Understanding the OSI Model - CompTIA Network+ N10-009 - 1.1

Professor Messer
18 Jun 202413:51

Summary

TLDRThe video introduces the OSI (Open Systems Interconnection) model, a conceptual framework for understanding how data travels across networks. It outlines the seven OSI layers, from the physical layer (Layer 1) to the application layer (Layer 7), explaining their roles in network communication. Each layer has specific functions, such as data transmission, routing, and application interaction. The video also emphasizes the importance of the OSI model for IT professionals to communicate effectively and troubleshoot network issues by referencing specific layers.

Takeaways

  • 📚 The OSI (Open Systems Interconnection) model is a conceptual framework used to describe how data moves through a network, not a protocol suite itself.
  • 🌐 The OSI model has seven layers: Application (7), Presentation (6), Session (5), Transport (4), Network (3), Data Link (2), and Physical (1).
  • 🔄 The OSI model helps IT professionals communicate effectively, as it provides a common language for understanding data transmission across networks.
  • 🔌 OSI Layer 1 (Physical) deals with the physical transmission of signals, such as cables, fibers, or wireless connections.
  • 🖧 OSI Layer 2 (Data Link) is often referred to as the MAC address layer and is responsible for communication between devices on a network, like switches.
  • 📡 OSI Layer 3 (Network) handles routing and forwarding traffic using IP addresses. It's where routers operate and data fragmentation occurs.
  • 📦 OSI Layer 4 (Transport) deals with transporting data between devices, using protocols like TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).
  • 🔗 OSI Layer 5 (Session) manages communication sessions between devices, including starting, stopping, or tunneling sessions.
  • 🔐 OSI Layer 6 (Presentation) handles data formatting, encryption, and decryption, ensuring information is readable and secure.
  • 💻 OSI Layer 7 (Application) is the top layer where users interact with applications, such as HTTP, DNS, and other network-based services.

Q & A

  • What is the OSI model and what is its purpose?

    -The OSI model, or Open Systems Interconnection Reference model, is a conceptual framework used to describe the process data takes as it traverses networks. It provides a broad overview of how data moves through systems but is not a protocol suite itself.

  • How does the OSI model relate to the TCP/IP protocol suite?

    -The OSI model can be applied to many different protocols, including TCP/IP. While most protocols used today are based on TCP/IP, the OSI model is useful for describing how various protocols operate within a network.

  • What is the significance of understanding the OSI model in IT communications?

    -Understanding the OSI model allows IT professionals to communicate clearly about network operations. Terms like 'OSI Layer 7' or 'OSI Layer 4' are universally understood in the industry, regardless of the specific organization.

  • What is the role of Layer 1 in the OSI model?

    -Layer 1, or the physical layer, deals with the physical transmission of signals over network cables, fibers, or wireless connections. Issues at this layer often involve problems with cables, fibers, or wireless interference.

  • What is the function of Layer 2, the data link layer?

    -Layer 2, the data link layer, facilitates communication between two devices on a network. It is associated with MAC addresses, which are physical addresses on network adapters. This layer is often referred to as the 'switching layer' due to the role switches play in forwarding traffic based on MAC addresses.

  • How does Layer 3, the network layer, function?

    -Layer 3, the network layer, is responsible for routing and IP addressing. Routers use this layer to forward traffic based on destination IP addresses, and this is also where fragmentation of data packets occurs to fit different network frames.

  • What are the key responsibilities of Layer 4, the transport layer?

    -Layer 4, the transport layer, is responsible for ensuring the reliable transmission of data across the network. Common protocols at this layer include TCP (Transmission Control Protocol) and UDP (User Datagram Protocol), which manage the segmentation and reassembly of data.

  • What happens at Layer 5, the session layer?

    -Layer 5, the session layer, manages communication sessions between devices. It is responsible for establishing, maintaining, and terminating connections or sessions between devices.

  • What is the role of Layer 6, the presentation layer?

    -Layer 6, the presentation layer, ensures that data is presented in a usable format. This layer handles tasks such as character encoding and encryption/decryption, making data readable for applications.

  • What protocols operate at Layer 7, the application layer?

    -Layer 7, the application layer, is where users interact with applications. Common protocols operating at this layer include HTTP, HTTPS, DNS, FTP, and POP3. This is the layer where network applications like web browsers and email clients operate.

