• Engineering Mathematics
  • Discrete Mathematics
  • Operating System
  • Computer Networks
  • Digital Logic and Design
  • C Programming
  • Data Structures
  • Theory of Computation
  • Compiler Design
  • Computer Org and Architecture
  • Computer Network Tutorial

Basics of Computer Network

  • Basics of Computer Networking
  • Introduction to basic Networking Terminology
  • Goals of Networks
  • Basic characteristics of Computer Networks
  • Challenges of Computer Network
  • Physical Components of Computer Network

Network Hardware and Software

  • Types of Computer Networks
  • LAN Full Form
  • How to Set Up a LAN Network?
  • MAN Full Form in Computer Networking
  • MAN Full Form
  • WAN Full Form
  • Introduction of Internetworking
  • Difference between Internet, Intranet and Extranet
  • Protocol Hierarchies in Computer Network
  • Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter)
  • Introduction of a Router
  • Introduction of Gateways
  • What is a network switch, and how does it work?

Network Topology

  • Types of Network Topology
  • Difference between Physical and Logical Topology
  • What is OSI Model? - Layers of OSI Model
  • Physical Layer in OSI Model
  • Data Link Layer
  • Session Layer in OSI model

Presentation Layer in OSI model

  • Application Layer in OSI Model
  • Protocol and Standard in Computer Networks
  • Examples of Data Link Layer Protocols
  • TCP/IP Model
  • TCP/IP Ports and Its Applications
  • What is Transmission Control Protocol (TCP)?
  • TCP 3-Way Handshake Process
  • Services and Segment structure in TCP
  • TCP Connection Establishment
  • TCP Connection Termination
  • Fast Recovery Technique For Loss Recovery in TCP
  • Difference Between OSI Model and TCP/IP Model

Medium Access Control

  • MAC Full Form
  • Channel Allocation Problem in Computer Network
  • Multiple Access Protocols in Computer Network
  • Carrier Sense Multiple Access (CSMA)
  • Collision Detection in CSMA/CD
  • Controlled Access Protocols in Computer Network

SLIDING WINDOW PROTOCOLS

  • Stop and Wait ARQ
  • Sliding Window Protocol | Set 3 (Selective Repeat)
  • Piggybacking in Computer Networks

IP Addressing

  • What is IPv4?
  • What is IPv6?
  • Introduction of Classful IP Addressing
  • Classless Addressing in IP Addressing
  • Classful Vs Classless Addressing
  • Classless Inter Domain Routing (CIDR)
  • Supernetting in Network Layer
  • Introduction To Subnetting
  • Difference between Subnetting and Supernetting
  • Types of Routing
  • Difference between Static and Dynamic Routing
  • Unicast Routing - Link State Routing
  • Distance Vector Routing (DVR) Protocol
  • Fixed and Flooding Routing algorithms
  • Introduction of Firewall in Computer Network

Congestion Control Algorithms

  • Congestion Control in Computer Networks
  • Congestion Control techniques in Computer Networks
  • Computer Network | Leaky bucket algorithm
  • TCP Congestion Control

Network Switching

  • Circuit Switching in Computer Network
  • Message switching techniques
  • Packet Switching and Delays in Computer Network
  • Differences Between Virtual Circuits and Datagram Networks

Application Layer:DNS

  • Domain Name System (DNS) in Application Layer
  • Details on DNS
  • Introduction to Electronic Mail
  • E-Mail Format
  • World Wide Web (WWW)
  • HTTP Full Form
  • Streaming Stored Video
  • What is a Content Distribution Network and how does it work?

CN Interview Quetions

  • Top 50 Plus Networking Interview Questions and Answers for 2024
  • Top 50 TCP/IP Interview Questions and Answers 2024
  • Top 50 IP Addressing Interview Questions and Answers
  • Last Minute Notes - Computer Networks
  • Computer Network - Cheat Sheet
  • Network Layer
  • Transport Layer
  • Application Layer

Prerequisite : OSI Model

Introduction : Presentation Layer is the 6th layer in the Open System Interconnection (OSI) model. This layer is also known as Translation layer, as this layer serves as a data translator for the network. The data which this layer receives from the Application Layer is extracted and manipulated here as per the required format to transmit over the network. The main responsibility of this layer is to provide or define the data format and encryption. The presentation layer is also called as Syntax layer since it is responsible for maintaining the proper syntax of the data which it either receives or transmits to other layer(s).

