OSI Model Layer 5, 6, and 7 -- Session, Presentation, & Application Layers -- what they actually do

Practical Networking
31 Oct 202313:41

Summary

TLDRThis video explores the often-overlooked layers 5, 6, and 7 of the OSI model, emphasizing their practical importance in networking. The speaker demystifies how these layers contribute to the functionality of the internet, from managing user sessions (layer 5), interpreting data (layer 6), to defining application commands (layer 7). Using relatable examples like HTTP cookies, the video shows how these layers work in harmony. It also highlights why the TCP/IP model combines these layers into a single application layer, encouraging viewers to see networking models as tools for understanding abstraction in computer networks.

Takeaways

  • πŸ’‘ The OSI model is often misunderstood and seen as something just to memorize, but it's crucial for understanding how the internet works.
  • πŸ“Ά Layers 5, 6, and 7 are often called the 'Forgotten Layers' because they're not as well covered as Layers 1 through 4.
  • 🌍 The goal of networking is to allow data sharing between two users via computers, with each OSI layer playing a role in achieving this.
  • πŸ–₯️ Layer 5, the session layer, distinguishes between different user sessions, even if Layer 2, 3, or 4 information is the same.
  • πŸͺ HTTP cookies are an example of Layer 5, allowing users to maintain their session across different networks without logging in repeatedly.
  • πŸ”’ Layer 6, the presentation layer, interprets the ones and zeros in a packet, converting them into characters or data formats like ASCII or Base64.
  • 🌐 HTTP uses extended ASCII encoding at Layer 6 to translate binary data into readable characters.
  • πŸ”Ž Layer 7, the application layer, defines how the interpreted data is used, such as executing commands in HTTP to request a webpage.
  • βš™οΈ Different protocols (like FTP and HTTP) implement Layers 5, 6, and 7 differently based on their application needs.
  • πŸ“Š While OSI has seven layers, the TCP/IP model often combines Layers 5, 6, and 7 into one 'application layer' for simplicity, as protocols may handle these layers uniquely.

Q & A

  • What is the main focus of the video script?

    -The video focuses on explaining layers 5, 6, and 7 of the OSI model, which are often overlooked or combined into a single application layer in other models like TCP/IP.

  • Why are layers 5, 6, and 7 of the OSI model referred to as the 'Forgotten layers'?

    -They are referred to as 'Forgotten layers' because most resources and discussions on the OSI model focus on layers 1 through 4, and the TCP/IP model combines layers 5, 6, and 7 into a single application layer.

  • What problem does layer 5 of the OSI model solve?

    -Layer 5, the session layer, solves the problem of distinguishing between different user sessions. It allows networking protocols to keep track of user-specific data and separate different sessions, even if the underlying layer 2, 3, or 4 addresses are the same.

  • Can you provide an example of how layer 5 functions in modern computing?

    -An example of layer 5's function is HTTP cookies. These cookies store user-specific information that allows websites to identify users independently from changes in layer 2, 3, or 4 information, such as IP addresses, when switching networks.

  • What role does layer 6, the presentation layer, play in the OSI model?

    -Layer 6 determines how to interpret the ones and zeros received by a network. It manages tasks like data encoding, compression, and encryption by deciding how data should be formatted or interpreted, such as using Base64, hexadecimal, or ASCII encoding.

  • How does layer 7, the application layer, function in the OSI model?

    -Layer 7, the application layer, defines the application commands that are carried out after the data is processed and interpreted. For example, in HTTP, the 'GET' command is used to request web pages, making layer 7 responsible for executing such high-level functions.

  • Why are layers 5, 6, and 7 combined into a single application layer in the TCP/IP model?

    -Layers 5, 6, and 7 are combined in the TCP/IP model because each protocol or application handles these layers' responsibilities (session, presentation, and application) in its own way. Since there's no strict need to separate them, they are grouped as a single 'application layer' for simplicity.

