NETWORK &
SYSTEM
ADMINISTRATION
MCIT 06103
C.M.N
The OSI Model
• OSI (Open Systems Interconnection) model - describes seven layers
that computer systems use to communicate over a network.
• It was first developed by the International Organization for
Standardization, also called the ISO. (Its shortened name, ISO, is
derived from a Greek word meaning equal.) Network engineers,
hardware technicians, programmers, and network administrators still
use the layers of the OSI model to communicate about networking
technologies.
OSI Model
• You need to memorize the seven layers of the OSI model. Here’s a
seven-word mnemonic that can help, or you can write your own:
All People Seem To Need Data Processing
Now let’s take a look at each layer in the OSI model.
The layers are numbered in descending order, starting
with Layer 7, the Application layer, at the top.
Layer 7: Application Layer
• Describes the interface between two
applications, each on separate computers.
• It is the Human-computer interaction layer,
where apps can access network services.
• includes protocols like HTTP, SMTP, POP3,
IMAP4, FTP, and Telnet.
Layer 6: Presentation Layer
• Is responsible for reformatting, compressing,
and/or encrypting data in a way that the
application on the receiving end can read.
• For example, an email message can be
encrypted at the Presentation layer by the
email client or by the operating system.
• It ensures data is in a usable format and it is
where encryption of data occurs
Layer 5: Session Layer
• Describes how data between applications is synced
and recovered if messages don’t arrive intact at the
receiving application.
• For example, the Skype application works with the
operating system to establish and maintain a session
between two end points for as long as a voice
conversation or video conference is in progress.
• How are session interruptions handled in the session
layer.
Layer 4: Transport Layer
• Is responsible for transporting Application layer
payloads from one application to another
• It takes data transferred in the session layer and
breaks it into segments on the transmitting end.
• It reassembles the segments on the receiving
end, turning it back into data that can be used in
the session layer.
• Eg. UDP and TCP
UDP vs TCP
• UDP (User Datagram Protocol) TCP (Transmission Control
• Is a connection-less or best- Protocol)
effort protocol. Why? • Is a connection-oriented
• Does not guarantee delivery by protocol, it makes a connection
first connecting and checking with the end host, checks
whether data is received whether the data is received,
and resends it if it is not.
• It guarantees delivery (It takes
longer)
Layer 3: Network Layer
• Is responsible for moving messages from one
node to another until they reach the destination
host.
• Also known as the Internet Layer
• The principal protocol used by the Network layer is
IP (Internet Protocol).
• Has two main functions:
1. Breaking segments into packets & reassembling
the packets
2. Routing packets by discovering the best path
across a physical network
Layer 2: Data Link Layer
• Is responsible for establishing and terminating a
connection btn two physically-connected nodes on a
network.
• It breaks up packets into frames and sends them from
source to destination.
• The protocols at these layers are programmed into the
firmware of a computer’s NIC and other networking
hardware.
• It is composed of two parts:
1. LLC (Logical Link Control)
2. MAC(Media Access Control)
Layer 1: Physical Layer
• Is responsible for the physical cable or
wireless connection btn network nodes.
• It defines the connector, the electrical cable or
wireless technology connecting the devices
• Also transmits raw data (0s and 1s)
End of Lesson