Functions of Presentation Layer :

The presentation layer, being the 6th layer in the OSI model, performs several types of functions, which are described below-

  • Presentation layer format and encrypts data to be sent across the network.
  • This layer takes care that the data is sent in such a way that the receiver will understand the information (data) and will be able to use the data efficiently and effectively.
  • This layer manages the abstract data structures and allows high-level data structures (example- banking records), which are to be defined or exchanged.
  • This layer carries out the encryption at the transmitter and decryption at the receiver.
  • This layer carries out data compression to reduce the bandwidth of the data to be transmitted (the primary goal of data compression is to reduce the number of bits which is to be transmitted).
  • This layer is responsible for interoperability (ability of computers to exchange and make use of information) between encoding methods as different computers use different encoding methods.
  • This layer basically deals with the presentation part of the data.
  • Presentation layer, carries out the data compression (number of bits reduction while transmission), which in return improves the data throughput.
  • This layer also deals with the issues of string representation.
  • The presentation layer is also responsible for integrating all the formats into a standardized format for efficient and effective communication.
  • This layer encodes the message from the user-dependent format to the common format and vice-versa for communication between dissimilar systems.
  • This layer deals with the syntax and semantics of the messages.
  • This layer also ensures that the messages which are to be presented to the upper as well as the lower layer should be standardized as well as in an accurate format too.
  • Presentation layer is also responsible for translation, formatting, and delivery of information for processing or display.
  • This layer also performs serialization (process of translating a data structure or an object into a format that can be stored or transmitted easily).

Features of Presentation Layer in the OSI model: Presentation layer, being the 6th layer in the OSI model, plays a vital role while communication is taking place between two devices in a network.

List of features which are provided by the presentation layer are:

  • Presentation layer could apply certain sophisticated compression techniques, so fewer bytes of data are required to represent the information when it is sent over the network.
  • If two or more devices are communicating over an encrypted connection, then this presentation layer is responsible for adding encryption on the sender’s end as well as the decoding the encryption on the receiver’s end so that it can represent the application layer with unencrypted, readable data.
  • This layer formats and encrypts data to be sent over a network, providing freedom from compatibility problems.
  • This presentation layer also negotiates the Transfer Syntax.
  • This presentation layer is also responsible for compressing data it receives from the application layer before delivering it to the session layer (which is the 5th layer in the OSI model) and thus improves the speed as well as the efficiency of communication by minimizing the amount of the data to be transferred.

Working of Presentation Layer in the OSI model : Presentation layer in the OSI model, as a translator, converts the data sent by the application layer of the transmitting node into an acceptable and compatible data format based on the applicable network protocol and architecture.  Upon arrival at the receiving computer, the presentation layer translates data into an acceptable format usable by the application layer. Basically, in other words, this layer takes care of any issues occurring when transmitted data must be viewed in a format different from the original format. Being the functional part of the OSI mode, the presentation layer performs a multitude (large number of) data conversion algorithms and character translation functions. Mainly, this layer is responsible for managing two network characteristics: protocol (set of rules) and architecture.

Presentation Layer Protocols : Presentation layer being the 6th layer, but the most important layer in the OSI model performs several types of functionalities, which makes sure that data which is being transferred or received should be accurate or clear to all the devices which are there in a closed network. Presentation Layer, for performing translations or other specified functions, needs to use certain protocols which are defined below –

  • Apple Filing Protocol (AFP): Apple Filing Protocol is the proprietary network protocol (communications protocol) that offers services to macOS or the classic macOS. This is basically the network file control protocol specifically designed for Mac-based platforms.
  • Lightweight Presentation Protocol (LPP): Lightweight Presentation Protocol is that protocol which is used to provide ISO presentation services on the top of TCP/IP based protocol stacks.
  • NetWare Core Protocol (NCP): NetWare Core Protocol is the network protocol which is used to access file, print, directory, clock synchronization, messaging, remote command execution and other network service functions.
  • Network Data Representation (NDR): Network Data Representation is basically the implementation of the presentation layer in the OSI model, which provides or defines various primitive data types, constructed data types and also several types of data representations.
  • External Data Representation (XDR): External Data Representation (XDR) is the standard for the description and encoding of data. It is useful for transferring data between computer architectures and has been used to communicate data between very diverse machines. Converting from local representation to XDR is called encoding, whereas converting XDR into local representation is called decoding.
  • Secure Socket Layer (SSL): The Secure Socket Layer protocol provides security to the data that is being transferred between the web browser and the server. SSL encrypts the link between a web server and a browser, which ensures that all data passed between them remains private and free from attacks.

author

Please Login to comment...

