SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
Presented by: Eng. Ahmed Atef Elnaggar
Supervisor: Prof. Shawkat K.Guirguis
Department of Information Technology, Institute of Graduate Studies and Research, University of Alexandria, Egypt.
REFERENCE MODELS
OSI
model
layer
OSI model
name
Layer
Mnemonic
Function Protocols Words to remember
Hardware
Equipment
Equipment
Purpose
PDU
(Protocol
Data Unit)
TCP/IP
Model
Hybrid
Model
7 Application All away
This layer supports application and end-user processes.
Communication partners are identified, quality of service is identified,
user authentication and privacy are considered, and any constraints on
data syntax are identified. Everything at this layer is application-
specific. This layer provides application services for file transfers, e-
mail, and other network software services. Telnet and FTP are
applications that exist entirely in the application level. Tiered
application architectures are part of this layer.
HTTP (80,8080),
HTTPS (443),
TFTP (69),
FTP (20, 21),
IMAP (143),SMTP (25),
POP3 (110),SSH (22),
Telnet (23), DNS (53)
DHCP (67,68)
User interface,
Application,
Browser,
Represent data to user
Computer,
Gateway,
Firewall
Regular computer or
special gateway used to
combine network using
different communication
protocols, filtering traffic
APDU
(Encoded)
Application Application
6 presentation people pizza
This layer provides independence from differences in data
representation (e.g., encryption) by translating from application to
network format, and vice versa. The presentation layer works to
transform data into the form that the application layer can accept. This
layer formats and encrypts data to be sent across a network, providing
freedom from compatibility problems. It is sometimes called the
syntax layer.
MIME,
XDR,
SSL,
ASCII/EBCDIC,
JPEG,
MP3
Data format,
Coding,
Conversion,
Compression,
Language, Decryption
Encoding, Encryption
Computer,
Gateway
redirector
PPDU
Charter
5 Session seem sausage
This layer establishes, manages and terminates connections between
applications. The session layer sets up, coordinates, and terminates
conversations, exchanges, and dialogues between the applications at
each end. It deals with session and connection coordination.
NFS , SQL, RPC,
Named Pipes,
NetBIOS, SAP
User session (Establish,
Restart ,End)
Dialogues,
Data exchange,
Computer,
Gateway SPDU
4 Transport to throw
This layer provides transparent transfer of data between end systems,
or hosts, and is responsible for end-to-end error recovery and flow
control. It ensures complete data transfer.
TCP: transaction
control protocol
20 bytes Protocol 6
UDP: User data gram
8 bytes Protocol 17
TCP, UDP, Process address,
Segment, Encapsulation,
Reassemble, Decapsulation
Computer,
Advanced cable
tester, Brouter
TPDU
Segment
Transport Transport
3 Network need not
This layer provides switching and routing technologies, creating
logical paths, known as virtual circuits, for transmitting data from node
to node. Routing and forwarding are functions of this layer, as well as
addressing, internetworking, error handling, congestion control and
packet sequencing.
IPv4 (32bits), IPSec,
IPX, IPv6, RIP
Apple talk, ICMP,
ARP (48 bits), BGP,
RARP
Route, static or dynamic,
congestion ctrl,
IP, best path,
Logical address,
quality of service
Router,
Brouter, Frame
relay device,
ATM switch
Segment network into
smaller broadcast
domains.
packets Internet Network
2 Data link data do
At this layer, data packets are encoded and decoded into bits. It
furnishes transmission protocol knowledge and management and
handles errors in the physical layer, flow control and frame
synchronization. The data link layer is divided into two sub layers: The
Media Access Control (MAC) layer and the Logical Link Control
(LLC) layer. The MAC sub layer controls how a computer on the
network gains access to the data and permission to transmit it. The
LLC layer controls frame synchronization, flow control and error
checking.
Circuit switching,
Packet switching,
Ethernet, WIFI,
Token Ring, ATM,
FDDI, Frame Relay,
WAN, HDLC,
LLC 802.2,
MAC 802.3,802.5,
PPP, PPTP, L2TP
transmission errors, MAC
medium access control,
Flow control, Error check
Circuit switching,
Packet switching,
Framing, CRC
Physical address
WPA,WEP
Bridge, Switch,
NIC, ISDN
router,
Intelligent hub
Segment network into
smaller collision domains frames
Host to
network
Data link
1 Physical processing please
This layer conveys the bit stream – electrical impulse, light or radio
signal — through the network at the electrical and mechanical level. It
provides the hardware means of sending and receiving data on a
carrier, including defining cables, cards and physical aspects. Fast
Ethernet, RS232, and ATM are protocols with physical layer
components.
Bits,
RS 232,
V .35,
T1, E1, ISDN,
POTS, SONET,
DSL,
EIA/TIA
Bits, volts, 1 or 0, Cabling,
nanoseconds, transmission
directions, pins, Connector
mechanical, electrical, timing
and physical properties.
Repeaters,
Hubs, Multi-
port cabling,
Multiplexer,
TDR hubs
Oscilloscope,
Amplify
One collision and one
broadcast domain.
Bit Physical
Communication subnet boundary
The Open Systems Interconnection(OSI) model (ISO/IEC 7498-1) is a product of the Open Systems Interconnection effort at the International Organization for Standardization, It was provided by the work of Charles Bachman, Honeywell Info. Services by 1977.
TCP/IP request for Comments (RFC) 791 and 793 which was initially designed to meet the data communication needs of the U.S. Department of Defense (DOD), It was provided by the Advanced Research Projects Agency (ARPA, now called DARPA) of the U.S by 1969.
We will use the hybrid reference model as the framework.

