing:Framing is a function of the data link layer. It provides a way for a
sender to transmit a set of bits that are meaningful to the receiver. This can be
accomplished by attaching special bit patterns to the beginning and end of the frame.
• Physical Addressing: After creating frames, the Data link layer adds physical
addresses (MAC addresses) of the sender and/or receiver in the header of each
frame.
• Error Control: The data link layer provides the mechanism of error control in
which it detects and retransmits damaged or lost frames.
• Flow Control: The data rate must be constant on both sides else the data may
get corrupted thus, flow control coordinates the amount of data that can be sent
before receiving an acknowledgment.
• Access Control: When a single communication channel is shared by multiple
devices, the MAC sub-layer of the data link layer helps to determine which device has
control over the channel at a given time.
3.Network Layer – Layer 3
The network layer works for the transmission of data from
one host to the other located in different networks. It also
takes care of packet routing i.e. selection of the shortest
path to transmit the packet, from the number of routes
available. The sender & receiver’s IP addresses are placed
in the header by the network layer.
Functions of the Network Layer
Routing: The network layer protocols determine which route is
suitable from source to destination. This function of the network layer is
known as routing.
Logical Addressing: To identify each device inter-network uniquely,
the network layer defines an addressing scheme. The sender &
receiver’s IP addresses are placed in the header by the network layer.
Such an address distinguishes each device uniquely and universally.
Note:
Segment in the Network layer is referred to as Packet.
Network layer is implemented by networking devices such as
routers and switches.
4.Transport Layer – Layer 4
The transport layer provides services to the application layer
and takes services from the network layer. The data in the
transport layer is referred to as Segments. It is responsible
for the end-to-end delivery of the complete message. The
transport layer also provides the acknowledgment of the
successful data transmission and re-transmits the data if an
error is found.
Functions of the Transport Layer
.
• This layer accepts the message from the (session) layer, and breaks
the message into smaller units. Each of the segments produced has a
header associated with it. The transport layer at the destination station
reassembles the message.
• To deliver the message to the correct process, the transport layer
header includes a type of address called service point address or port
address. Thus by specifying this address, the transport layer makes
sure that the message is delivered to the correct process.
Services Provided by Transport Layer
 Connection-Oriented Service
 Connectionless Service
5.Session Layer – Layer 5
This layer is responsible for the establishment of
connection, maintenance of sessions, and authentication,
and also ensures security.
Functions of the Session Layer
• Session Establishment, Maintenance, and Termination: The layer
allows the two processes to establish, use, and terminate a connection.
• Synchronization: This layer allows a process to add checkpoints that
are considered synchronization points in the data. These
synchronization points help to identify the error so that the data is re-
synchronized properly, and ends of the messages are not cut
prematurely and data loss is avoided.
• Dialog Controller: The session layer allows two systems to start
communication with each other in half-duplex or full-duplex.
6.Presentation Layer – Layer 6
The presentation layer is also called the Translation
layer. The data from the application layer is extracted
here and manipulated as per the required format to
transmit over the network.
Functions of the Presentation Layer
Translation: For example, ASCII to EBCDIC.
Encryption/ Decryption: Data encryption translates the
data into another form or code. The encrypted data is known as
the ciphertext and the decrypted data is known as plain text. A
key value is used for encrypting as well as decrypting data.
Compression: Reduces the number of bits that need to be
transmitted on the network.
Note: Device or Protocol Use: JPEG, MPEG, GIF.
7.Application Layer – Layer 7
At the very top of the OSI Reference Model stack of layers, we find the
Application layer which is implemented by the network applications. These
applications produce the data to be transferred over the network. This layer also
serves as a window for the application services to access the network and for
displaying the received information to the user.