  • How do different protocols like HTTP and FTP implement layers 5, 6, and 7 differently?

    -Different protocols implement these layers based on their specific needs. For example, HTTP uses cookies for session management (layer 5), extended ASCII encoding for data (layer 6), and commands like 'GET' for application operations (layer 7). In contrast, FTP may not have session management (layer 5) and uses its own set of application commands in layer 7.

  • What is the significance of understanding the OSI model in layers of abstraction?

    -Understanding the OSI model in layers of abstraction allows you to see how different networking responsibilities are divided among layers. Each layer focuses on a specific function, making networking more manageable by ensuring that higher layers do not have to worry about the details handled by lower layers.

  • Why is it important not to try to fit all networking knowledge strictly into the OSI model?

    -The OSI model and TCP/IP models are abstractions meant to teach networking concepts. Networking in practice can be more complex, and it's not always necessary to fit everything into one of these layers. These models serve as guidelines rather than strict rules.

Outlines

00:00

🎢 Misconceptions About OSI Model Layers 5, 6, and 7

The video begins by addressing the misinformation about OSI model layers 5, 6, and 7, often dismissed as unimportant. The creator emphasizes a more practical understanding of these layers, highlighting their crucial role in networking. The video aims to unpack these layers in detail, continuing from previous videos on layers 1-4, which received viewer requests for further exploration of the remaining layers.

05:01

🌍 Understanding Networking Layers and Their Goals

The OSI model has seven layers, each playing a specific role to enable networking, which allows users to share data between computers. When each layer functions correctly, networking works seamlessly, which in turn powers the internet. While layers 1-4 are commonly covered in resources, layers 5-7 are often overlooked. The TCP/IP model even combines these layers into one, which simplifies the model but also obscures their unique contributions.

10:02

πŸ“‘ The Role of Layer 5: Session Management

Layer 5, or the session layer, manages user sessions independently of the network addresses (layer 2, 3, or 4). In legacy systems, such as mainframes and dumb terminals, this layer distinguished between users sharing computing resources. Even today, with technologies like HTTP cookies, layer 5 plays a crucial role in identifying users across network changes, ensuring seamless browsing without requiring users to log in again after switching networks.

πŸ” Layer 6: Interpreting Data Formats

Layer 6, known as the presentation layer, deals with how to interpret the data received, ensuring that the bits transmitted across the network are converted into meaningful information. This layer decides how to group the binary dataβ€”whether into base64 encoding, hexadecimal, or other formats like ASCII. In the case of HTTP, for example, it interprets bits into ASCII characters to make sense of the data, translating them into readable text like 'GET' requests.

πŸ–₯️ Layer 7: Application-Level Commands

Layer 7, the application layer, defines the actions performed once the data has been processed. In the case of HTTP, for instance, the presentation layer has already interpreted the bits, and now the application layer handles specific commands like fetching a webpage using 'GET' requests. This layer dictates the interaction between user applications and networking services, ensuring commands are executed correctly.

πŸ“‚ Comparing Protocols in Layers 5-7: HTTP vs FTP

Not all protocols handle layers 5-7 in the same way. While HTTP uses cookies for session management, FTP does not have a built-in mechanism for managing user sessions across network changes, requiring users to log in again if their IP changes. Both HTTP and FTP use extended ASCII encoding for data interpretation, but each has its own set of application-layer commands specific to its protocol.

πŸ”„ OSI vs TCP/IP: Aggregated Layers and Flexibility

The TCP/IP model combines OSI layers 5-7 into one 'application layer' because different protocols can handle these layers in varying ways. This flexibility allows different networking models to work efficiently without adhering strictly to the OSI layer structure. Both models are valuable as conceptual tools, not rigid frameworks, and should be used to understand the abstraction and responsibilities of each layer in networking.

