Understanding the OSI ModelUnderstanding the OSI Model
Understanding the OSI ModelUnderstanding the OSI Model
• International Organization for Standardization
(ISO)
– Multi-industry association that attempts to standardize
and define items that increase communication and
compatibility in many different countries
• Open Systems Interconnection (OSI)
– Seven layer reference model created by the ISO
– Defines and separates networking hardware and
software into distinct layers and functions
The OSI (Open Systems Interconnection)
Reference Model is a seven-layer model
to describe how to connect any combination of
devices for purposes of communications.
This model describes the task in terms
of seven functional layers, and specifies the
functions that must be available at each
layer.
The focus in this model is on the “interconnection”
and on the information that
can be passed over this connection.
The OSI model does not concern itself with the
internal operations of the systems involved.
Reasons for LayeringReasons for Layering
• Simplifies the network model
• Enables programmers to specialize in a
particular level or layer of the networking
model
• Provides design modularity
• Encourages interoperability
• Allows for standardized interfaces to be
produced by networking vendors
Reasons for LayeringReasons for Layering
• Protocol
– Defined method for communicating between
systems
• Computers must use a common protocol to
communicate properly
– Examples: TCP/IP and IPX/SPX
Reasons for LayeringReasons for Layering
• As a group,
these layers
form the OSI
protocol
stack
Figure 1-1:
OSI Reference
Model
Peer OSI CommunicationPeer OSI Communication
• Peer communication
– Each layer will only talk to its peer on the opposite side of
the communications process
– Each layer is unaware of the activities of all other layers of
the model
– Allows error checking to occur on two separate layers
simultaneously
• Each layer does provide services to the layer above it
and receives services from the layer below it
– Layers do not acknowledge these services in any way
Seven Layers of the OSI ModelSeven Layers of the OSI Model
• Physical layer
• Data Link layer
• Network layer
• Transport layer
• Sessions layer
• Presentation layer
• Application layer
Osi model
Osi model
Peer OSI CommunicationPeer OSI Communication
• The seven layers
of the OSI
reference model
communicate
with each other
via peer
communication
Figure 1-2:
Peer
communication
Layer Functions:Layer Functions:
Physical (Layer 1)Physical (Layer 1)
• Layer 1 in the OSI model
• Has the following responsibilities:
– Definition of the physical characteristics of the
network hardware
– Representation of binary digits as voltages
(encoding)
– Transmission of signals on the wire
Layer Functions:Layer Functions:
Physical (Layer 1)Physical (Layer 1)
Figure 1-3:
568B twisted pair
wiring scheme
Layer Functions:Layer Functions:
Physical (Layer 1)Physical (Layer 1)
• Connectors, cables, and devices like repeaters and
hubs can be associated with the physical layer
• When choosing cable, consider the following:
– Expense
– Physical location
– Distance
– Security requirements
– Transmission speed required
Layer Functions:Layer Functions:
Data Link (Layer 2)Data Link (Layer 2)
• Has several responsibilities:
– NIC software functions, including identification of
source and destination nodes via physical addresses
(Media Access Control (MAC) Address )
– Definition of how data is packaged for transport in
smaller units known as frames
– Error detection / notification
– Flow control of information sent across the link
Layer Functions:Layer Functions:
Data Link (Layer 2)Data Link (Layer 2)
• Data Link layer has two sublayers that further
articulate its function:
– Logical Link Control (LLC) layer
– Media Access Control (MAC) layer
• The Institute of Electrical and Electronics
Engineers (IEEE) created these sublayers to
identify and isolate the separate responsibilities
required at this level of the protocol stack
Layer Functions:Layer Functions:
Data Link (Layer 2)Data Link (Layer 2)
Figure 1-4:
Data Link layer
subdivision
Layer Functions:Layer Functions:
Data Link (Layer 2)Data Link (Layer 2)
• MAC layer defines the media access method and
provides a unique identifier for the network card
• The unique identifier is a 48-bit address
represented as 12-digit hexadecimal number
given to each network card during production
• Every network interface card must have a unique
physical address (also called the MAC address)
Layer Functions:Layer Functions:
Data Link (Layer 2)Data Link (Layer 2)
Figure 1-5:
MAC address
Layer Functions:Layer Functions:
Data Link (Layer 2)Data Link (Layer 2)
• Ethernet
– A standard networking architecture that defines the
physical layout, lengths, and types of media that can
be used
• Carrier Sense Multiple Access with Collision
Detection (CSMA/CD)
– Network access method used by Ethernet networks
Layer Functions:Layer Functions:
Network (Layer 3)Network (Layer 3)
• Has the following function:
– Error handling
– Software addressing for data packets
– Data routing and connectivity
– Best path selection
• The Network layer contains the logical address for the
computer
– Software/logical addressing for data packets, such as IP, IPX, and
AppleTalk
• Protocols at the Network layer allow computers to route
packets to remote networks using a logical address
Osi model
Osi model
Layer Functions:Layer Functions:
Transport (Layer 4)Transport (Layer 4)
• Provides point-to-point data transportation
• Responsibilities include:
– End-to-end error-free transmission and delivery between
the ultimate sender and ultimate receiver
– Flow control
– Data segmentation into maximum transmission unit
(MTU) size
– Messaging service for the Session layer
– Protocols that reside at the Transport layer can be
connection-oriented or connectionless
Layer Functions:Layer Functions:
Transport (Layer 4)Transport (Layer 4)
• Protocols that reside at the Transport layer can