Example: Application – Browsers, Skype Messenger, etc.
Note: The application Layer is also called Desktop Layer.
Device or Protocol Use : SMTP.
Functions of the Application Layer
The main functions of the application layer :
Network Virtual Terminal(NVT): It allows a user to log on to a remote host.
File Transfer Access and Management(FTAM): This application allows a user to
access files in a remote host, retrieve files in a remote host, and manage or
control files from a remote computer.
Mail Services: Provide email service.
Directory Services: This application provides distributed database sources
and access for global information about various objects and services.
Note: The OSI model acts as a reference model and is not implemented on the Internet because of
its late invention. The current model being used is the TCP/IP model.
Advantages of OSI Model
The OSI Model defines the communication of a computing
system into 7 different layers. Its advantages include:
It divides network communication into 7 layers which makes it
easier to understand and troubleshoot.
It standardizes network communications, as each layer has
fixed functions and protocols.
Diagnosing network problems is easier with the OSI model.
It is easier to improve with advancements as each layer can
get updates separately.
Disadvantages of OSI Model
Complexity: The OSI Model has seven layers, which can be complicated
and hard to understand for beginners.
Not Practical: In real-life networking, most systems use a simpler model
called the Internet protocol suite (TCP/IP), so the OSI Model isn’t always
directly applicable.
Slow Adoption: When it was introduced, the OSI Model was not quickly
adopted by the industry, which preferred the simpler and already-established
TCP/IP model.
Overhead: Each layer in the OSI Model adds its own set of rules and
operations, which can make the process more time-consuming and less
efficient.
Theoretical: The OSI Model is more of a theoretical framework, meaning
it’s great for understanding concepts but not always practical for implementa
Data encapsulation and decapsulation within the OSI model context
Data encapsulation and de-encapsulation are fundamental concepts in computer
networking and communication protocols. These processes are essential for transferring
data across networks efficiently and securely.
Encapsulation is the process of adding additional information when data is traveling in
an OSI or TCP/IP model. The information has been added on the sender’s side, from the
Application layer to the Physical layer.
OSI Model and Working of Encapsulation
No additional information will be added to the user’s data in the Application layer in the TCP/IP model or the
Application, Presentation, or Session layers in the OSI model.
The Session layer sends data to the Transport layer.
In the Transport layer, the data is broken up into different pieces. It adds the header in each of the broken data,
which contains information like source port, destination port, sequence number, etc. Now, everything is combined into a
new form.
The encapsulated data in the Transport layer is called Segments or Datagrams. If the transmission uses TCP, then it
is called Segments, or UDP is called Datagrams.
De-encapsulation is the exact reverse process of encapsulation. The additional information added on
the sender’s side(during encapsulation) gets removed when it travels on the receiver’s side from the
Physical layer to the Application layer.
OSI Model and Working of De-encapsulation
• The Physical layer gets the bits and de-encapsulates them into frames and sends them to the upper
layer.
• The Data Link layer receives the frames and checks MAC address whether it is matching or not. If
everything matched and also no error is found. Then layer 2 header and layer 2 trailer are removed. It
de-encapsulates the data and packet sent to upper layer.
• The Network layer receives the packet from Data Link layer. It checks for IP addresses. If it matched
then, the header in layer 3 is removed. Now the de-encapsulated data packet is delivered to the
Transport layer.
• Now, the Transport layer gets the data segments/ datagrams from the Network layer and removes
the layer 4 header.
• After traveling through Session, Presentation, and Application layer, the de-encapsulated data is sent
to the receiver.
• That is how the de-encapsulation takes place.
Note:
One important piece of information to keep in mind is that data flows 2 ways in the OSI model, DOWN (data encapsulation) and UP (data
decapsulation).
The picture below is an example of a simple data transfer between 2 computers and shows how the data is encapsulated and decapsulated:
Omnya Ashraf.Network (chp1 OSI MODEL.).pptx

