OSI Protocols
OSI Protocols
5. Layer 5, the Session Layer: The session layer creates a session between the source and the
destination nodes and terminates sessions on completion of the communication process.
The protocols used are: PPTP, SAP, L2TP and NetBIOS.
6. Layer 6, the Presentation Layer: The functions of encryption and decryption are defined on
this layer. It converts data formats into a format readable by the application layer. The
following are the presentation layer protocols: XDR, TLS, SSL and MIME.
7. Layer 7, the Application Layer: This layer works at the user end to interact with user
applications. QoS (quality of service), file transfer and email are the major popular services
of the application layer. This layer uses following protocols: HTTP, SMTP, DHCP, FTP, Telnet,
SNMP and SMPP.
Physical topology is the placement of the various components of a network, including device
location and cable installation, while logical topology illustrates how data flows within a
network, regardless of itsphysical design.\
Layer 7
Application;
FTP, Telnet, TFTP, SMTP, POP3, SNMP, DNS, NTP, HTTP, H
DHCP
Layer 6
Presentation;
ASCII, ,jpg, .doc
Layer 5
Session;
RPC, SQL/Telnet (for log
Layer 4
Transport;
TCP - Connection-orient
using PAR
UDP- Connectionless, u
uses upper layer protoco
reliability
Layer 3
Network;
IP, ICMP, RIP, IGRP, EIG
Routing and path determ
logical addressing
Layer 2
Data Link;
Ethernet, Frame Relay, P
Physical (Hardware) add
(MAC addresses)
Layer 1
Physical;
Bits transmitted on medi
Hubs, repeaters, connec