be:
– Connection-oriented
– Connectionless
• Data sent by a connectionless transport is also
called a datagram
Layer Functions:Layer Functions:
Session (Layer 5)Session (Layer 5)
• Enables two applications on the network to
have an ongoing conversation or dialog
• Examples of Session layer protocols include:
– SQL
– NetBIOS
– RPC
– X-Windows
Layer Functions:Layer Functions:
Session (Layer 5)Session (Layer 5)
• Provides the following services:
– Control for data exchange (full or half duplex)
– Data synchronization definition
– Failure recovery
– Communication setup and teardown
– Clocking or timing
– Initial link setup and link termination when
communications complete
• The Session layer allows the transfer of a large set of
data across the network
Layer Functions:Layer Functions:
Presentation (Layer 6)Presentation (Layer 6)
• Prepares the data from Application layer for
transmission over the network
• Components include extensions and coding
schemes such as:
– BMP
– WAV
– EBCDIC
– ASCII
Layer Functions:Layer Functions:
Presentation (Layer 6)Presentation (Layer 6)
• This layer also provides encryption services when
data encryption is used in network communications
• Has these responsibilities:
– Data translation
– Data formatting
– Data syntax restructuring
– Data encryption
– Data compression
Layer Functions:Layer Functions:
Application (Layer 7)Application (Layer 7)
• Has the following responsibilities:
– Initiating the request for network service
– Providing network services to applications such as
e-mail and Web browsers
• This layer is concerned with user interaction
with the computer and the network
– Contains many protocols and utilities, such as
telnet, FTP, HTTP, DNS, SMTP, and SNMP
Layer Functions:Layer Functions:
Application (Layer 7)Application (Layer 7)
Programs and protocols that provide application-layer services include the
following:
• NICE (Network Information and Control Exchange), which provides
network monitoring and management capabilities
• FTAM (File Transfer, Access, and Management), which provides capabilities
for remote file handling
• FTP (File Transfer Protocol), which provides file transfer capabilities
• X.400, which specifies protocols and functions for message handling and
e-mail services
• CMIP, which provides network management capabilities based on a
framework formulated by the ISO
• SNMP, which provides network management within a non-OSI framework.
This protocol does not conform to the OSI model, but does provide
functionality that is specified within the OSI model
• Telnet, which provides terminal emulation and remote login capabilities.
Telnet’s capabilities go beyond the application layer
• rlogin, which provides remote login capabilities for UNIX environments
Data EncapsulationData Encapsulation
• Data is sent from one computer to another in a
data packet
• The packet contains data from the sending
application and additional information added by
the protocol stack
• Prior to transmission across the network, the data
is organized into a data frame at layer 2
Data EncapsulationData Encapsulation
• Protocol data unit (PDU)
– Information added to a data packet by the layers
of the protocol stack
• Encapsulation
– Process that occurs during transmission through
the protocol stack in which data from the higher
layers is wrapped in a protocol header and/or
trailer
Data EncapsulationData Encapsulation
Figure 1-6: Encapsulation
Osi model
Osi model
Data EncapsulationData Encapsulation
Table 1-1:
Five steps of
data
encapsulation
OSI reference modelOSI reference model
Open System Interconnection referenceOpen System Interconnection reference
model. Network architectural modelmodel. Network architectural model
developeddeveloped
by ISO and ITU-T. The model consists ofby ISO and ITU-T. The model consists of
sevenseven layers, each of which specifieslayers, each of which specifies
particular network functions such asparticular network functions such as
addressing, flow control, error control,addressing, flow control, error control,
encapsulation, and reliable messageencapsulation, and reliable message
transfer.transfer.
TheThe lowest layerlowest layer (the physical layer) is(the physical layer) is
closest to the media technology. The lowerclosest to the media technology. The lower
two layers are implemented in hardwaretwo layers are implemented in hardware
and software, while theand software, while the upper five layersupper five layers areare
implemented only in software.implemented only in software.
OSI reference modelOSI reference model
The highest layer (the application layer) is closest
to the user. The OSI reference model is used
universally as a method for teaching and
understanding network functionality. Similar in
some respects to SNA. See application layer, data-
link layer, network layer, physical layer, PQ,
session layer, and transport layer.
OSI reference model
Chapter SummaryChapter Summary
• Two or more computers connected by media
form a network
• The ISO developed the OSI model in the mid-
1980s to standardize networking models
• Data transmission can be connection-oriented
or connectionless
Chapter SummaryChapter Summary
• The OSI model has seven layers:
– Physical layer
– Data Link layer
– Network layer
– Transport layer
– Session layer
– Presentation layer
– Application layer
Osi model
Chapter SummaryChapter Summary
• The Presentation layer, the sixth layer, handles data
translation, encryption, and formatting for
transmission on the network or for interpretation by
the Application layer
• The Application layer, the seventh and highest layer,
handles the interface between the network and the
user
• When the network user sends data to the network, it
goes through a five-step data encapsulation process
Chapter SummaryChapter Summary
• When the network user sends data to the
network, it goes through a five-step data
encapsulation process
• This process takes place as the data packet
travels down the OSI stack