Similar reads, improve your coding skills with practice.

 alt=

What kind of Experience do you want to share?

  Layer 6 Presentation Layer

De/Encryption, Encoding, String representation

The presentation layer (data presentation layer, data provision level) sets the system-dependent representation of the data (for example, ASCII, EBCDIC) into an independent form, enabling the syntactically correct data exchange between different systems. Also, functions such as data compression and encryption are guaranteed that data to be sent by the application layer of a system that can be read by the application layer of another system to the layer 6. The presentation layer. If necessary, the presentation layer acts as a translator between different data formats, by making an understandable for both systems data format, the ASN.1 (Abstract Syntax Notation One) used.

OSI Layer 6 - Presentation Layer

The presentation layer is responsible for the delivery and formatting of information to the application layer for further processing or display. It relieves the application layer of concern regarding syntactical differences in data representation within the end-user systems. An example of a presentation service would be the conversion of an EBCDIC-coded text computer file to an ASCII-coded file. The presentation layer is the lowest layer at which application programmers consider data structure and presentation, instead of simply sending data in the form of datagrams or packets between hosts. This layer deals with issues of string representation - whether they use the Pascal method (an integer length field followed by the specified amount of bytes) or the C/C++ method (null-terminated strings, e.g. "thisisastring\0"). The idea is that the application layer should be able to point at the data to be moved, and the presentation layer will deal with the rest. Serialization of complex data structures into flat byte-strings (using mechanisms such as TLV or XML) can be thought of as the key functionality of the presentation layer. Encryption is typically done at this level too, although it can be done on the application, session, transport, or network layers, each having its own advantages and disadvantages. Decryption is also handled at the presentation layer. For example, when logging on to bank account sites the presentation layer will decrypt the data as it is received.[1] Another example is representing structure, which is normally standardized at this level, often by using XML. As well as simple pieces of data, like strings, more complicated things are standardized in this layer. Two common examples are 'objects' in object-oriented programming, and the exact way that streaming video is transmitted. In many widely used applications and protocols, no distinction is made between the presentation and application layers. For example, HyperText Transfer Protocol (HTTP), generally regarded as an application-layer protocol, has presentation-layer aspects such as the ability to identify character encoding for proper conversion, which is then done in the application layer. Within the service layering semantics of the OSI network architecture, the presentation layer responds to service requests from the application layer and issues service requests to the session layer. In the OSI model: the presentation layer ensures the information that the application layer of one system sends out is readable by the application layer of another system. For example, a PC program communicates with another computer, one using extended binary coded decimal interchange code (EBCDIC) and the other using ASCII to represent the same characters. If necessary, the presentation layer might be able to translate between multiple data formats by using a common format. Wikipedia
  • Data conversion
  • Character code translation
  • Compression
  • Encryption and Decryption

The Presentation OSI Layer is usually composed of 2 sublayers that are:

CASE common application service element

ACSEAssociation Control Service Element
ROSERemote Operation Service Element
CCRCommitment Concurrency and Recovery
RTSEReliable Transfer Service Element

SASE specific application service element

FTAMFile Transfer, Access and Manager
VTVirtual Terminal
MOTISMessage Oriented Text Interchange Standard
CMIPCommon Management Information Protocol
JTMJob Transfer and Manipulation
MMSManufacturing Messaging Service
RDARemote Database Access
DTPDistributed Transaction Processing

Layer 7   Application Layer

Layer 6   presentation layer, layer 5   session layer, layer 4   transport layer, layer 3   network layer, layer 2   data link layer, layer 1   physical layer.

The OSI Model – The 7 Layers of Networking Explained in Plain English

Chloe Tucker

This article explains the Open Systems Interconnection (OSI) model and the 7 layers of networking, in plain English.