πŸ’‘ Key Takeaways on Layers 5, 6, and 7

In conclusion, layers 5-7 play important, albeit often aggregated, roles in networking models. Their functions allow for session management, data format interpretation, and application-level commands. Understanding these layers helps learners appreciate how abstraction works in networking, making concepts like tunneling and overlays easier to grasp. The creator invites viewers to explore more through their course on networking and encourages engagement with the video.

Mindmap

Keywords

πŸ’‘OSI Model

The OSI (Open Systems Interconnection) model is a conceptual framework used to understand how different networking protocols interact across seven layers to enable communication between computers. In the video, it is presented as a critical model for understanding networking, with a focus on layers 5, 6, and 7, which are often overlooked.

πŸ’‘Layer 5 - Session Layer

Layer 5 of the OSI model is responsible for establishing, managing, and terminating communication sessions between devices. In the video, it is described as handling user sessions, ensuring that data streams for different users are kept separate even if they share the same MAC, IP, or port addresses. An example is HTTP cookies used to track user sessions across different networks.

πŸ’‘Layer 6 - Presentation Layer

The presentation layer, or Layer 6, is tasked with translating data between the application layer and the network format, ensuring that the data sent from one system is readable by another. The video explains how Layer 6 handles encoding methods like Base64 or ASCII, ensuring that raw data (ones and zeros) is interpreted correctly, such as transforming binary into readable text.

πŸ’‘Layer 7 - Application Layer

Layer 7, the application layer, defines how software interacts with the network. This is where protocols like HTTP and FTP reside. In the video, Layer 7 is shown to manage specific commands like 'GET' in HTTP, which tells a server to retrieve a specific webpage. It plays a crucial role in defining how applications utilize the network.

πŸ’‘TCP/IP Model

The TCP/IP model is a more streamlined networking framework that condenses layers 5, 6, and 7 of the OSI model into a single 'application layer.' The video explains why this model is more popular today, as many modern applications handle the responsibilities of session management, data representation, and application commands in a unified way.

πŸ’‘HTTP Cookies

HTTP cookies are small pieces of data sent from a server and stored on a user's device to maintain session information across different networks. The video uses cookies as an example of how Layer 5 operates, allowing users to stay logged into a website even when their network changes, distinguishing them independently of their IP or port.

πŸ’‘Mainframes and Dumb Terminals

Mainframes are large, powerful computers that were once common for centralized computing, with 'dumb terminals' serving as simple input/output devices. The video uses this historical context to explain how the session layer was first developed to separate user data when many users connected to the same mainframe.

πŸ’‘Base64 Encoding

Base64 is a method for encoding binary data into text format, often used in email and web technologies. In the video, Base64 is used as an example of how Layer 6 (the presentation layer) interprets raw data. It demonstrates how the same ones and zeros can be represented in different formats depending on the encoding method.

πŸ’‘TCP Ports

TCP ports are virtual endpoints for communication at the transport layer (Layer 4) that help identify specific processes or services on a networked computer. The video mentions Layer 4 addresses like ports in its explanation of why Layer 5 is essential for managing sessions, ensuring data from different users doesn’t get confused when sharing the same transport endpoints.

πŸ’‘Abstraction

Abstraction refers to the concept of simplifying complex systems by focusing on specific layers of functionality while hiding the details of others. The OSI model and TCP/IP model both use layers to abstract different responsibilities in networking. The video stresses that understanding the models as layers of abstraction helps learners grasp how complex systems like the internet function without being overwhelmed by every detail.

Highlights

Layers 5, 6, and 7 of the OSI model are often overlooked, yet crucial to understanding networking.

The OSI model is not just something to memorize, but a way to understand how different components work together to make the internet function.

Layer 5, known as the session layer, distinguishes between user sessions, allowing multiple users to be identified separately despite sharing the same network addresses.

HTTP cookies are a modern example of how layer 5 identifies users independently from lower-layer data like IP addresses and ports.