More Related Content

PPTX
Routing ppt
PPTX
Osi model
PPT
Overview of TCP IP
PPTX
Protocols and the TCP/IP Protocol Suite
PPTX
Wireless transmission
PPTX
Slides for protocol layering and network applications
PPTX
Tcp IP Model
Routing ppt
Osi model
Overview of TCP IP
Protocols and the TCP/IP Protocol Suite
Wireless transmission
Slides for protocol layering and network applications
Tcp IP Model

What's hot (20)

PPTX
IPV6 ADDRESS
PPT
TCP/IP Protocols With All Layer Description
PPT
PPTX
Session Layer
PPTX
Internet Protocols
PPT
Routing
PPTX
Computer Networking fundamentals
PPTX
Networking Standards And Protocols
PPT
IPV4 Frame Format
DOCX
OsI reference model
PPTX
Osi model vs TCP/IP
PPTX
Networking Models
PPT
Network layer tanenbaum
PPTX
User datagram protocol (udp)
PPTX
Routers.ppt
PPTX
Link state routing protocol
PPT
Lecture3 Physical Layer
PPT
data-link layer protocols
PPTX
IPv4 Addressing
IPV6 ADDRESS
TCP/IP Protocols With All Layer Description
Session Layer
Internet Protocols
Routing
Computer Networking fundamentals
Networking Standards And Protocols
IPV4 Frame Format
OsI reference model
Osi model vs TCP/IP
Networking Models
Network layer tanenbaum
User datagram protocol (udp)
Routers.ppt
Link state routing protocol
Lecture3 Physical Layer
data-link layer protocols
IPv4 Addressing
Ad

Viewers also liked (11)

PPT
OSI MODEL - A PROJECT
PPT
OSI Model
DOCX
7 Layers OSI model description with 3 unofficial Layers.
PPTX
CCCNA R&S-02-The TCP-IP and OSI Networking Models
PPTX
Physical Layer
PPT
OSI MODEL
PPTX
Physical Layer of ISO-OSI model and Devices
PPTX
Different style of referencing
PPTX
Osi model
PPTX
Osi model
DOC
Nestle final project
OSI MODEL - A PROJECT
OSI Model
7 Layers OSI model description with 3 unofficial Layers.
CCCNA R&S-02-The TCP-IP and OSI Networking Models
Physical Layer
OSI MODEL
Physical Layer of ISO-OSI model and Devices
Different style of referencing
Osi model
Osi model
Nestle final project
Ad

Similar to Osi model (20)