The OSI model is a conceptual framework that is used to describe how a network functions. In plain English, the OSI model helped standardize the way computer systems send information to each other.

Learning networking is a bit like learning a language - there are lots of standards and then some exceptions. Therefore, it’s important to really understand that the OSI model is not a set of rules. It is a tool for understanding how networks function.

Once you learn the OSI model, you will be able to further understand and appreciate this glorious entity we call the Internet, as well as be able to troubleshoot networking issues with greater fluency and ease.

All hail the Internet!

Prerequisites

You don’t need any prior programming or networking experience to understand this article. However, you will need:

  • Basic familiarity with common networking terms (explained below)
  • A curiosity about how things work :)

Learning Objectives

Over the course of this article, you will learn:

  • What the OSI model is
  • The purpose of each of the 7 layers
  • The problems that can happen at each of the 7 layers
  • The difference between TCP/IP model and the OSI model

Common Networking Terms

Here are some common networking terms that you should be familiar with to get the most out of this article. I’ll use these terms when I talk about OSI layers next.

A node is a physical electronic device hooked up to a network, for example a computer, printer, router, and so on. If set up properly, a node is capable of sending and/or receiving information over a network.

Nodes may be set up adjacent to one other, wherein Node A can connect directly to Node B, or there may be an intermediate node, like a switch or a router, set up between Node A and Node B.

Typically, routers connect networks to the Internet and switches operate within a network to facilitate intra-network communication. Learn more about hub vs. switch vs. router.

Here's an example:

1-Router-Image

For the nitpicky among us (yep, I see you), host is another term that you will encounter in networking. I will define a host as a type of node that requires an IP address. All hosts are nodes, but not all nodes are hosts. Please Tweet angrily at me if you disagree.

Links connect nodes on a network. Links can be wired, like Ethernet, or cable-free, like WiFi.

Links to can either be point-to-point, where Node A is connected to Node B, or multipoint, where Node A is connected to Node B and Node C.

When we’re talking about information being transmitted, this may also be described as a one-to-one vs. a one-to-many relationship.

A protocol is a mutually agreed upon set of rules that allows two nodes on a network to exchange data.

“A protocol defines the rules governing the syntax (what can be communicated), semantics (how it can be communicated), and synchronization (when and at what speed it can be communicated) of the communications procedure. Protocols can be implemented on hardware, software, or a combination of both. Protocols can be created by anyone, but the most widely adopted protocols are based on standards.” - The Illustrated Network.

Both wired and cable-free links can have protocols.

While anyone can create a protocol, the most widely adopted protocols are often based on standards published by Internet organizations such as the Internet Engineering Task Force (IETF).

A network is a general term for a group of computers, printers, or any other device that wants to share data.

Network types include LAN, HAN, CAN, MAN, WAN, BAN, or VPN. Think I’m just randomly rhyming things with the word can ? I can ’t say I am - these are all real network types. Learn more here .

Topology describes how nodes and links fit together in a network configuration, often depicted in a diagram. Here are some common network topology types:

What is Network Topology? Best Guides to Types & Diagrams - DNSstuff

A network consists of nodes, links between nodes, and protocols that govern data transmission between nodes.

At whatever scale and complexity networks get to, you will understand what’s happening in all computer networks by learning the OSI model and 7 layers of networking.

What is the OSI Model?

The OSI model consists of 7 layers of networking.

First, what’s a layer?

Cave, Dragon's Lair, mountains

No, a layer - not a lair . Here there are no dragons.

A layer is a way of categorizing and grouping functionality and behavior on and of a network.

In the OSI model, layers are organized from the most tangible and most physical, to less tangible and less physical but closer to the end user.

Each layer abstracts lower level functionality away until by the time you get to the highest layer. All the details and inner workings of all the other layers are hidden from the end user.

How to remember all the names of the layers? Easy.

  • Please | Physical Layer
  • Do | Data Link Layer
  • Not | Network Layer
  • Tell (the) | Transport Layer
  • Secret | Session Layer
  • Password (to) | Presentation Layer
  • Anyone | Application Layer

Keep in mind that while certain technologies, like protocols, may logically “belong to” one layer more than another, not all technologies fit neatly into a single layer in the OSI model. For example, Ethernet, 802.11 (Wifi) and the Address Resolution Protocol (ARP) procedure operate on >1 layer.