Outlines

00:00

🔍 Introduction to the OSI Model

This paragraph introduces the OSI model, which stands for Open Systems Interconnection Reference model. It outlines how data traverses networks, serving as a broad framework for understanding network communication. While most modern protocols use TCP/IP, the OSI model is still relevant and can describe many protocols across its seven layers. The paragraph emphasizes that this model helps IT professionals communicate effectively, as terms like 'Layer 7' or 'Layer 4' are universally understood in the industry.

05:03

📡 Overview of OSI Layers 1 and 2

The focus shifts to Layer 1 (Physical) and Layer 2 (Data Link) of the OSI model. Layer 1 concerns physical signals, cables, and fibers, while Layer 2 manages communication between devices using MAC addresses. This layer is also associated with network switches, which use MAC addresses to forward traffic. Troubleshooting at these layers involves checking physical connections and ensuring network devices operate properly.

10:06

🌍 OSI Layer 3: The Network Layer

This paragraph explains Layer 3, the Network Layer, which focuses on routing and forwarding traffic based on IP addresses. Routers operate at this layer, determining the next hop for traffic and managing issues like IP addressing and subnet masks. The text also covers how Layer 3 fragments data into smaller pieces to fit different network requirements.

🚚 OSI Layer 4: The Transport Layer

Layer 4, the Transport Layer, is introduced as responsible for ensuring data is correctly transmitted from one device to another. Protocols like TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) handle breaking data into smaller chunks and reassembling them on the other side. The Transport Layer ensures reliable communication between devices.

🔄 OSI Layers 5 to 7: Session, Presentation, and Application

This paragraph discusses OSI Layers 5, 6, and 7. The Session Layer (Layer 5) manages starting, stopping, and maintaining communication sessions. The Presentation Layer (Layer 6) is responsible for character encoding, encryption, and ensuring data is properly formatted. Finally, the Application Layer (Layer 7) is where users interact with applications like HTTP, DNS, or email clients, providing the interface for user activities.

🖥️ Real-world Applications of the OSI Model

Here, the OSI model is connected to real-world scenarios. Layer 1 deals with physical hardware (cables, fibers), Layer 2 with MAC addresses and Ethernet frames, Layer 3 with IP addresses and routing, Layer 4 with ports (e.g., TCP and UDP), Layer 5 with session management, Layer 6 with encryption (SSL/TLS), and Layer 7 with application-level interactions. The paragraph explains how each layer functions in a practical network setup.

🔬 Analyzing Network Data with Wireshark

This section focuses on using Wireshark, a network analysis tool, to examine data packets. It explains how network traffic is broken down into OSI layers in Wireshark: from physical signals (Layer 1) to MAC addresses (Layer 2), IP addresses (Layer 3), TCP ports (Layer 4), session encryption (Layer 5), and application-specific data (Layer 7). The tool allows users to investigate how data is transmitted and received on the network.

🧑‍💻 Breaking Down a Network Frame Using the OSI Model

This paragraph walks through a specific example of a network frame captured in Wireshark, breaking it down according to the OSI layers. Layer 1 handles physical transmission, Layer 2 contains Ethernet frames and MAC addresses, Layer 3 covers IP addresses, Layer 4 involves TCP ports, and Layers 5–7 encompass the session, encryption, and application data. It provides a concrete illustration of how the OSI model applies to real network traffic.

Mindmap

Keywords

💡OSI Model

The OSI Model, or Open Systems Interconnection model, is a framework used to understand how data travels across a network by dividing the process into seven layers. Each layer has a specific function, from the physical transmission of data to the application a user interacts with. The video explains that the OSI Model helps IT professionals describe and troubleshoot network communication by referencing specific layers, such as Layer 1 (Physical) or Layer 7 (Application).

💡Layer 1 (Physical Layer)

The Physical Layer, or Layer 1, is the lowest level in the OSI Model. It deals with the actual hardware involved in transmitting data, such as cables, fibers, and wireless signals. The video emphasizes that problems at this layer often involve issues with physical connections, such as bad cables or wireless interference, and require tests like loopback tests to troubleshoot.

💡Layer 2 (Data Link Layer)

The Data Link Layer, or Layer 2, is responsible for transferring data between two directly connected devices. It is closely associated with MAC (Media Access Control) addresses, which are unique identifiers for network interfaces. In the video, this layer is described as the 'switching layer' because switches use MAC addresses to forward data to the correct destination.