Weitere ähnliche Inhalte

Was ist angesagt?

Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocolnitss007
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCPVishal Tandel
 
T mac protocol
T mac protocolT mac protocol
T mac protocolR Islam
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
wn_Chapter_6_MAC.pdf
wn_Chapter_6_MAC.pdfwn_Chapter_6_MAC.pdf
wn_Chapter_6_MAC.pdfyacegod
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocolNayan Sarma
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 
Chapter1.ppt
Chapter1.pptChapter1.ppt
Chapter1.pptsyam babu
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issuesقصي نسور
 

Was ist angesagt? (20)

Circuit Switching
Circuit SwitchingCircuit Switching
Circuit Switching
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
T mac protocol
T mac protocolT mac protocol
T mac protocol
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
wn_Chapter_6_MAC.pdf
wn_Chapter_6_MAC.pdfwn_Chapter_6_MAC.pdf
wn_Chapter_6_MAC.pdf
 
Delay , Loss & Throughput
Delay , Loss & ThroughputDelay , Loss & Throughput
Delay , Loss & Throughput
 
Replication in Distributed Systems
Replication in Distributed SystemsReplication in Distributed Systems
Replication in Distributed Systems
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Mobile ipv6
Mobile ipv6Mobile ipv6
Mobile ipv6
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
QoS in WSN thesis
QoS in WSN thesisQoS in WSN thesis
QoS in WSN thesis
 
Chapter1.ppt
Chapter1.pptChapter1.ppt
Chapter1.ppt
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 

Andere mochten auch

Andere mochten auch (20)

Osi model explained with wireshark
Osi model explained with wiresharkOsi model explained with wireshark
Osi model explained with wireshark
 
Osi model in networking
Osi model in networkingOsi model in networking
Osi model in networking
 
Topologies
TopologiesTopologies
Topologies
 
Network topology....sajal
Network topology....sajalNetwork topology....sajal
Network topology....sajal
 
Wireshark - presentation
Wireshark - presentationWireshark - presentation
Wireshark - presentation
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Atm
AtmAtm
Atm
 
Intelligent networks
Intelligent networksIntelligent networks
Intelligent networks
 
Semantic web
Semantic webSemantic web
Semantic web
 
Mobile commerce
Mobile commerceMobile commerce
Mobile commerce
 
Congestionin Data Networks
Congestionin Data NetworksCongestionin Data Networks
Congestionin Data Networks
 
جدران الحماية
جدران الحمايةجدران الحماية
جدران الحماية
 
Firewall
FirewallFirewall
Firewall
 
Mobile commerce 2
Mobile commerce 2Mobile commerce 2
Mobile commerce 2
 
NETWORK TOPOLOGIES
NETWORK TOPOLOGIESNETWORK TOPOLOGIES
NETWORK TOPOLOGIES
 
Forouzan isdn
Forouzan isdnForouzan isdn
Forouzan isdn
 
4G
4G4G
4G
 
Object-oriented analysis and design
Object-oriented analysis and designObject-oriented analysis and design
Object-oriented analysis and design
 
Intelligent Networks
Intelligent NetworksIntelligent Networks
Intelligent Networks
 

Ähnlich wie OSI layers

Chapter 5 introduction to computer communication networks
Chapter 5   introduction to computer communication networksChapter 5   introduction to computer communication networks
Chapter 5 introduction to computer communication networksN. A. Sutisna
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)Sri Prasanna
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area NetworksDilum Bandara
 
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network ModelsSYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network ModelsArti Parab Academics
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsUMA MAHESWARI
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerDeepak John
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1ahmady
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPMukesh Chinta
 
OSI (open systems interconnection) Model
OSI (open systems interconnection) ModelOSI (open systems interconnection) Model
OSI (open systems interconnection) ModelNetwax Lab
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfArumugam90
 
