Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 38

Network Layers

Presented by Group 10
TABLE OF CONTENTS

01 02
Introduction OSI Network Layers
Network Layer 7 layers of OSI network
what is OSI Model and their function
History of Osi Model
Brief information of 7 layers OSI
Introduction of TCP/IP model

03 04
TCP/IP Model How Network works
Description Uses
Importance Pros & cons
Functions
01
Introduction
OSI model & TCP/IP Model
Network
Layers
Network Layer
Network applications and services on
one end device can communicate with
applications and services running on
another end device.
OSI Model
What Is the OSI Model
●The Open Systems Interconnection (OSI) model
describes seven layers that computer systems
use to communicate over a network. It was the
first standard model for network communications,
adopted by all major computer and
telecommunication companies in the early 1980s
History of the OSI
Reference Model
History of the OSI
Reference Model
OSI Reference Model was an early attempt to get hardware and
software manufacturers to agree on a framework for developing
various networking technologies. It was published in 1984 by both
the ISO, as standard ISO 7498, and the renamed CCITT (now ITU-
T) as standard X.200. The OSI Reference Model was intended to
lay the foundation for the Internet Protocol Suite. The rise in
popularity of the Internet and its TCP/IP protocols met the OSI suite
head on. The OSI model itself found a home as a device for
explaining the operation of networking in general terms.
7 layers OSI
(Introduction)
4 layers of TCP/IP model
(Introduction)
INTRODUCTION :
4 layers of TCP/IP model:
1. Network Access/Interface
2. Internet
3. Transport (or Host-to-Host)
4. Application (or Process)
02
OSI Network
Layers
Network Layers and Functions

Layer 6 (Presentation):
The presentation layer prepares data for the application layer. It defines how two
devices should encode, encrypt, and compress data so it is received correctly on the other
end. The presentation layer takes any data transmitted by the application layer and
prepares it for transmission over the session layer.
● Data encryption/decryption
● Data compression
Network Layers and Functions
Layer 5 ( Session ):

The session layer creates communication channels, called sessions, between


devices. It is responsible for opening sessions, ensuring they remain open and functional
while data is being transferred, and closing them when communication ends. The session
layer can also set checkpoints during a data transfer—if the session is interrupted, devices
can resume data transfer from the last checkpoint. It is responsible for establishing,
maintaining, synchronizing, terminating sessions between end-user applications.

1. Session establishment, maintenance, and termination

2. Synchronization

3. Dialog Controller
Network Layers and Functions

Layer 4 ( Transport ):
The transport layer takes data transferred in the session layer and breaks it into
“segments” on the transmitting end. It is responsible for reassembling the segments on
the receiving end, turning it back into data that can be used by the session layer. The
transport layer carries out flow control, sending data at a rate that matches the
connection speed of the receiving device, and error control, checking if data was received
incorrectly and if not, requesting it again.

The functions of the transport layer are :  


1. Segmentation and Reassembly
2. Service Point Addressing
Network Layers and Functions

Layer 7 (Application):

An application layer is an abstraction layer that specifies the shared communications


protocols and interface methods used by hosts in a communications network.

The application layer is used by end-user software such as web browsers and email
clients. It provides protocols that allow software to send and receive 
information and present meaningful data to users. A few examples of application layer
protocols are the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post
Office Protocol (POP), Simple Mail Transfer Protocol (SMTP), and Domain Name System
(DNS).
Network Layers and Functions

Layer 3 ( Network ):

Network Layer provides the functional and procedural means of transferring


variable length data sequences from a source host on one network to a destination host
on a different network, while maintaining the quality of service requested by the
transport layer (in contrast to the data link layer which connects hosts within the same
network). The network layer performs network routing functions, and might also
perform fragmentation and reassembly, and report delivery errors.
Network Layers and Functions

Layer 2 ( Data Link ):

it provides the functional and procedural means to transfer data between network
entities and to detect and possibly correct errors that may occur in the physical layer.
Originally, this layer was intended for point-to-point and point-to-multipoint media,
characteristic of wide area media in the telephone system. Local area network
architecture, which included broadcast-capable multi-access media, was developed
independently of the ISO work in IEEE Project 802. IEEE work assumed sub-layering and
management functions not required for WAN use.
Network Layers and Functions

Layer 1 ( Physical (PHY) ):

it defines electrical and physical specifications for devices. The physical layer
defines the relationship between a device and a transmission medium, such as a copper
or optical cable. This includes the layout of pins, voltages, cable specifications, hubs,
repeaters, network adapters, host bus adapters (HBA used in storage area networks)
and more. The major functions and services performed by the physical layer are:
03
TCP/IP Model
TCP/IP Model
What is TCP/IP?