💡Layer 3 (Network Layer)

The Network Layer, or Layer 3, handles routing, determining the best path for data to travel from one device to another across different networks. It uses IP addresses to identify the source and destination of data. The video explains that when problems occur with IP addressing or routing, they are often traced back to this layer.

💡Layer 4 (Transport Layer)

The Transport Layer, or Layer 4, ensures that data is delivered reliably from one device to another. It uses protocols like TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) to break down data into smaller packets and reassemble them at the destination. The video refers to this layer as the 'post office' of the network because it handles the packaging and delivery of data.

💡Layer 5 (Session Layer)

The Session Layer, or Layer 5, manages communication sessions between devices. It handles the setup, maintenance, and termination of sessions, ensuring that data is exchanged smoothly. The video explains that when a session needs to be initiated, restarted, or closed, Layer 5 is responsible, making it essential for maintaining continuous data flow.

💡Layer 6 (Presentation Layer)

The Presentation Layer, or Layer 6, ensures that data is in a readable format for the application layer by handling encryption, decryption, and character encoding. The video points out that this layer is responsible for translating data into a format that humans can understand, especially when dealing with encrypted web traffic using SSL/TLS protocols.

💡Layer 7 (Application Layer)

The Application Layer, or Layer 7, is where users interact with the network through applications like web browsers or email clients. It deals with protocols such as HTTP, HTTPS, and DNS. The video emphasizes that when users encounter issues with applications, they are often related to Layer 7, as this is where the visible interaction with the network occurs.

💡MAC Address

A MAC Address (Media Access Control Address) is a unique identifier assigned to network interfaces for communication on a physical network. The video explains that MAC addresses are crucial for Layer 2 communication, as switches use them to forward data to the correct device. It is also highlighted that MAC addresses are associated with the hardware, not the operating system.

💡TCP/IP

TCP/IP (Transmission Control Protocol/Internet Protocol) is a set of protocols used for communication over the internet. Although the OSI model is a theoretical framework, TCP/IP protocols align with its layers. The video mentions that while the OSI model is not tied to any specific protocol suite, TCP/IP is widely used today and maps well to the OSI model, particularly at Layer 3 (Network) and Layer 4 (Transport).

Highlights

The OSI model provides a broad overview of how data traverses a network, rather than detailing specific protocols.

The OSI model is not a protocol suite but can apply to many different protocols, including TCP/IP, which is widely used today.

OSI Layer 1, the Physical layer, deals with the actual physical connections and signals, like cables and wireless signals.

Layer 2, the Data Link layer, is responsible for MAC addresses and is often referred to as the switching layer because switches operate at this layer.

Layer 3, the Network layer, is known as the routing layer, and routers use this layer to determine how to forward traffic using IP addresses.

Layer 4, the Transport layer, handles the transport of data using protocols like TCP and UDP, breaking large data into smaller pieces for transmission.

Layer 5, the Session layer, manages sessions between devices, including initiating, maintaining, and terminating communication sessions.

Layer 6, the Presentation layer, is responsible for formatting, encrypting, and decrypting data before it is displayed to the user.

Layer 7, the Application layer, involves the interaction between the user and the application, with protocols like HTTP, FTP, and DNS operating here.

Ethernet frames, MAC addresses, and switches are examples of technologies that operate at OSI Layer 2, the Data Link layer.

At OSI Layer 3, IP addresses and routing mechanisms are key, including the forwarding of traffic across multiple networks.

The Wireshark network analyzer can decode network data by breaking it into OSI model layers, helping identify issues at each layer.

The transport protocols like TCP and UDP operate at Layer 4, ensuring reliable or fast data delivery depending on the protocol used.

SSL and TLS encryption are associated with OSI Layer 6, encrypting data to secure communications before it's transmitted over the network.

Problems at different OSI layers, such as Layer 1 physical issues or Layer 7 application issues, can be identified and solved using network tools like Wireshark.