More Related Content

PPTX
BAPANKAR15800121011 SOFT.pptx
BapanKar2
 
PDF
OSI &TCP/IP Model
Shamima Akther
 
PPTX
COMPUTER NETWORK_OSI & TCP/IP
Sweta Kumari Barnwal
 
PDF
OSI MODEL
Soumo Dhali
 
PPTX
UNIT 2 - Networking Reference Models & Networking Devices.pptx
sameernsn1
 
PPTX
OSI model.pptx computer networking ,OSI model
snarajpoot6
 
PPT
006 Osi Model
BELKA08
 
PDF
Computer Networks Notes Complete Syllabus
Anujashejwal
 
BAPANKAR15800121011 SOFT.pptx
BapanKar2
 
OSI &TCP/IP Model
Shamima Akther
 
COMPUTER NETWORK_OSI & TCP/IP
Sweta Kumari Barnwal
 
OSI MODEL
Soumo Dhali
 
UNIT 2 - Networking Reference Models & Networking Devices.pptx
sameernsn1
 
OSI model.pptx computer networking ,OSI model
snarajpoot6
 
006 Osi Model
BELKA08
 
Computer Networks Notes Complete Syllabus
Anujashejwal
 

Similar to Omnya Ashraf.Network (chp1 OSI MODEL.).pptx (20)

PDF
Cisco ccna certification knowledge to pass the exam
le_dung762
 
PPTX
Network Model Architecture - Lecture 2.pptx
ShadrilHassanShifat1
 
PPTX
OSI MODEL AND ITS LAYERS FUNCTION
Pooja Dewangan
 
DOCX
OSI Model and TCP/IP Model.
City University, Dhaka, Bangladesh
 
PDF
Wp simoneau osi_model
Jagadish Gurrala
 
DOCX
OsI reference model
LakshmiSamivel
 
PDF
osireferencemodel-170703104058 (1).pdf
Fira253524
 
PPTX
Osi layer model
IshworKhatiwada
 
PPT
Osi reference model
Sagar Gor
 
PPTX
osimodel-2106121ffffffffffffffffffffffffffff70731.pptx
mahendrasubedi2060
 
PPT
CN unit 1 part 2 2023.ppt
mohanravi1986
 
DOCX
Osi model and tcpip model.
kona paul
 
PPTX
OSI MODEL.pptx
AnshuKUMARI534030
 
PPTX
Open Systems Interconnections Model - 7 layers
pawan13061996
 
PPTX
639588.pptx
Sarfaraz337719
 
PPTX
chapter 4.pptx
shucaybcabdi
 
PPTX
Protocol layer,OSI model & POP3
Zakirul Islam
 
DOCX
Osi model
GLIM Digital
 
PPTX
computer network and chapter 7 OSI layers.pptx
gadisaAdamu
 
DOCX
7 Layers OSI model description with 3 unofficial Layers.
Kanishk Raj
 
Cisco ccna certification knowledge to pass the exam
le_dung762
 
Network Model Architecture - Lecture 2.pptx
ShadrilHassanShifat1
 
OSI MODEL AND ITS LAYERS FUNCTION
Pooja Dewangan
 
OSI Model and TCP/IP Model.
City University, Dhaka, Bangladesh
 
Wp simoneau osi_model
Jagadish Gurrala
 
OsI reference model
LakshmiSamivel
 
osireferencemodel-170703104058 (1).pdf
Fira253524
 
Osi layer model
IshworKhatiwada
 
Osi reference model
Sagar Gor
 
osimodel-2106121ffffffffffffffffffffffffffff70731.pptx
mahendrasubedi2060
 
CN unit 1 part 2 2023.ppt
mohanravi1986
 
Osi model and tcpip model.
kona paul
 
OSI MODEL.pptx
AnshuKUMARI534030
 
Open Systems Interconnections Model - 7 layers
pawan13061996
 
639588.pptx
Sarfaraz337719
 
chapter 4.pptx
shucaybcabdi
 
Protocol layer,OSI model & POP3
Zakirul Islam
 
Osi model
GLIM Digital
 
computer network and chapter 7 OSI layers.pptx
gadisaAdamu
 
7 Layers OSI model description with 3 unofficial Layers.
Kanishk Raj
 
Ad

More from FutureTechnologies3 (20)

PPTX
SVN Version ControlSVN Version ControlSVN Version Control.pptx
FutureTechnologies3
 