The OSI is a model and a tool, not a set of rules.

OSI Layer 1

Layer 1 is the physical layer . There’s a lot of technology in Layer 1 - everything from physical network devices, cabling, to how the cables hook up to the devices. Plus if we don’t need cables, what the signal type and transmission methods are (for example, wireless broadband).

Instead of listing every type of technology in Layer 1, I’ve created broader categories for these technologies. I encourage readers to learn more about each of these categories:

  • Nodes (devices) and networking hardware components. Devices include hubs, repeaters, routers, computers, printers, and so on. Hardware components that live inside of these devices include antennas, amplifiers, Network Interface Cards (NICs), and more.
  • Device interface mechanics. How and where does a cable connect to a device (cable connector and device socket)? What is the size and shape of the connector, and how many pins does it have? What dictates when a pin is active or inactive?
  • Functional and procedural logic. What is the function of each pin in the connector - send or receive? What procedural logic dictates the sequence of events so a node can start to communicate with another node on Layer 2?
  • Cabling protocols and specifications. Ethernet (CAT), USB, Digital Subscriber Line (DSL) , and more. Specifications include maximum cable length, modulation techniques, radio specifications, line coding, and bits synchronization (more on that below).
  • Cable types. Options include shielded or unshielded twisted pair, untwisted pair, coaxial and so on. Learn more about cable types here .
  • Signal type. Baseband is a single bit stream at a time, like a railway track - one-way only. Broadband consists of multiple bit streams at the same time, like a bi-directional highway.
  • Signal transmission method (may be wired or cable-free). Options include electrical (Ethernet), light (optical networks, fiber optics), radio waves (802.11 WiFi, a/b/g/n/ac/ax variants or Bluetooth). If cable-free, then also consider frequency: 2.5 GHz vs. 5 GHz. If it’s cabled, consider voltage. If cabled and Ethernet, also consider networking standards like 100BASE-T and related standards.

The data unit on Layer 1 is the bit.

A bit the smallest unit of transmittable digital information. Bits are binary, so either a 0 or a 1. Bytes, consisting of 8 bits, are used to represent single characters, like a letter, numeral, or symbol.

Bits are sent to and from hardware devices in accordance with the supported data rate (transmission rate, in number of bits per second or millisecond) and are synchronized so the number of bits sent and received per unit of time remains consistent (this is called bit synchronization). The way bits are transmitted depends on the signal transmission method.

Nodes can send, receive, or send and receive bits. If they can only do one, then the node uses a simplex mode. If they can do both, then the node uses a duplex mode. If a node can send and receive at the same time, it’s full-duplex – if not, it’s just half-duplex.

The original Ethernet was half-duplex. Full-duplex Ethernet is an option now, given the right equipment.

How to Troubleshoot OSI Layer 1 Problems

Here are some Layer 1 problems to watch out for:

  • Defunct cables, for example damaged wires or broken connectors
  • Broken hardware network devices, for example damaged circuits
  • Stuff being unplugged (...we’ve all been there)

If there are issues in Layer 1, anything beyond Layer 1 will not function properly.

Layer 1 contains the infrastructure that makes communication on networks possible.

It defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating physical links between network devices. - Source

Fun fact: deep-sea communications cables transmit data around the world. This map will blow your mind: https://www.submarinecablemap.com/

And because you made it this far, here’s a koala:

Closeup of a Koala

OSI Layer 2

Layer 2 is the data link layer . Layer 2 defines how data is formatted for transmission, how much data can flow between nodes, for how long, and what to do when errors are detected in this flow.