PPTX
Omnya Ashraf.Network (chp1 OSI MODEL.).pptx
PDF
OSI Model.pdf
PDF
Wp simoneau osi_model
PPTX
639588.pptx
PDF
Ccna notes
PPT
OSI model (7 LAYER )
PDF
Topic 2.1 network communication using osi model
PPTX
OSI TCP.pptx
PPTX
OSI reference Model
PDF
ch5-osi.pdf
PPT
Lalit bhati ppt osi
PDF
Ccna notes
PPT
PPT
Unit 1 introduction
PPT
layering.ppt
PPTX
OSI model.pptx computer networking ,OSI model
PPT
Dc lec-06 & 07 (osi model)
PPT
CN unit 1 part 2 2023.ppt
PPTX
OSI Reerence Model
Omnya Ashraf.Network (chp1 OSI MODEL.).pptx
OSI Model.pdf
Wp simoneau osi_model
639588.pptx
Ccna notes
OSI model (7 LAYER )
Topic 2.1 network communication using osi model
OSI TCP.pptx
OSI reference Model
ch5-osi.pdf
Lalit bhati ppt osi
Ccna notes
Unit 1 introduction
layering.ppt
OSI model.pptx computer networking ,OSI model
Dc lec-06 & 07 (osi model)
CN unit 1 part 2 2023.ppt
OSI Reerence Model

More from Dhani Ahmad (20)

PPT
Strategic planning
PPT
Strategic information system planning
PPT
Opportunities, threats, industry competition, and competitor analysis
PPT
Information system
PPT
Information resource management
PPT
Types of islamic institutions and records
PPT
Islamic information seeking behavior
PPT
Islamic information management
PPT
Islamic information management sources in islam
PPT
The need for security
PPT
The information security audit
PPT
Security technologies
PPT
Security policy
PPT
Security and personnel
PPT
Secure
PPT
Risk management ii
PPT
Risk management i
PPT
Privacy & security in heath care it
PPT
Physical security
PPT
Legal, ethical & professional issues
Strategic planning
Strategic information system planning
Opportunities, threats, industry competition, and competitor analysis
Information system
Information resource management
Types of islamic institutions and records
Islamic information seeking behavior
Islamic information management
Islamic information management sources in islam
The need for security
The information security audit
Security technologies
Security policy
Security and personnel
Secure
Risk management ii
Risk management i
Privacy & security in heath care it
Physical security
Legal, ethical & professional issues

Recently uploaded (20)

PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PPTX
Module 1 Introduction to Web Programming .pptx
PPTX
Internet of Everything -Basic concepts details
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
SaaS reusability assessment using machine learning techniques
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PPTX
Training Program for knowledge in solar cell and solar industry
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Basics of Cloud Computing - Cloud Ecosystem
Module 1 Introduction to Web Programming .pptx
Internet of Everything -Basic concepts details
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
SaaS reusability assessment using machine learning techniques
LMS bot: enhanced learning management systems for improved student learning e...
Connector Corner: Transform Unstructured Documents with Agentic Automation
MuleSoft-Compete-Deck for midddleware integrations
Early detection and classification of bone marrow changes in lumbar vertebrae...
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
EIS-Webinar-Regulated-Industries-2025-08.pdf
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
Co-training pseudo-labeling for text classification with support vector machi...
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
SGT Report The Beast Plan and Cyberphysical Systems of Control
Improvisation in detection of pomegranate leaf disease using transfer learni...
Training Program for knowledge in solar cell and solar industry