PPTX
Monaco Editor 1Monaco EditorMonaco Editor 1 1.pptx
FutureTechnologies3
 
PPTX
iOS appiOS appiOS appiOS appiOS app.pptx
FutureTechnologies3
 
PPTX
PresentationPresentationPresentationPresentation.pptx
FutureTechnologies3
 
PPTX
StuxnetStuxnetStuxnetStuxnetStuxnet.pptx
FutureTechnologies3
 
PPTX
EDR XDREDR XDREDR XDREDR XDREDR XDR.pptx
FutureTechnologies3
 
PPTX
How to Add Audio Fil es to Android App in Android Studio.pptx
FutureTechnologies3
 
PPTX
Monaco_Editor_PresentationMonaco_Editor_Presentation.pptx
FutureTechnologies3
 
PPTX
SVN_Version_Control_Presentation (2).pptx
FutureTechnologies3
 
PPTX
Visual_Studio_Code_Presentation (1).pptx
FutureTechnologies3
 
PPTX
DOC-20250512-WA0030 (11111).stuxnet.pptx
FutureTechnologies3
 
PPTX
attacksattacksattacksattacksattacks.pptx
FutureTechnologies3
 
PPTX
13-hamedHanymohamedHany-date-2025 5 10.pptx
FutureTechnologies3
 
PPTX
13-mohamedHanymohamedHany-date-2025 5 9.pptx
FutureTechnologies3
 
PPTX
13-MohamedHany-11111-date-2025 5 12.pptx
FutureTechnologies3
 
PPTX
13-MohamedHany -6666-date-2025 5 12.pptx
FutureTechnologies3
 
PPTX
13-MohamedHany -2-dateeee-2025 5 12.pptx
FutureTechnologies3
 
PPTX
13-MohamedHany - 5-dateee-2025 5 12.pptx
FutureTechnologies3
 
PPTX
13-5-2025 a13-5-2025 a13-5-2025 a13-5-2025 a.pptx
FutureTechnologies3
 
PPTX
10-5-202510-5-202510-5-202510-5-2025.pptx
FutureTechnologies3
 
SVN Version ControlSVN Version ControlSVN Version Control.pptx
FutureTechnologies3
 
Monaco Editor 1Monaco EditorMonaco Editor 1 1.pptx
FutureTechnologies3
 
iOS appiOS appiOS appiOS appiOS app.pptx
FutureTechnologies3
 
PresentationPresentationPresentationPresentation.pptx
FutureTechnologies3
 
StuxnetStuxnetStuxnetStuxnetStuxnet.pptx
FutureTechnologies3
 
EDR XDREDR XDREDR XDREDR XDREDR XDR.pptx
FutureTechnologies3
 
How to Add Audio Fil es to Android App in Android Studio.pptx
FutureTechnologies3
 
Monaco_Editor_PresentationMonaco_Editor_Presentation.pptx
FutureTechnologies3
 
SVN_Version_Control_Presentation (2).pptx
FutureTechnologies3
 
Visual_Studio_Code_Presentation (1).pptx
FutureTechnologies3
 
DOC-20250512-WA0030 (11111).stuxnet.pptx
FutureTechnologies3
 
attacksattacksattacksattacksattacks.pptx
FutureTechnologies3
 
13-hamedHanymohamedHany-date-2025 5 10.pptx
FutureTechnologies3
 
13-mohamedHanymohamedHany-date-2025 5 9.pptx
FutureTechnologies3
 
13-MohamedHany-11111-date-2025 5 12.pptx
FutureTechnologies3
 
13-MohamedHany -6666-date-2025 5 12.pptx
FutureTechnologies3
 
13-MohamedHany -2-dateeee-2025 5 12.pptx
FutureTechnologies3
 
13-MohamedHany - 5-dateee-2025 5 12.pptx
FutureTechnologies3
 
13-5-2025 a13-5-2025 a13-5-2025 a13-5-2025 a.pptx
FutureTechnologies3
 
10-5-202510-5-202510-5-202510-5-2025.pptx
FutureTechnologies3
 
Ad

Recently uploaded (20)