In more official tech terms:

  • Line discipline. Who should talk for how long? How long should nodes be able to transit information for?
  • Flow control. How much data should be transmitted?
  • Error control - detection and correction . All data transmission methods have potential for errors, from electrical spikes to dirty connectors. Once Layer 2 technologies tell network administrators about an issue on Layer 2 or Layer 1, the system administrator can correct for those errors on subsequent layers. Layer 2 is mostly concerned with error detection, not error correction. ( Source )

There are two distinct sublayers within Layer 2:

  • Media Access Control (MAC): the MAC sublayer handles the assignment of a hardware identification number, called a MAC address, that uniquely identifies each device on a network. No two devices should have the same MAC address. The MAC address is assigned at the point of manufacturing. It is automatically recognized by most networks. MAC addresses live on Network Interface Cards (NICs). Switches keep track of all MAC addresses on a network. Learn more about MAC addresses on PC Mag and in this article . Learn more about network switches here .
  • Logical Link Control (LLC): the LLC sublayer handles framing addressing and flow control. The speed depends on the link between nodes, for example Ethernet or Wifi.

The data unit on Layer 2 is a frame .

Each frame contains a frame header, body, and a frame trailer:

  • Header: typically includes MAC addresses for the source and destination nodes.
  • Body: consists of the bits being transmitted.
  • Trailer: includes error detection information. When errors are detected, and depending on the implementation or configuration of a network or protocol, frames may be discarded or the error may be reported up to higher layers for further error correction. Examples of error detection mechanisms: Cyclic Redundancy Check (CRC) and Frame Check Sequence (FCS). Learn more about error detection techniques here .

Example of frames, the network layer, and the physical layer

Typically there is a maximum frame size limit, called an Maximum Transmission Unit, MTU. Jumbo frames exceed the standard MTU, learn more about jumbo frames here .

How to Troubleshoot OSI Layer 2 Problems

Here are some Layer 2 problems to watch out for:

  • All the problems that can occur on Layer 1
  • Unsuccessful connections (sessions) between two nodes
  • Sessions that are successfully established but intermittently fail
  • Frame collisions

The Data Link Layer allows nodes to communicate with each other within a local area network. The foundations of line discipline, flow control, and error control are established in this layer.

OSI Layer 3

Layer 3 is the network layer . This is where we send information between and across networks through the use of routers. Instead of just node-to-node communication, we can now do network-to-network communication.

Routers are the workhorse of Layer 3 - we couldn’t have Layer 3 without them. They move data packets across multiple networks.

Not only do they connect to Internet Service Providers (ISPs) to provide access to the Internet, they also keep track of what’s on its network (remember that switches keep track of all MAC addresses on a network), what other networks it’s connected to, and the different paths for routing data packets across these networks.

Routers store all of this addressing and routing information in routing tables.

Here’s a simple example of a routing table:

A routing table showing the destination, subnet mask, and interface

The data unit on Layer 3 is the data packet . Typically, each data packet contains a frame plus an IP address information wrapper. In other words, frames are encapsulated by Layer 3 addressing information.

The data being transmitted in a packet is also sometimes called the payload . While each packet has everything it needs to get to its destination, whether or not it makes it there is another story.

Layer 3 transmissions are connectionless, or best effort - they don't do anything but send the traffic where it’s supposed to go. More on data transport protocols on Layer 4.

Once a node is connected to the Internet, it is assigned an Internet Protocol (IP) address, which looks either like 172.16. 254.1 (IPv4 address convention) or like 2001:0db8:85a3:0000:0000:8a2e:0370:7334 (IPv6 address convention). Routers use IP addresses in their routing tables.

IP addresses are associated with the physical node’s MAC address via the Address Resolution Protocol (ARP), which resolves MAC addresses with the node’s corresponding IP address.

ARP is conventionally considered part of Layer 2, but since IP addresses don’t exist until Layer 3, it’s also part of Layer 3.

How to Troubleshoot OSI Layer 3 Problems

Here are some Layer 3 problems to watch out for:

  • All the problems that can crop up on previous layers :)
  • Faulty or non-functional router or other node
  • IP address is incorrectly configured

Many answers to Layer 3 questions will require the use of command-line tools like ping , trace , show ip route , or show ip protocols . Learn more about troubleshooting on layer 1-3 here .

The Network Layer allows nodes to connect to the Internet and send information across different networks.

OSI Layer 4

Layer 4 is the transport layer . This where we dive into the nitty gritty specifics of the connection between two nodes and how information is transmitted between them. It builds on the functions of Layer 2 - line discipline, flow control, and error control.

This layer is also responsible for data packet segmentation, or how data packets are broken up and sent over the network.

