You are on page 1of 22

Presented

By : Group 3

Malaaz

Nahusha

Nisham

(Maldives)
Introduction

 Layers of OSI Reference Model:


- Physical layer
- Data link layer
- Network layer
- Transport layer
- Session
layer
-
Presentation layer
-
Application layer
Summary
 Established in 1947, the International Standards
Organization (ISO) is a multinational body
dedicated to worldwide agreement on
international standards.

 An ISO standard that covers all aspects of


network communications is the Open Systems
Interconnection (OSI) model. It was first
introduced in the late 1970s.

 ISO is the organization. OSI is the model.

 It gives a complete information about how


exactly two computers on a network
 This
is the bottom most layer of OSI reference
model.

 Itis responsible for transmission and receiption of


data.

 The data which is transmitted in this layer is in


binary bits. That’s 1s and 0s.

 The devices which comes under this layer are land


card, cable, hub, media connectors, repeaters and
so on.
 In this layer bits are converted into
frames.

 Frame refers to grouping of bits

 That’s
source MAC address + Destination
MAC address + data.

 It also has error checking methods in it


like Physical topology, Media access
methodology, Addressing.
 Inthis layer only error detection is
possible.

 Itnever corrects the incomplete data


or errors.

 The devices which comes under this


layer are switches and bridges.
 This layer is responsible for controlling the
traffic network by detecting, correcting
errors and generating a error free
transmission from source to destination.

 Incase of negative acknowledgement the


transport layer retransmits the same data.

 Its also called a heart of OSI model.


 Ensures the whole message arrives intact
and in order, overseeing both error control
and flow control at the source-to-
destination level.

 Service-pointaddressing: specific process


(like email, msn, etc)

A message is divided into segments,


containing a sequence number
 Thisis the layer which is responsible
for maintaining acknowledgement for
end to end transmissions.

 That is this layer maintains a record of


opening and closing of sessions which
is helpful in synchronization of data
and for controlling network traffic.
 This
layer is responsible for
implementing security on the data.

 That is done by making use of the


following methods of security:
- Encryption
- Compression
- Decryption
 Encryption – the process of converting
normal or plain text into cipher text.

 Compression – the data result in faster


transmission from the source to destination.

 Decryption – the process of converting the


encrypted data back to the human
understandable format.
 Thisis the layer in which the user
uses the default available application
to access the resources throughout
the network.

 Example: network printing, email


services, directory services access,
and accessing the shared resources.

You might also like