DOCX
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
PPTX
How to Manage Global Discount in Odoo 18 POS
Celine George
 
DOCX
UPPER GASTRO INTESTINAL DISORDER.docx
BANDITA PATRA
 
PDF
PG-BPSDMP 2 TAHUN 2025PG-BPSDMP 2 TAHUN 2025.pdf
AshifaRamadhani
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PDF
High Ground Student Revision Booklet Preview
jpinnuck
 
PPTX
Odoo 18 Sales_ Managing Quotation Validity
Celine George
 
PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PPTX
Introduction and Scope of Bichemistry.pptx
shantiyogi
 
PDF
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
Miraj Khan
 
PDF
Types of Literary Text: Poetry and Prose
kaelandreabibit
 
PPTX
Nursing Management of Patients with Disorders of Ear, Nose, and Throat (ENT) ...
RAKESH SAJJAN
 
PDF
Sunset Boulevard Student Revision Booklet
jpinnuck
 
PPT
Python Programming Unit II Control Statements.ppt
CUO VEERANAN VEERANAN
 
PDF
Arihant Class 10 All in One Maths full pdf
sajal kumar
 
PPTX
PPTs-The Rise of Empiresghhhhhhhh (1).pptx
academysrusti114
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PDF
Landforms and landscapes data surprise preview
jpinnuck
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
How to Manage Global Discount in Odoo 18 POS
Celine George
 
UPPER GASTRO INTESTINAL DISORDER.docx
BANDITA PATRA
 
PG-BPSDMP 2 TAHUN 2025PG-BPSDMP 2 TAHUN 2025.pdf
AshifaRamadhani
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
High Ground Student Revision Booklet Preview
jpinnuck
 
Odoo 18 Sales_ Managing Quotation Validity
Celine George
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
Introduction and Scope of Bichemistry.pptx
shantiyogi
 
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
Miraj Khan
 
Types of Literary Text: Poetry and Prose
kaelandreabibit
 
Nursing Management of Patients with Disorders of Ear, Nose, and Throat (ENT) ...
RAKESH SAJJAN
 
Sunset Boulevard Student Revision Booklet
jpinnuck
 
Python Programming Unit II Control Statements.ppt
CUO VEERANAN VEERANAN
 
Arihant Class 10 All in One Maths full pdf
sajal kumar
 
PPTs-The Rise of Empiresghhhhhhhh (1).pptx
academysrusti114
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
Landforms and landscapes data surprise preview
jpinnuck
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 