Jaimin chp-1 - introduction - 2011 batch
Jaimin   chp-1  - introduction - 2011 batchJaimin   chp-1  - introduction - 2011 batch
Jaimin chp-1 - introduction - 2011 batchJaimin Jani
 

Ähnlich wie OSI layers (20)

nv.ppt
nv.pptnv.ppt
nv.ppt
 
Chapter 5 introduction to computer communication networks
Chapter 5   introduction to computer communication networksChapter 5   introduction to computer communication networks
Chapter 5 introduction to computer communication networks
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area Networks
 
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network ModelsSYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
OSI (open systems interconnection) Model
OSI (open systems interconnection) ModelOSI (open systems interconnection) Model
OSI (open systems interconnection) Model
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdf
 
Jaimin chp-1 - introduction - 2011 batch
Jaimin   chp-1  - introduction - 2011 batchJaimin   chp-1  - introduction - 2011 batch
Jaimin chp-1 - introduction - 2011 batch
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day 1
Ccna day 1Ccna day 1
Ccna day 1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 

Kürzlich hochgeladen

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Kürzlich hochgeladen (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

OSI layers

  • 1. Presented by: Eng. Ahmed Atef Elnaggar Supervisor: Prof. Shawkat K.Guirguis Department of Information Technology, Institute of Graduate Studies and Research, University of Alexandria, Egypt. REFERENCE MODELS OSI model layer OSI model name Layer Mnemonic Function Protocols Words to remember Hardware Equipment Equipment Purpose PDU (Protocol Data Unit) TCP/IP Model Hybrid Model 7 Application All away This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application- specific. This layer provides application services for file transfers, e- mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer. HTTP (80,8080), HTTPS (443), TFTP (69), FTP (20, 21), IMAP (143),SMTP (25), POP3 (110),SSH (22), Telnet (23), DNS (53) DHCP (67,68) User interface, Application, Browser, Represent data to user Computer, Gateway, Firewall Regular computer or special gateway used to combine network using different communication protocols, filtering traffic APDU (Encoded) Application Application 6 presentation people pizza This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer. MIME, XDR, SSL, ASCII/EBCDIC, JPEG, MP3 Data format, Coding, Conversion, Compression, Language, Decryption Encoding, Encryption Computer, Gateway redirector PPDU Charter 5 Session seem sausage This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination. NFS , SQL, RPC, Named Pipes, NetBIOS, SAP User session (Establish, Restart ,End) Dialogues, Data exchange, Computer, Gateway SPDU 4 Transport to throw This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer. TCP: transaction control protocol 20 bytes Protocol 6 UDP: User data gram 8 bytes Protocol 17 TCP, UDP, Process address, Segment, Encapsulation, Reassemble, Decapsulation Computer, Advanced cable tester, Brouter TPDU Segment Transport Transport 3 Network need not This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing. IPv4 (32bits), IPSec, IPX, IPv6, RIP Apple talk, ICMP, ARP (48 bits), BGP, RARP Route, static or dynamic, congestion ctrl, IP, best path, Logical address, quality of service Router, Brouter, Frame relay device, ATM switch Segment network into smaller broadcast domains. packets Internet Network 2 Data link data do At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking. Circuit switching, Packet switching, Ethernet, WIFI, Token Ring, ATM, FDDI, Frame Relay, WAN, HDLC, LLC 802.2, MAC 802.3,802.5, PPP, PPTP, L2TP transmission errors, MAC medium access control, Flow control, Error check Circuit switching, Packet switching, Framing, CRC Physical address WPA,WEP Bridge, Switch, NIC, ISDN router, Intelligent hub Segment network into smaller collision domains frames Host to network Data link 1 Physical processing please This layer conveys the bit stream – electrical impulse, light or radio signal — through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components. Bits, RS 232, V .35, T1, E1, ISDN, POTS, SONET, DSL, EIA/TIA Bits, volts, 1 or 0, Cabling, nanoseconds, transmission directions, pins, Connector mechanical, electrical, timing and physical properties. Repeaters, Hubs, Multi- port cabling, Multiplexer, TDR hubs Oscilloscope, Amplify One collision and one broadcast domain. Bit Physical Communication subnet boundary The Open Systems Interconnection(OSI) model (ISO/IEC 7498-1) is a product of the Open Systems Interconnection effort at the International Organization for Standardization, It was provided by the work of Charles Bachman, Honeywell Info. Services by 1977. TCP/IP request for Comments (RFC) 791 and 793 which was initially designed to meet the data communication needs of the U.S. Department of Defense (DOD), It was provided by the Advanced Research Projects Agency (ARPA, now called DARPA) of the U.S by 1969. We will use the hybrid reference model as the framework.