Layer 6, the presentation layer, focuses on how to interpret the data received, like deciding whether to interpret bits as text, numbers, or other formats such as Base64 or Hexadecimal.

The presentation layer allows protocols like HTTP to group ones and zeros into meaningful characters using extended ASCII encoding.

Layer 7, the application layer, defines what should be done with the interpreted data, such as HTTP requests containing commands like GET to fetch web pages.

Each network protocol, such as HTTP or FTP, implements layers 5, 6, and 7 differently, which is why TCP/IP combines these into a single 'application layer.'

TCP/IP’s aggregation of layers 5, 6, and 7 into a single application layer simplifies protocol-specific implementations of these layers.

The OSI and TCP/IP models are abstractions designed to help understand how different layers of networking work together, not rigid structures.

Layered abstractions, such as the OSI model, allow each layer to focus on its specific role without worrying about the responsibilities of other layers.

Legacy systems like mainframes and dumb terminals illustrate the original importance of the session layer in keeping user data streams separate.

HTTP cookies help maintain user sessions even when changing networks (such as switching Wi-Fi networks) by identifying users independently of lower-layer addresses.

The presenter emphasizes not fitting everything into these layers but using them as a teaching tool for networking concepts.

The flexibility of networking protocols allows them to implement layers 5, 6, and 7 in ways that make the most sense for their specific applications, contributing to the overall efficiency of internet communication.

Transcripts

play00:00

[Music]

play00:00

there's a lot of bad information out

play00:02

there about layers 5 six and seven of

play00:04

the OSI model in fact there are many

play00:06

resources out there that describe the

play00:08

OSI model as merely something to

play00:10

memorize I think that's a huge

play00:12

disservice there's a way of

play00:14

understanding The OSI model from a

play00:16

practical perspective as a series of

play00:18

components that all contribute towards

play00:20

making the internet work that's the

play00:21

strategy I took when I published my two

play00:23

videos on the osm those videos focused

play00:26

on layers 1 through 4 the most common

play00:28

request I got in the coms ments of those

play00:30

videos was to continue with lers 56 and

play00:32

7 so here we

play00:35

[Music]