Omnya Ashraf.Network (chp1 OSI MODEL.).pptx

  • 1. chp1:OSI MODEL  OSI model  Data encapsulation and decapsulation within the OSI model context OSI MODEL The Open Systems Interconnection (OSI) was created in 1984 by ISO, is a reference framework that explains the process of transmitting data between computers. It is divided into seven layers that work together to carry out specialised network functions as shown in Figure
  • 3. The seven layers of the OSI reference model are described in more detail 1. Physical Layer The physical layer is responsible for the physical cable or wireless connection between network nodes. It defines the connector, the electrical cable or wireless technology connecting the devices, and is responsible for transmission of the raw data, which is simply a series of 0s and 1s, while taking care of bit rate control
  • 4. Functions of the Physical Layer • Bit Synchronization: The physical layer provides the synchronization of the bits by providing a clock. This clock controls both sender and receiver thus providing synchronization at the bit level. • Bit Rate Control: The Physical layer also defines the transmission rate i.e. the number of bits sent per second. • Physical Topologies: Physical layer specifies how the different, devices/nodes are arranged in a network i.e. bus, star, or mesh topology. • Transmission Mode: Physical layer also defines how the data flows between the two connected devices. The various transmission modes possible are Simplex, half-duplex and full-duplex.
  • 5. 2.Data Link Layer – Layer 2 The data link layer is responsible for the node-to-node delivery of the message. The main function of this layer is to make sure data transfer is error-free from one node to another, over the physical layer. When a packet arrives in a network, it is the responsibility of the DLL to transmit it to the Host using its MAC address. The Data Link Layer is divided into two sublayers:  Logical Link Control (LLC)  Media Access Control (MAC) The packet received from the Network layer is further divided into frames depending on the frame size of the NIC(Network Interface Card). DLL also encapsulates Sender and Receiver’s MAC address in the header. The Receiver’s MAC address is obtained by placing an ARP(Address Resolution Protocol) request onto the wire asking “Who has that IP address?” and the destination host will reply with its MAC address.
  • 6. Functions of the Data Link Layer • Framing:Framing is a function of the data link layer. It provides a way for a sender to transmit a set of bits that are meaningful to the receiver. This can be accomplished by attaching special bit patterns to the beginning and end of the frame. • Physical Addressing: After creating frames, the Data link layer adds physical addresses (MAC addresses) of the sender and/or receiver in the header of each frame. • Error Control: The data link layer provides the mechanism of error control in which it detects and retransmits damaged or lost frames. • Flow Control: The data rate must be constant on both sides else the data may get corrupted thus, flow control coordinates the amount of data that can be sent before receiving an acknowledgment. • Access Control: When a single communication channel is shared by multiple devices, the MAC sub-layer of the data link layer helps to determine which device has control over the channel at a given time.
  • 7. 3.Network Layer – Layer 3 The network layer works for the transmission of data from one host to the other located in different networks. It also takes care of packet routing i.e. selection of the shortest path to transmit the packet, from the number of routes available. The sender & receiver’s IP addresses are placed in the header by the network layer.
  • 8. Functions of the Network Layer Routing: The network layer protocols determine which route is suitable from source to destination. This function of the network layer is known as routing. Logical Addressing: To identify each device inter-network uniquely, the network layer defines an addressing scheme. The sender & receiver’s IP addresses are placed in the header by the network layer. Such an address distinguishes each device uniquely and universally. Note: Segment in the Network layer is referred to as Packet. Network layer is implemented by networking devices such as routers and switches.
  • 9. 4.Transport Layer – Layer 4 The transport layer provides services to the application layer and takes services from the network layer. The data in the transport layer is referred to as Segments. It is responsible for the end-to-end delivery of the complete message. The transport layer also provides the acknowledgment of the successful data transmission and re-transmits the data if an error is found.
  • 10. Functions of the Transport Layer . • This layer accepts the message from the (session) layer, and breaks the message into smaller units. Each of the segments produced has a header associated with it. The transport layer at the destination station reassembles the message. • To deliver the message to the correct process, the transport layer header includes a type of address called service point address or port address. Thus by specifying this address, the transport layer makes sure that the message is delivered to the correct process. Services Provided by Transport Layer  Connection-Oriented Service  Connectionless Service
  • 11. 5.Session Layer – Layer 5 This layer is responsible for the establishment of connection, maintenance of sessions, and authentication, and also ensures security.
  • 12. Functions of the Session Layer • Session Establishment, Maintenance, and Termination: The layer allows the two processes to establish, use, and terminate a connection. • Synchronization: This layer allows a process to add checkpoints that are considered synchronization points in the data. These synchronization points help to identify the error so that the data is re- synchronized properly, and ends of the messages are not cut prematurely and data loss is avoided. • Dialog Controller: The session layer allows two systems to start communication with each other in half-duplex or full-duplex.