Unlike the previous layer, Layer 4 also has an understanding of the whole message, not just the contents of each individual data packet. With this understanding, Layer 4 is able to manage network congestion by not sending all the packets at once.

The data units of Layer 4 go by a few names. For TCP, the data unit is a packet. For UDP, a packet is referred to as a datagram. I’ll just use the term data packet here for the sake of simplicity.

Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are two of the most well-known protocols in Layer 4.

TCP, a connection-oriented protocol, prioritizes data quality over speed.

TCP explicitly establishes a connection with the destination node and requires a handshake between the source and destination nodes when data is transmitted. The handshake confirms that data was received. If the destination node does not receive all of the data, TCP will ask for a retry.

TCP also ensures that packets are delivered or reassembled in the correct order. Learn more about TCP here .

UDP, a connectionless protocol, prioritizes speed over data quality. UDP does not require a handshake, which is why it’s called connectionless.

Because UDP doesn’t have to wait for this acknowledgement, it can send data at a faster rate, but not all of the data may be successfully transmitted and we’d never know.

If information is split up into multiple datagrams, unless those datagrams contain a sequence number, UDP does not ensure that packets are reassembled in the correct order. Learn more about UDP here .

TCP and UDP both send data to specific ports on a network device, which has an IP address. The combination of the IP address and the port number is called a socket.

Learn more about sockets here .

Learn more about the differences and similarities between these two protocols here .

How to Troubleshoot OSI Layer 4 Problems

Here are some Layer 4 problems to watch out for:

  • Blocked ports - check your Access Control Lists (ACL) & firewalls
  • Quality of Service (QoS) settings. QoS is a feature of routers/switches that can prioritize traffic, and they can really muck things up. Learn more about QoS here .

The Transport Layer provides end-to-end transmission of a message by segmenting a message into multiple data packets; the layer supports connection-oriented and connectionless communication.

OSI Layer 5

Layer 5 is the session layer . This layer establishes, maintains, and terminates sessions.

A session is a mutually agreed upon connection that is established between two network applications. Not two nodes! Nope, we’ve moved on from nodes. They were so Layer 4.

Just kidding, we still have nodes, but Layer 5 doesn’t need to retain the concept of a node because that’s been abstracted out (taken care of) by previous layers.

So a session is a connection that is established between two specific end-user applications. There are two important concepts to consider here:

  • Client and server model: the application requesting the information is called the client, and the application that has the requested information is called the server.
  • Request and response model: while a session is being established and during a session, there is a constant back-and-forth of requests for information and responses containing that information or “hey, I don’t have what you’re requesting.”

Sessions may be open for a very short amount of time or a long amount of time. They may fail sometimes, too.

Depending on the protocol in question, various failure resolution processes may kick in. Depending on the applications/protocols/hardware in use, sessions may support simplex, half-duplex, or full-duplex modes.

Examples of protocols on Layer 5 include Network Basic Input Output System (NetBIOS) and Remote Procedure Call Protocol (RPC), and many others.

From here on out (layer 5 and up), networks are focused on ways of making connections to end-user applications and displaying data to the user.

How to Troubleshoot OSI Layer 5 Problems

Here are some Layer 5 problems to watch out for:

  • Servers are unavailable
  • Servers are incorrectly configured, for example Apache or PHP configs
  • Session failure - disconnect, timeout, and so on.

The Session Layer initiates, maintains, and terminates connections between two end-user applications. It responds to requests from the presentation layer and issues requests to the transport layer.

OSI Layer 6

Layer 6 is the presentation layer . This layer is responsible for data formatting, such as character encoding and conversions, and data encryption.

The operating system that hosts the end-user application is typically involved in Layer 6 processes. This functionality is not always implemented in a network protocol.

Layer 6 makes sure that end-user applications operating on Layer 7 can successfully consume data and, of course, eventually display it.

There are three data formatting methods to be aware of:

  • American Standard Code for Information Interchange (ASCII): this 7-bit encoding technique is the most widely used standard for character encoding. One superset is ISO-8859-1, which provides most of the characters necessary for languages spoken in Western Europe.
  • Extended Binary-Coded Decimal Interchange Code (EBDCIC): designed by IBM for mainframe usage. This encoding is incompatible with other character encoding methods.
  • Unicode: character encodings can be done with 32-, 16-, or 8-bit characters and attempts to accommodate every known, written alphabet.