play00:41

are the OSI model consists of seven

play00:44

different layers that each have a

play00:46

specific responsibility which contribute

play00:48

to the overall goal of networking which

play00:50

is to allow two users to use computers

play00:52

to share data between each other if each

play00:55

layer is doing its responsibility

play00:57

successfully then the goal of networking

play00:59

is attained which means the internet

play01:00

works there are many resources that

play01:03

unpack layers 1 2 3 and four but very

play01:06

few that really pick apart layers 5 six

play01:08

and 7even I call these the Forgotten

play01:10

layers of the OSI model part of that is

play01:13

because the other popular networking

play01:15

models the tcpip models simply combine

play01:18

these layers as a single aggregated

play01:21

application layer now there's good

play01:23

reason for that and you'll understand

play01:25

those reasons towards the end of this

play01:26

video what I want to do in this video is

play01:29

unpack the details of layer 5 6 and 7

play01:32

and specifically how each of those

play01:33

layers contribute towards the goal of

play01:35

networking before we can understand

play01:38

these layers however we have to

play01:39

understand the layers beneath it

play01:41

specifically you must understand the

play01:43

terms hop to hop end to end and service

play01:45

to service and how each of those apply

play01:48

towards the goal of networking if you're

play01:50

unfamiliar with those terms then please

play01:52

check out my other two videos on the OSI

play01:54

model I promise it'll be the best take

play01:56

on not only understanding The OSI model

play01:58

but also how to explain it to others

play02:00

with that said let's get into the

play02:02

Forgotten layers of the OSI model

play02:04

starting with layer five to understand

play02:07

layer five of The OSI model you have to

play02:10

understand that this model was created

play02:12

long before the days of personal

play02:14

computers or

play02:15

PCS back in those days Computing was

play02:18

done on large massive machines called

play02:21

mainframes and these were often so big

play02:23

that they took up entire rooms the

play02:25

Computing resources on these enormous

play02:27

mainframes were then accessed by people

play02:30

using what is known as dumb terminals

play02:32

which were effectively just a monitor

play02:34

and a keyboard plugged into these main

play02:36

frames no actual processing of data was

play02:39

done on these dump terminals all the

play02:42

actual Computing was done on the

play02:44

mainframes fun fact this was also the

play02:46

model that Linux was created in this is

play02:48

why Linux is often described as a

play02:50

multi-user operating system in any case

play02:54

all the Computing was done on these

play02:55

large mainframes and users would connect

play02:58

to these mainframes using dump Terminals

play03:00

and then those main frames were then

play03:02

connected to other main frames which

play03:04

also had their own set of users using

play03:06

their own set of dump

play03:08

Terminals and here we can Define the

play03:10

problem that layer five is meant to

play03:12

solve notice this blue user is using

play03:15

this Mainframe to speak to this blue

play03:17

user using that main frame at the same

play03:19

time these two green users are also

play03:22

speaking to each other using these two

play03:23

main frames well if both of those main

play03:26

frames are doing all the Computing and

play03:28

sending of the data between each other

play03:30

then the packets that are sent from this

play03:32

main frame to the other are going to

play03:33

have the same layer 2 address like a MAC

play03:35

address the same layer three address

play03:37

like an IP address and even potentially

play03:40

the same layer four addresses like ports

play03:42

which then begs the question how is the

play03:44

data between these two blue users going

play03:47

to be kept separate from the data

play03:49

between these two green users that's

play03:51

where layer five comes into play layer

play03:54

five is there to distinguish between

play03:57

user sessions it allows networking

play04:00

protocols to identify a user

play04:02

independently from their layer 2 layer 3

play04:04

or layer 4

play04:06

addresses okay so that makes sense but

play04:09

is layer five simply an artifact of

play04:11

Legacy Computing on these mainframe

play04:13

computers well no you actually use

play04:16

something that I would categorize as a

play04:18

layer five component every day when

play04:19

you're browsing the web let me show you

play04:23

let's say these two blue users are not

play04:25

using main frames to speak to each other

play04:27

and instead this user is actually a web

play04:29

server for the site site.com and this

play04:32

user is simply someone using a mobile

play04:34

phone this mobile phone is currently

play04:36

logged into a Wi-Fi network at this

play04:38

user's house and this phone uses this

play04:41

connection to log into the site

play04:43

site.com but what happens if this user

play04:46

then decides that they want to go to a