  • 13. 6.Presentation Layer – Layer 6 The presentation layer is also called the Translation layer. The data from the application layer is extracted here and manipulated as per the required format to transmit over the network.
  • 14. Functions of the Presentation Layer Translation: For example, ASCII to EBCDIC. Encryption/ Decryption: Data encryption translates the data into another form or code. The encrypted data is known as the ciphertext and the decrypted data is known as plain text. A key value is used for encrypting as well as decrypting data. Compression: Reduces the number of bits that need to be transmitted on the network. Note: Device or Protocol Use: JPEG, MPEG, GIF.
  • 15. 7.Application Layer – Layer 7 At the very top of the OSI Reference Model stack of layers, we find the Application layer which is implemented by the network applications. These applications produce the data to be transferred over the network. This layer also serves as a window for the application services to access the network and for displaying the received information to the user. Example: Application – Browsers, Skype Messenger, etc. Note: The application Layer is also called Desktop Layer. Device or Protocol Use : SMTP.
  • 16. Functions of the Application Layer The main functions of the application layer : Network Virtual Terminal(NVT): It allows a user to log on to a remote host. File Transfer Access and Management(FTAM): This application allows a user to access files in a remote host, retrieve files in a remote host, and manage or control files from a remote computer. Mail Services: Provide email service. Directory Services: This application provides distributed database sources and access for global information about various objects and services. Note: The OSI model acts as a reference model and is not implemented on the Internet because of its late invention. The current model being used is the TCP/IP model.
  • 17. Advantages of OSI Model The OSI Model defines the communication of a computing system into 7 different layers. Its advantages include: It divides network communication into 7 layers which makes it easier to understand and troubleshoot. It standardizes network communications, as each layer has fixed functions and protocols. Diagnosing network problems is easier with the OSI model. It is easier to improve with advancements as each layer can get updates separately.
  • 18. Disadvantages of OSI Model Complexity: The OSI Model has seven layers, which can be complicated and hard to understand for beginners. Not Practical: In real-life networking, most systems use a simpler model called the Internet protocol suite (TCP/IP), so the OSI Model isn’t always directly applicable. Slow Adoption: When it was introduced, the OSI Model was not quickly adopted by the industry, which preferred the simpler and already-established TCP/IP model. Overhead: Each layer in the OSI Model adds its own set of rules and operations, which can make the process more time-consuming and less efficient. Theoretical: The OSI Model is more of a theoretical framework, meaning it’s great for understanding concepts but not always practical for implementa
  • 19. Data encapsulation and decapsulation within the OSI model context Data encapsulation and de-encapsulation are fundamental concepts in computer networking and communication protocols. These processes are essential for transferring data across networks efficiently and securely. Encapsulation is the process of adding additional information when data is traveling in an OSI or TCP/IP model. The information has been added on the sender’s side, from the Application layer to the Physical layer. OSI Model and Working of Encapsulation No additional information will be added to the user’s data in the Application layer in the TCP/IP model or the Application, Presentation, or Session layers in the OSI model. The Session layer sends data to the Transport layer. In the Transport layer, the data is broken up into different pieces. It adds the header in each of the broken data, which contains information like source port, destination port, sequence number, etc. Now, everything is combined into a new form. The encapsulated data in the Transport layer is called Segments or Datagrams. If the transmission uses TCP, then it is called Segments, or UDP is called Datagrams.
  • 20. De-encapsulation is the exact reverse process of encapsulation. The additional information added on the sender’s side(during encapsulation) gets removed when it travels on the receiver’s side from the Physical layer to the Application layer. OSI Model and Working of De-encapsulation • The Physical layer gets the bits and de-encapsulates them into frames and sends them to the upper layer. • The Data Link layer receives the frames and checks MAC address whether it is matching or not. If everything matched and also no error is found. Then layer 2 header and layer 2 trailer are removed. It de-encapsulates the data and packet sent to upper layer. • The Network layer receives the packet from Data Link layer. It checks for IP addresses. If it matched then, the header in layer 3 is removed. Now the de-encapsulated data packet is delivered to the Transport layer. • Now, the Transport layer gets the data segments/ datagrams from the Network layer and removes the layer 4 header. • After traveling through Session, Presentation, and Application layer, the de-encapsulated data is sent to the receiver. • That is how the de-encapsulation takes place.
  • 21. Note: One important piece of information to keep in mind is that data flows 2 ways in the OSI model, DOWN (data encapsulation) and UP (data decapsulation). The picture below is an example of a simple data transfer between 2 computers and shows how the data is encapsulated and decapsulated: