notes
  • computer-networking
    • extend-wifi-with-router
    • how-the-internet-works
    • idk
    • networking-devices
    • osi-model
    • tcp-ip
    • Types of VPN
  • databases
    • Foreign Keys
    • Redis
    • simple-queries
  • devops
    • ansible
    • Manual deployment
    • docker
    • Workflow file
    • nginx
    • promethues-grafana
    • terraform
  • hardware
    • Power
  • home-server
    • proxmox-basics
    • proxmox-setup
    • storage
  • languages-frameworks
    • programming-paradigms
    • programming-languages
      • Regex Notes
      • c
        • basics
        • pointers-memory
      • cpp
        • basics
        • running-cpp
      • php
        • basics
        • choizez
        • frameworks
          • laravel
      • python
        • venv
        • concepts
          • Using lambda
        • frameworks
          • django
            • django
            • start
      • java
        • advanced
          • functional-programming
          • reactive-programming
        • concepts
          • how-java-works
          • serialization
          • sockets
          • threads
        • extra
          • collection-framework
          • generics-and-wildcards
          • Regular Expressions (Regex)
          • streams
        • frameworks
          • orm
        • fundamentals
          • OOP
          • conditionals
          • data-structures
          • data-types
          • exceptions
          • files
          • Functions (aka method)
          • Loops
          • packages
          • type-casting
      • javascript
        • frameworks
          • morgan
          • Using Sequelize with PostgreSQL in JavaScript
  • operating-system
    • basics
    • linux-directories
    • Basic Unix Terminal Commands
  • others
    • dark-web
    • piracy
  • system-design
    • system-design
  • web-dev
    • full-stack
  • books
    • sicp
      • Recursion thought process
      • 1
        • 1.1
        • 1.2
        • 1.3
      • 2
        • 2.1
  • certifications
    • aws-certified-cloud-practitioner
      • core-services
      • other-services
    • comptia-a+
      • Cloud
      • hardware
      • Important terms
      • Important terms
      • Troubleshooting
  • cloud
    • aws
      • aws-cli
      • aws-ec2-deployment
  • dsa
    • algorithms
      • back-tracking
      • bfs
      • Binary Search
      • bit-manipulation
      • Bubble sort
      • bucket-sort
      • counting-sort
      • dfs
      • Divide & Conquer
      • djikstras-algorithm
      • dynamic-programming
      • external-sorting
      • greedy-algorithm
      • Heap sort
      • Insertion sort
      • kadanes-algorithm
      • Merge sort
      • Permutation
      • quick-sort
      • Radix Sort
      • recurrence-relation
      • recursion
      • Selection sort
      • sliding-window
      • subset
      • time-space-complexity
      • topological-sort
      • tree-traversals
      • Two Pointers Technique
    • data-structures
      • data-structures
  • security
    • authentication
      • What is JWT (JSON Web Token)?
    • software-architecture-design
      • design-patterns
Powered by GitBook
On this page
  1. computer-networking

osi-model

Introduction:

  • The OSI (Open Systems Interconnection) model is a conceptual framework used to understand and standardize how different networking protocols and technologies communicate in a network.

  • It consists of seven distinct layers, each with its own unique function and purpose.

  • The OSI model was developed by the International Organization for Standardization (ISO) to facilitate interoperability and communication between different network devices and systems.

  • The OSI model describes 7 layers that computer systems use to communicate over a network , Conceptual model , not in use (Theoretical)

Seven Layers of the OSI Model:

Acronym for OSI model:Please do not take sausage pizza away

  1. Physical Layer:

    • This layer deals with the physical medium and transmission of raw bits over a physical link.

    • It specifies the hardware characteristics, such as cables, connectors, and network interface cards.

    • Key components: voltage levels, cable types, and bit rate.

  2. Data Link Layer:

    • Responsible for framing, addressing, and error detection on the physical layer.

    • It organizes data into frames and ensures reliable data transfer between adjacent nodes.

    • Key components: MAC (Media Access Control) addresses, Ethernet, and framing.

  3. Network Layer:

    • Focuses on routing and forwarding data between different networks and subnets.

    • It uses logical addressing (e.g., IP addresses) to determine the best path for data packets.

    • Key components: IP addresses, routers, and routing protocols (e.g., OSPF, BGP).

  4. Transport Layer:

    • Manages end-to-end communication and data segmentation.

    • It provides error detection, flow control, and data reassembly.

    • Key components: TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).

  5. Session Layer:

    • Establishes, maintains, and terminates communication sessions between devices.

    • It controls the dialogue and ensures data synchronization between applications.

    • Key components: Session initiation, termination, and management.

  6. Presentation Layer:

    • Responsible for data translation, encryption, and compression.

    • It ensures that data is presented in a readable format for the application layer.

    • Key components: Data encryption, character encoding, and data compression.

    • Data format : HTML , XML , jpg

    • Encryption : SSL

  7. Application Layer:

    • This is the topmost layer that interacts directly with end-user applications.

    • It provides services and protocols that allow applications to communicate over the network.

    • Key components: HTTP, FTP, SMTP, and application-specific protocols.

Previousnetworking-devicesNexttcp-ip

Last updated 1 month ago