Transcripts

play00:01

We'll start our Network+ course with a broad discussion

play00:05

of something we refer to as the OSI model.

play00:08

This is referring to the Open Systems Interconnection

play00:12

Reference model, and it's a model

play00:13

we use in it to describe the process that data takes

play00:17

as it traverses our networks.

play00:19

The OSI model is not designed to be a detailed description

play00:23

of this data but instead is intended

play00:26

to describe a broad overview of how data traverses our systems.

play00:31

We're also not describing the OSI protocol suite.

play00:35

Indeed, most of the protocols we use today are based on TCP/IP,

play00:40

but the OSI model is one that we can

play00:42

apply to many different protocols,

play00:44

and it works perfectly with the TCP/IP protocols

play00:47

that we use today.

play00:48

Also keep in mind that there are many different protocols that

play00:51

might operate at an individual layer of the OSI model.

play00:55

So as we step through an individual layer, keep in mind

play00:58

there might be tens or even hundreds

play01:00

of protocols that might exist and work

play01:03

at that particular layer.

play01:05

By understanding this OSI model, we

play01:07

can converse with other people in information technologies

play01:10

in a way that we would all understand.

play01:13

It doesn't matter if they're working inside

play01:14

of your own company or with a different organization.

play01:18

When you mention OSI layer 7 or OSI layer 4,

play01:21

everyone understands what that means

play01:24

and what effect it has on the overall operation

play01:27

of the network.

play01:28

If we start at the top of the OSI layer, or OSI layer 7,

play01:32

and work our way down to OSI layer 1,

play01:35

we have layer 7 being the application layer.

play01:38

Layer 6 is the presentation layer.

play01:40

Layer 5 is the session layer.

play01:42

Layer 4 is transport.

play01:44

Layer 3 is network.

play01:45

Layer 2 is the data link layer.

play01:47

And layer 1 is the physical layer.

play01:50

There are many different mnemonics

play01:51

that people use to memorize this,

play01:53

but if you start at the top and work your way down,

play01:56

you can take the first letter of each one of these layers,

play02:00

and you might have a term such as All People Seem To Need Data

play02:04

Processing.

play02:05

That's Application, Presentation, Session,

play02:07

Transport, Network, Data link, and Physical.

play02:12

Let's start our conversation of the OSI model

play02:14

at the bottom of the OSI model, or layer 1.

play02:18

We refer to this as the physical layer

play02:20

because it's describing the physical signals

play02:23

that we send through the cable and fibers on our network.

play02:27

At this layer, we really don't have many protocols to speak of,

play02:30

because we're really just talking

play02:32

about getting a signal from one part of the network to another.

play02:36

When we refer to a physical layer problem with the network,

play02:40

we are referring to the OSI layer 1, physical layer.

play02:43

This means that we might have a bad cable, a bad fiber.

play02:47

There might be interference on a wireless network.

play02:50

And it may require us to do a series of tests

play02:52

to determine if we are really able to get

play02:55

a signal across this particular wire or this particular fiber

play02:59

so that we can keep this network running.

play03:01

A lot of the troubleshooting that you do at layer one

play03:04

is running loopback tests, testing cables and fibers,

play03:07

and checking different adapter cards and other devices

play03:10

to make sure they're working properly on the network.

play03:14

One step up from the physical layer

play03:16

is layer 2, the data link layer.

play03:18

This is the fundamental layer that's

play03:20

used to communicate between two devices on the network.

play03:24

We often refer to this as the MAC address layer

play03:26

because that is the Data Link Control layer, or DLC layer,

play03:31

that is commonly associated with the network cards that

play03:34

are in our devices.

play03:35

And most of the time, these are ethernet adapters or wireless

play03:39

adapters, and we refer to that physical address on that device

play03:43

as the data link control address or the MAC address.

play03:47

In this case, MAC address is not referring

play03:49

to an operating system.

play03:50

It's referring to the Media Access Control address.

play03:54

So any time you hear someone talk about a MAC address,

play03:57

they are referring to the hardware

play03:58

address of that particular adapter card.

play04:01

Since the network switches that we use on our network

play04:04

determine how to forward traffic based on the destination MAC

play04:07

address, this is a layer that we often refer to as the switching

play04:11

layer.

play04:12

So any time we're referring to a MAC address,

play04:15

a problem with a switch being able to operate,

play04:18

or anything else that may be associated

play04:20

with this particular hardware address,

play04:23

we're referring to OSI layer 2, the data link layer.

play04:27

The next layer up is OSI layer 3, or the network layer.

play04:31

We often refer to this as the routing layer

play04:33

because this is the layer that routers use to determine how

play04:37

to forward traffic.

play04:38

And they are specifically looking at the destination IP

play04:42

address in order to determine what

play04:44

the next hop might be for traffic traversing the network.

play04:47

This is also the layer that we're

play04:49

able to fragment these frames into multiple pieces,

play04:53

especially if we're sending it across a network that

play04:56

may require smaller frames than what is on our local network.

play04:59

So we can cut those frames up into smaller pieces

play05:02

to be able to fit them through the network

play05:04

and then put those pieces back together on the other side.