Osi model

  • 1. Understanding the OSI ModelUnderstanding the OSI Model
  • 2. Understanding the OSI ModelUnderstanding the OSI Model • International Organization for Standardization (ISO) – Multi-industry association that attempts to standardize and define items that increase communication and compatibility in many different countries • Open Systems Interconnection (OSI) – Seven layer reference model created by the ISO – Defines and separates networking hardware and software into distinct layers and functions
  • 3. The OSI (Open Systems Interconnection) Reference Model is a seven-layer model to describe how to connect any combination of devices for purposes of communications. This model describes the task in terms of seven functional layers, and specifies the functions that must be available at each layer.
  • 4. The focus in this model is on the “interconnection” and on the information that can be passed over this connection. The OSI model does not concern itself with the internal operations of the systems involved.
  • 5. Reasons for LayeringReasons for Layering • Simplifies the network model • Enables programmers to specialize in a particular level or layer of the networking model • Provides design modularity • Encourages interoperability • Allows for standardized interfaces to be produced by networking vendors
  • 6. Reasons for LayeringReasons for Layering • Protocol – Defined method for communicating between systems • Computers must use a common protocol to communicate properly – Examples: TCP/IP and IPX/SPX
  • 7. Reasons for LayeringReasons for Layering • As a group, these layers form the OSI protocol stack Figure 1-1: OSI Reference Model
  • 8. Peer OSI CommunicationPeer OSI Communication • Peer communication – Each layer will only talk to its peer on the opposite side of the communications process – Each layer is unaware of the activities of all other layers of the model – Allows error checking to occur on two separate layers simultaneously • Each layer does provide services to the layer above it and receives services from the layer below it – Layers do not acknowledge these services in any way
  • 9. Seven Layers of the OSI ModelSeven Layers of the OSI Model • Physical layer • Data Link layer • Network layer • Transport layer • Sessions layer • Presentation layer • Application layer
  • 12. Peer OSI CommunicationPeer OSI Communication • The seven layers of the OSI reference model communicate with each other via peer communication Figure 1-2: Peer communication
  • 13. Layer Functions:Layer Functions: Physical (Layer 1)Physical (Layer 1) • Layer 1 in the OSI model • Has the following responsibilities: – Definition of the physical characteristics of the network hardware – Representation of binary digits as voltages (encoding) – Transmission of signals on the wire
  • 14. Layer Functions:Layer Functions: Physical (Layer 1)Physical (Layer 1) Figure 1-3: 568B twisted pair wiring scheme
  • 15. Layer Functions:Layer Functions: Physical (Layer 1)Physical (Layer 1) • Connectors, cables, and devices like repeaters and hubs can be associated with the physical layer • When choosing cable, consider the following: – Expense – Physical location – Distance – Security requirements – Transmission speed required
  • 16. Layer Functions:Layer Functions: Data Link (Layer 2)Data Link (Layer 2) • Has several responsibilities: – NIC software functions, including identification of source and destination nodes via physical addresses (Media Access Control (MAC) Address ) – Definition of how data is packaged for transport in smaller units known as frames – Error detection / notification – Flow control of information sent across the link
  • 17. Layer Functions:Layer Functions: Data Link (Layer 2)Data Link (Layer 2) • Data Link layer has two sublayers that further articulate its function: – Logical Link Control (LLC) layer – Media Access Control (MAC) layer • The Institute of Electrical and Electronics Engineers (IEEE) created these sublayers to identify and isolate the separate responsibilities required at this level of the protocol stack
  • 18. Layer Functions:Layer Functions: Data Link (Layer 2)Data Link (Layer 2) Figure 1-4: Data Link layer subdivision
  • 19. Layer Functions:Layer Functions: Data Link (Layer 2)Data Link (Layer 2) • MAC layer defines the media access method and provides a unique identifier for the network card • The unique identifier is a 48-bit address represented as 12-digit hexadecimal number given to each network card during production • Every network interface card must have a unique physical address (also called the MAC address)
  • 20. Layer Functions:Layer Functions: Data Link (Layer 2)Data Link (Layer 2) Figure 1-5: MAC address
  • 21. Layer Functions:Layer Functions: Data Link (Layer 2)Data Link (Layer 2) • Ethernet – A standard networking architecture that defines the physical layout, lengths, and types of media that can be used • Carrier Sense Multiple Access with Collision Detection (CSMA/CD) – Network access method used by Ethernet networks
  • 22. Layer Functions:Layer Functions: Network (Layer 3)Network (Layer 3) • Has the following function: – Error handling – Software addressing for data packets – Data routing and connectivity – Best path selection • The Network layer contains the logical address for the computer – Software/logical addressing for data packets, such as IP, IPX, and AppleTalk • Protocols at the Network layer allow computers to route packets to remote networks using a logical address
  • 25. Layer Functions:Layer Functions: Transport (Layer 4)Transport (Layer 4) • Provides point-to-point data transportation • Responsibilities include: – End-to-end error-free transmission and delivery between the ultimate sender and ultimate receiver – Flow control – Data segmentation into maximum transmission unit (MTU) size – Messaging service for the Session layer – Protocols that reside at the Transport layer can be connection-oriented or connectionless