  stands for Transmission Control Protocol/Internet Protocol. TCP/IP was


invented by Vinton Cerf and Bob Kahn. This DE FACTO Unix standard is the protocol
of the Internet and the global standard for local and wide area networks, the major
exception being the traditional networks of the telephone companies.
TCP/IP specifies how data is exchanged over the internet by providing end-to-
end communications that identify how it should be broken into packets, addressed,
transmitted, routed and received at the destination. TCP/IP requires little central
management and is designed to make networks reliable with the ability to recover
automatically from the failure of any device on the network.
TCP/IP Model
Why is TCP/IP important?
  TCP/IP is nonproprietary and, as a result, is not controlled by any single
company. Therefore, the IP suite can be modified easily. It is compatible with all
operating systems (OSes), so it can communicate with any other system. The IP
suite is also compatible with all types of computer hardware and networks. TCP/IP
is highly scalable and, as a routable protocol, can determine the most efficient path
through the network. It is widely used in current internet architecture.
TCP/IP Model
Why is TCP/IP important?
  TCP/IP is nonproprietary and, as a result, is not controlled by any single
company. Therefore, the IP suite can be modified easily. It is compatible with all
operating systems (OSes), so it can communicate with any other system. The IP
suite is also compatible with all types of computer hardware and networks. TCP/IP
is highly scalable and, as a routable protocol, can determine the most efficient path
through the network. It is widely used in current internet architecture.
4 Layers of TCP/IP Model
TCP/IP Model
Layer 1 ( Network Interface )

  The network access layer of the TCP/IP model combines layers 1


(physical) and 2 (data link) of the OSI model. It describes layer 1 issues
such as energy, bits, and the medium used to carry them example of
these are (copper, fiber, wireless, etc.). It also describes layer 2 issues like
converting bits into protocol units such as Ethernet frames, MAC
addresses, and network interface cards (NICs).
TCP/IP Model
Layer 2 ( Internet)

  The Internet layer of the TCP/IP model aligns with the layer 3 (network)
layer of the OSI model. This is where IP addresses and routing live. When data is
transmitted from a node on one LAN to a node on a different LAN, the Internet
layer is used. IPv4, IPv6, ICMP, and routing protocols (among others) are Internet
layer TCP/IP protocols.
TCP/IP Model
Layer 3 ( Transport)

  Transport layer is sometimes called either “Host-to-Host” or, more


commonly, “Transport”; It connects the Internet layer to the application-layer. It is
where applications are addressed on a network via ports. TCP and UDP are the two
transport layer protocols of TCP/IP. 
A few of the most important functionalities are:
• Tracking of individual conversation.
• Ordered data transfer and data segmentation. and
• Multiplexing conversation using port numbers.
TCP/IP Model
Layer 4 ( Application )

  The application layer is the highest abstraction layer of the TCP/IP model
that provides the interfaces and protocols needed by the users. It combines the
functionalities of the session layer, the presentation layer and the application layer
of the OSI model.

The functions of the application layer are −


• It facilitates the user to use the services of the network.
• It is used to develop network-based applications.
• It provides user services like user login, naming network devices,
formatting messages, and e-mails, transfer of files etc.
• It is also concerned with error handling and recovery of the message as
a whole.
TCP/IP Model
Uses of TCP/IP:

  TCP/IP can be used to provide remote login over the network for
interactive file transfer to deliver email, to deliver webpages over the network and
to remotely access a server host's file system. Most broadly, it is used to represent
how information changes form as it travels over a network from the concrete
physical layer to the abstract application layer. It details the basic protocols, or
methods of communication, at each layer as information passes through.
TCP/IP Model
Pros and cons of TCP/IP
The advantages of using the TCP/IP model include the following:
• helps establish a connection between different types of computers;
• works independently of the OS;
• supports many routing protocols;
• uses client-server architecture that is highly scalable;
• it can be operated independently;
• supports several routing protocols; and
• it is lightweight and doesn't place unnecessary strain on a network or
computer.
TCP/IP Model
Pros and cons of TCP/IP
The disadvantages of TCP/IP include the following:
• itis complicated to set up and manage;
• transport layer does not guarantee delivery of packets;
• it is not easy to replace protocols in TCP/IP;
• it does not clearly separate the concepts of services, interfaces and protocols,
so it is not suitable for describing new technologies in new networks; and
• it is especially vulnerable to a synchronization attack, which is a type of denial-
of-service attack in which a bad actor uses TCP/IP.
04
How Network
Works
How Network Works
What is the network layer?
a network layer is an internet is made possible via network-to-network
connectivity. The network layer is the element of the Internet
communications process that establishes these connections by
transferring data packets back and front between networks. The network
layer is layer 3 in the seven-layer OSI model. One of the principal
protocols used at this layer is the Internet Protocol IP, which is joined by
numerous other protocols for routing, testing, and encryption.
How does network layer work
What is the network layer?
The primary function of the network layer is to give or provide a connection
between different networks. It also uses addressing to identify each device and
define the connection of a computer. The function of this is to move the data in
order for the other network to recieve the data. It can move the data by packaging
it with the correct address information and by sslecting the easy route in forwarding
the data to the layer 4. Network layer also connects all other network so that when
fodwarding the data it can choose what is the best route for the data to travel. And
this layer also rely on ICMP or the interner control message protocol. Because with
these protocol it can ensude that the data that is sent are sent correctly.
GROUP 10:
El-jay Bohol
James Clark Canlas
Louis Emmanuel Chavez
Micheal Jordan Palo
Justine Tongol
THANK YOU!

You might also like