play05:08

Any time we're referring to a problem relating

play05:10

to IP addressing, subnet masks, anything related to an IP

play05:15

address or anything about routing,

play05:17

then we're probably referring to layer 3, the network layer.

play05:21

Layer 4 is the transport layer.

play05:23

And as the name implies, we're referring to the ability

play05:26

to transport information from one device to another.

play05:30

You might also refer to this as the post office layer

play05:33

because this is responsible for getting

play05:35

your letter or your information from one side of the network

play05:39

to the other.

play05:39

The protocols that are often used and operate at layer

play05:43

4 of the OSI model is TCP--

play05:46

this stands for Transmission Control Protocol-- and UDP,

play05:50

or User Datagram Protocol.

play05:52

These two protocols are commonly responsible for getting

play05:56

all of the information within our IP packets from one device

play05:59

to the other.

play06:00

In many cases, this involves taking a large amount of data,

play06:04

putting it into smaller pieces to be

play06:06

able to get it across the network,

play06:08

and then putting those pieces back together on the other side.

play06:12

Before we can send that information

play06:13

from one side of the network to the other,

play06:16

we may need to create a session so that a device is

play06:19

able to receive that data.

play06:21

Layer 5 is the session layer, and it

play06:23

provides communication management between point A

play06:26

and point B. Anything relating to the initiation of a session,

play06:31

stopping the session, or restarting the session

play06:33

can commonly be associated with that layer

play06:35

5 session layer communication.

play06:38

If an application is using some type of control protocol

play06:41

or your tunneling information within existing data,

play06:44

then you're probably using OSI layer 5.

play06:48

OSI layer 6 is responsible for putting all of this data

play06:52

into a format that we will eventually

play06:54

see with our human eyes.

play06:56

This refers to character encoding, application encryption

play06:59

and decryption, and it's often combined and discussed

play07:03

in conjunction with the application layer at layer 7.

play07:07

Layer 6, or the presentation layer,

play07:09

is the layer that is commonly in operation just prior to us

play07:13

seeing this data on our screen.

play07:16

And the top layer of the OSI model

play07:18

is OSI layer 7, or the application layer.

play07:21

This is the layer that we see on our screen.

play07:24

So any time that we are interacting with an application,

play07:27

we are operating at layer 7 of the OSI model.

play07:31

Common applications that would operate at OSI layer 7

play07:34

are HTTP and HTTPS, FTP, DNS, POP3,

play07:39

and thousands of other application protocols.

play07:42

Well, that's a broad overview of the OSI model, but how do

play07:46

we fit things in the real world into each of those layers?

play07:51

Let's start down at the bottom with layer 1,

play07:53

or the physical layer.

play07:54

When we refer to cables, fiber optic connections,

play07:58

the signal going across those connections,

play08:00

or a wireless network, then we're

play08:02

operating at OSI layer 1, or the physical layer.

play08:06

When we refer to OSI layer 2 or the data link layer,

play08:09

then we're talking about ethernet frames, MAC addresses,

play08:12

or addresses referred to as Extended Unique Identifiers,

play08:17

or EUI.

play08:18

There are EUI-48 addresses and EUI-64 addresses, for example.

play08:23

And as we described earlier, any time we're

play08:25

referring to the switching process,

play08:27

we are referring to OSI layer 2.

play08:30

At OSI layer 3, or the network layer,

play08:32

we're referring to IP addresses.

play08:34

So anything that has an IP address or a subnet mask

play08:38

or referring to the way that routers forward

play08:40

traffic all happen at OSI layer 3.

play08:43

If you're referring to a TCP port or a UDP port,

play08:47

then we're operating at OSI layer 4,

play08:50

which is the transport layer.

play08:52

At OSI layer 5, or the session layer,

play08:55

we're using control protocols to start and end

play08:57

different sessions.

play08:58

Or we may be tunneling traffic using protocols

play09:01

that operate at OSI layer 5.

play09:03

We often associate the encryption of application data

play09:07

with OSI layer 6, or the presentation layer.

play09:10

So if you're communicating to a website

play09:12

and you're using SSL or TLS to be able to encrypt and decrypt

play09:17

that data, that process is occurring at OSI layer 6.

play09:21

And at OSI layer 7, or the application layer,

play09:24

is where you are interacting with the application itself.

play09:27

Anything that you're seeing on the screen,

play09:29

the application itself or any messages from the application,

play09:33

are often referred to as layer 7 information.