  • 26. Layer Functions:Layer Functions: Transport (Layer 4)Transport (Layer 4) • Protocols that reside at the Transport layer can be: – Connection-oriented – Connectionless • Data sent by a connectionless transport is also called a datagram
  • 27. Layer Functions:Layer Functions: Session (Layer 5)Session (Layer 5) • Enables two applications on the network to have an ongoing conversation or dialog • Examples of Session layer protocols include: – SQL – NetBIOS – RPC – X-Windows
  • 28. Layer Functions:Layer Functions: Session (Layer 5)Session (Layer 5) • Provides the following services: – Control for data exchange (full or half duplex) – Data synchronization definition – Failure recovery – Communication setup and teardown – Clocking or timing – Initial link setup and link termination when communications complete • The Session layer allows the transfer of a large set of data across the network
  • 29. Layer Functions:Layer Functions: Presentation (Layer 6)Presentation (Layer 6) • Prepares the data from Application layer for transmission over the network • Components include extensions and coding schemes such as: – BMP – WAV – EBCDIC – ASCII
  • 30. Layer Functions:Layer Functions: Presentation (Layer 6)Presentation (Layer 6) • This layer also provides encryption services when data encryption is used in network communications • Has these responsibilities: – Data translation – Data formatting – Data syntax restructuring – Data encryption – Data compression
  • 31. Layer Functions:Layer Functions: Application (Layer 7)Application (Layer 7) • Has the following responsibilities: – Initiating the request for network service – Providing network services to applications such as e-mail and Web browsers • This layer is concerned with user interaction with the computer and the network – Contains many protocols and utilities, such as telnet, FTP, HTTP, DNS, SMTP, and SNMP
  • 32. Layer Functions:Layer Functions: Application (Layer 7)Application (Layer 7) Programs and protocols that provide application-layer services include the following: • NICE (Network Information and Control Exchange), which provides network monitoring and management capabilities • FTAM (File Transfer, Access, and Management), which provides capabilities for remote file handling • FTP (File Transfer Protocol), which provides file transfer capabilities • X.400, which specifies protocols and functions for message handling and e-mail services • CMIP, which provides network management capabilities based on a framework formulated by the ISO • SNMP, which provides network management within a non-OSI framework. This protocol does not conform to the OSI model, but does provide functionality that is specified within the OSI model • Telnet, which provides terminal emulation and remote login capabilities. Telnet’s capabilities go beyond the application layer • rlogin, which provides remote login capabilities for UNIX environments
  • 33. Data EncapsulationData Encapsulation • Data is sent from one computer to another in a data packet • The packet contains data from the sending application and additional information added by the protocol stack • Prior to transmission across the network, the data is organized into a data frame at layer 2
  • 34. Data EncapsulationData Encapsulation • Protocol data unit (PDU) – Information added to a data packet by the layers of the protocol stack • Encapsulation – Process that occurs during transmission through the protocol stack in which data from the higher layers is wrapped in a protocol header and/or trailer
  • 38. Data EncapsulationData Encapsulation Table 1-1: Five steps of data encapsulation
  • 39. OSI reference modelOSI reference model Open System Interconnection referenceOpen System Interconnection reference model. Network architectural modelmodel. Network architectural model developeddeveloped by ISO and ITU-T. The model consists ofby ISO and ITU-T. The model consists of sevenseven layers, each of which specifieslayers, each of which specifies particular network functions such asparticular network functions such as addressing, flow control, error control,addressing, flow control, error control, encapsulation, and reliable messageencapsulation, and reliable message transfer.transfer.
  • 40. TheThe lowest layerlowest layer (the physical layer) is(the physical layer) is closest to the media technology. The lowerclosest to the media technology. The lower two layers are implemented in hardwaretwo layers are implemented in hardware and software, while theand software, while the upper five layersupper five layers areare implemented only in software.implemented only in software. OSI reference modelOSI reference model
  • 41. The highest layer (the application layer) is closest to the user. The OSI reference model is used universally as a method for teaching and understanding network functionality. Similar in some respects to SNA. See application layer, data- link layer, network layer, physical layer, PQ, session layer, and transport layer. OSI reference model
  • 42. Chapter SummaryChapter Summary • Two or more computers connected by media form a network • The ISO developed the OSI model in the mid- 1980s to standardize networking models • Data transmission can be connection-oriented or connectionless
  • 43. Chapter SummaryChapter Summary • The OSI model has seven layers: – Physical layer – Data Link layer – Network layer – Transport layer – Session layer – Presentation layer – Application layer
  • 45. Chapter SummaryChapter Summary • The Presentation layer, the sixth layer, handles data translation, encryption, and formatting for transmission on the network or for interpretation by the Application layer • The Application layer, the seventh and highest layer, handles the interface between the network and the user • When the network user sends data to the network, it goes through a five-step data encapsulation process
  • 46. Chapter SummaryChapter Summary • When the network user sends data to the network, it goes through a five-step data encapsulation process • This process takes place as the data packet travels down the OSI stack