play04:47

coffee shop and connect to the Wi-Fi

play04:49

network there since this is a different

play04:52

network they're going to have a new IP

play04:54

address which means this information is

play04:56

going to change and if the website is

play04:58

identifying this us user with layer 1

play05:00

through 4 information then this user is

play05:02

going to have to log back into the

play05:04

website every time they connect to a new

play05:06

Wi-Fi network because in each case

play05:08

they're going to be getting a new IP

play05:10

address instead since we're using HTTP

play05:13

to access this website HTTP has a

play05:16

functionality known as HTTP cookies

play05:19

these cookies are simply arbitrary text

play05:21

strings that store users specific

play05:23

information that is created by the

play05:25

server what happens is when the user

play05:27

logs into the website the the server

play05:30

generates one of these cookies and sends

play05:31

it to the user this cookie then stays

play05:34

with the user and if this user logs into

play05:37

a new Wi-Fi network with new layer 234

play05:40

information that user still has the same

play05:43

cookie and the website can still

play05:45

identify this user independent from

play05:47

whatever layer 2 layer three and layer

play05:49

four addresses that that user might

play05:51

maintain so you see HTTP cookies are a

play05:54

perfect example of layer five's

play05:56

responsibilities in the OSI model they

play05:59

allow the network to identify user

play06:01

independently from the layer 2 three and

play06:03

four

play06:04

addresses which then brings us to layer

play06:06

six to understand the presentation layer

play06:09

we're going to simulate a packet

play06:11

arriving on the web server for site.com

play06:14

recall that every packet is really

play06:15

nothing more than a series of ones and

play06:17

zeros and because of the rest of the

play06:20

layers of the OSI model we know that

play06:22

this packet successfully delivered to

play06:24

the web server arrive to the right Mac

play06:26

address arrive to the right IP address

play06:28

arrive to the right port and arrive to

play06:30

the right user session which now brings

play06:33

us to layer six what layer six does is

play06:35

it tells us how to interpret the ones

play06:37

and zeros there are many ways to

play06:40

interpret those ones and zeros for

play06:42

example should we group those ones and

play06:44

zeros in sets of six bits as base 64

play06:47

encoding would require this would mean

play06:50

each combination of six bits would turn

play06:52

into a new base 64 character or should

play06:55

we interpret those ones and zeros in

play06:57

groups of four bits this is what heximal

play07:00

would require where each group of four

play07:02

ones and zeros represents a new heximal

play07:05

character or should we interpret those

play07:07

ones and zeros as long numbers or

play07:10

integers if we were to interpret all

play07:12

these ones and zeros as 32-bit numbers

play07:15

this number would be 1 billion in change

play07:17

and this number would be 796 million in

play07:20

change alternatively maybe we're

play07:22

interpreting this as a single large 64

play07:25

pit number in which case this string of

play07:28

64 ones and zeros could be translated to

play07:31

this huge number in decimal so you see

play07:34

that's what layer six tells us it tells

play07:36

us what do we do with these ones and

play07:38

zeros now earlier we use HTTP as an

play07:41

example and we can continue to do so

play07:44

HTTP as a protocol uses extended asky

play07:48

encoding extended asy takes all the ones

play07:51

and zeros and groups them into sets of

play07:53

eight bits and interprets each of those

play07:55

eight bits as a different ASE character

play07:58

this combination of ones and zeros

play08:00

translates to the letter G and this

play08:02

combination of ones and zeros translates

play08:04

to the letter e and this combination

play08:06

translates to the letter T and so on and

play08:09

that's what layer six provides it tells

play08:11

us what to do with the received ones and

play08:13

zeros that have been successfully

play08:15

processed through the OSI model and

play08:17

delivered to the right user session

play08:19

which then brings us to layer seven if

play08:22

layer six told us how to interpret the

play08:24

ones and zeros that have been received

play08:27

layer seven will tell us what do we do

play08:29

with the interpreted characters or said

play08:32

another way layer 7 will actually Define

play08:35

the application commands these three

play08:38

bytes of ones and zeros turn into the

play08:40

letters g e and t and the command get in

play08:44

HTTP is the command you would use to

play08:47

fetch a particular web page what you're

play08:50

seeing here is actually the first eight

play08:52

characters of an HTTP request asking for

play08:55

the page simple. HTML using http P 1.1

play09:00

from the host packet.net

play09:02

and if that looks familiar that's

play09:05

because it's the exact HTTP request we

play09:07

made in my last video where I showed you

play09:09