play09:37

If you wanted to drill down a little bit further

play09:39

into the OSI model, you might want

play09:42

to capture some data on your network

play09:44

and view that data inside of an application such as Wireshark.

play09:48

I have a Wireshark protocol decode on my screen

play09:51

where I've captured data on my network,

play09:53

and this Wireshark has three separate windows

play09:55

that is displaying different views of the same data.

play09:59

The top window is a frame-by-frame breakdown.

play10:01

For example, I have highlighted frame 88 on this top window.

play10:05

The middle window describes more detail

play10:08

of what different information is contained

play10:10

within that single frame.

play10:12

And on the bottom window, we have a hexadecimal and ASCII

play10:16

breakdown of the data itself.

play10:18

Let's focus our view on this middle window,

play10:21

which is a summary of this highlighted frame 88.

play10:24

You can see that there are 1, 2, 3, 4, 5 different lines of data

play10:29

inside of this single frame where the protocol decode has

play10:32

separated out the individual protocols

play10:35

within the single ethernet frame.

play10:37

Let's start with the one at the very top,

play10:40

which describes frame 88, which has 2,005 bytes on the wire,

play10:45

and 2,005 bytes were captured by Wireshark.

play10:48

If you wanted to associate that line with the OSI model,

play10:52

that would be best associated with layer 1

play10:54

or the physical model.

play10:56

Next down is Ethernet II, which has a source MAC address

play11:00

and a destination MAC address.

play11:02

And since we are describing MAC addresses,

play11:05

everything within that line of the Wireshark decode

play11:08

is associated with layer 2 of the OSI model,

play11:11

or the data link layer.

play11:12

The next line down describes the Internet Protocol, or IP.

play11:16

And as we described before, IP fits squarely

play11:19

in layer 3 of the OSI model, or the network layer.

play11:23

And in fact, there are individual IP addresses

play11:25

listed here for the source IP address and the destination IP

play11:29

address.

play11:30

And you can see there is a DNS resolution here that shows that

play11:33

the IP address of 72.14.247.19 is also associated with

play11:39

googlemail.l.google.com.

play11:42

As we move down this list, we're moving up

play11:44

the layers of the OSI model.

play11:46

And the next one is the Transmission Control Protocol,

play11:49

which means we're communicating via TCP for this Google Mail

play11:53

communication.

play11:54

Since TCP is in this list, we must

play11:57

be at OSI layer 4, or the transport layer.

play12:00

And indeed, you can see TCP port numbers for the source

play12:03

and the destination of this traffic.

play12:06

Since the destination port is port 443,

play12:08

Wireshark has already filled in that we're

play12:10

communicating over an encrypted channel using HTTPS.

play12:15

And if we go one layer down into the secure socket layer,

play12:18

this effectively encapsulates the top three layers

play12:22

of the OSI model.

play12:23

So secure socket layer and everything underneath it

play12:26

are referring to layer 5, the session layer, layer 6,

play12:30

presentation layer, and layer 7, the application layer.

play12:34

Here's a summary of that protocol decode broken out

play12:38

into the different layers of the OSI model.

play12:41

We had electrical signals at the physical layer.

play12:43

Layer 2 at the data link layer had ethernet frame information.

play12:47

Our IP addresses were at layer 3, or the network layer.

play12:51

Our TCP encapsulation with our TCP port numbers

play12:54

is at the transport layer.

play12:56

Our session layer linked the presentation information

play12:59

to the transport.

play13:00

Presentation layer was obviously performing that SSL or TLS

play13:04

encryption and decryption.

play13:06

And layer 7, or the application layer,

play13:08

is referring to that Google Mail front end

play13:11

and being able to send and receive emails

play13:14

using mail.google.com.

play13:17

Hopefully you're now able to see how this very broad description

play13:20

of an OSI model can be applied to practically

play13:23

any communication that's occurring over the network.

play13:26

And this allows us to talk with other it professionals

play13:29

and communicate in a way where everyone understands

play13:32

exactly what we're referring to when we talk about a layer 1

play13:36

physical problem or a layer 7 application problem.

Rate This

5.0 / 5 (0 votes)

الوسوم ذات الصلة
OSI modelnetworking basicsdata layersTCP/IPIT protocolsnetwork troubleshootingdata transmissionIP addressingWireshark analysisnetwork communication
هل تحتاج إلى تلخيص باللغة الإنجليزية؟