how to make an HTTP request using tet

play09:13

and if you haven't seen that video I

play09:14

think that one plus this video work well

play09:17

together to really explain how

play09:18

networking protocols work either way

play09:21

that is what layer seven of the OSI

play09:23

model does and that actually concludes

play09:26

my description of what the Forgotten

play09:28

layers of the OSI model actually do but

play09:31

before I let you go there's a few more

play09:33

ideas I have to leave you with

play09:35

throughout this lesson we've been using

play09:37

HTTP as our example protocol we told you

play09:40

that HTTP to accomplish the goals of

play09:43

session management uses HTTP cookies and

play09:46

for layer six HTTP uses extended asking

play09:49

coded and for layer seven HTTP has its

play09:53

own set of application commands but

play09:55

there are other protocols that exist

play09:57

Beyond just http for example FTP well it

play10:02

doesn't really make sense for FTP to use

play10:04

HTTP cookies to accomplish its layer

play10:06

five goals FTP is in fact free to choose

play10:10

how to implement layer five in any way

play10:12

it deems necessary or to not implement

play10:15

it at all FTP in fact doesn't have a way

play10:19

to identify a user session independent

play10:21

from the layers below it FTP uses layer

play10:24

three and layer four information to

play10:26

identify a user which means if you are

play10:28

in the middle of an FTP session and your

play10:30

IP address changes you're going to have

play10:32

to log back in to that FTP server for

play10:35

layer six FTP also uses extended asky

play10:38

encoding and for layer 7 FTP has its own

play10:41

set of application commands so that's

play10:44

just HTTP and FTP two of the maybe

play10:47

thousands of protocols that exist and

play10:50

you can see that each of those protocols

play10:51

can Implement layers 5 six and seven in

play10:54

whatever way that makes the most sense

play10:55

for that particular application that is

play10:58

why the the tcpip models combine those

play11:01

layers into a single aggregate

play11:03

application layer since every protocol

play11:06

an application is going to implement

play11:07

their own way of doing these three goals

play11:10

it makes sense to combine those as a

play11:12

single application layer so in the end

play11:15

whether you're using the seven layer OSI

play11:17

model the five layer tcpip model or even

play11:20

the somewhat Legacy four layer tcpip

play11:23

model one way or another each of these

play11:25

are merely models they are simply a way

play11:28

of understanding computer networking

play11:30

don't try too hard to fit everything you

play11:33

learn in the networking world into one

play11:35

of these layers or one of these models

play11:37

that's not the goal these are simply

play11:39

abstractions to teach you how computer

play11:41

networking can work in the end each of

play11:44

these models are there to teach you the

play11:46

concept of layers of abstraction one

play11:49

layer has responsibility and that

play11:51

precludes the other layers from having

play11:53

to worry about that

play11:54

responsibility layer three can do its

play11:57

job of endtoend delivery without having

play11:59

to worry about how the ones and zeros

play12:02

are going to be delivered across every

play12:03

router in the path and HTTP cookies work

play12:07

the same whether you're using ipv4 or

play12:10

IPv6 each layer's goals are abstracted

play12:13

from the other layers understanding The

play12:16

OSI model or the tcpip model in that way

play12:19

will set you up for Success when you're

play12:21

learning deeper things in the networking

play12:22

world like tunneling and underlays and

play12:27

overlays

play12:30

so that's my take on layers 5 six and

play12:32

7even of the OSI model hopefully you now

play12:34

have a more solid understanding of how

play12:37

these layers work and why they are often

play12:38

simply aggregated as a single

play12:40

application layer if you enjoyed this

play12:42

lesson then check out my new course

play12:44

called networking the internet the cloud

play12:46

and everything in between it's currently

play12:48

under construction and you can join now

play12:49

at a discounted rate to get permanent

play12:51

access and help shape this into the best

play12:53

networking course

play12:55

possible otherwise if you think more

play12:57

people should understand and explain

play12:59

layers 5 6 and 7even this way and help

play13:01

me out by liking commenting and

play13:03

subscribing that would help me with the

play13:05

YouTube algorithm or if so inclined

play13:08

please share this video amongst your

play13:09

peers that would really help me out and

play13:11

I would appreciate it greatly thank you

play13:13

for watching this video I hope you got a

play13:14

lot out of it and I'll see you in the

play13:16

next

play13:20

[Music]

play13:27

one

play13:29

[Music]

play13:40

oh

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
OSI ModelNetworking LayersLayer 5-7Session ManagementData EncodingNetworking ConceptsTCP/IPHTTP CookiesApplication LayerTech Tutorials