Learn more about character encoding methods in this article , and also here .

Encryption: SSL or TLS encryption protocols live on Layer 6. These encryption protocols help ensure that transmitted data is less vulnerable to malicious actors by providing authentication and data encryption for nodes operating on a network. TLS is the successor to SSL.

How to Troubleshoot OSI Layer 6 Problems

Here are some Layer 6 problems to watch out for:

  • Non-existent or corrupted drivers
  • Incorrect OS user access level

The Presentation Layer formats and encrypts data.

OSI Layer 7

Layer 7 is the application layer .

True to its name, this is the layer that is ultimately responsible for supporting services used by end-user applications. Applications include software programs that are installed on the operating system, like Internet browsers (for example, Firefox) or word processing programs (for example, Microsoft Word).

Applications can perform specialized network functions under the hood and require specialized services that fall under the umbrella of Layer 7.

Electronic mail programs, for example, are specifically created to run over a network and utilize networking functionality, such as email protocols, which fall under Layer 7.

Applications will also control end-user interaction, such as security checks (for example, MFA), identification of two participants, initiation of an exchange of information, and so on.

Protocols that operate on this level include File Transfer Protocol (FTP), Secure Shell (SSH), Simple Mail Transfer Protocol (SMTP), Internet Message Access Protocol (IMAP), Domain Name Service (DNS), and Hypertext Transfer Protocol (HTTP).

While each of these protocols serve different functions and operate differently, on a high level they all facilitate the communication of information. ( Source )

How to Troubleshoot OSI Layer 7 Problems

Here are some Layer 7 problems to watch out for:

  • All issues on previous layers
  • Incorrectly configured software applications
  • User error (... we’ve all been there)

The Application Layer owns the services and functions that end-user applications need to work. It does not include the applications themselves.

Our Layer 1 koala is all grown up.

Koala with Photoshopped makeup

Learning check - can you apply makeup to a koala?

Don’t have a koala?

Well - answer these questions instead. It’s the next best thing, I promise.

  • What is the OSI model?
  • What are each of the layers?
  • How could I use this information to troubleshoot networking issues?

Congratulations - you’ve taken one step farther to understanding the glorious entity we call the Internet.

Learning Resources

Many, very smart people have written entire books about the OSI model or entire books about specific layers. I encourage readers to check out any O’Reilly-published books about the subject or about network engineering in general.

Here are some resources I used when writing this article:

  • The Illustrated Network, 2nd Edition
  • Protocol Data Unit (PDU): https://www.geeksforgeeks.org/difference-between-segments-packets-and-frames/
  • Troubleshooting Along the OSI Model: https://www.pearsonitcertification.com/articles/article.aspx?p=1730891
  • The OSI Model Demystified: https://www.youtube.com/watch?v=HEEnLZV2wGI
  • OSI Model for Dummies: https://www.dummies.com/programming/networking/layers-in-the-osi-model-of-a-computer-network/

Chloe Tucker is an artist and computer science enthusiast based in Portland, Oregon. As a former educator, she's continuously searching for the intersection of learning and teaching, or technology and art. Reach out to her on Twitter @_chloetucker and check out her website at chloe.dev .

Read more posts .

If you read this far, thank the author to show them you care. Say Thanks

Learn to code for free. freeCodeCamp's open source curriculum has helped more than 40,000 people get jobs as developers. Get started

Network Encyclopedia Logo

Presentation Layer

Last Edited

What is the Presentation Layer?

Presentation Layer is the Layer 6 of the seven-layer Open Systems Interconnection (OSI) reference model . The presentation layer structures data that is passed down from the application layer into a format suitable for network transmission. This layer is responsible for data encryption, data compression, character set conversion, interpretation of graphics commands, and so on. The network redirector also functions at this layer.

Presentation Layer

Presentation Layer functions

  • Translation:  Before being transmitted, information in the form of characters and numbers should be changed to bit streams. Layer 6 is responsible for interoperability between encoding methods as different computers use different encoding methods. It translates data between the formats the network requires and the format the computer.
  • Encryption:  Encryption at the transmitter and decryption at the receiver
  • Compression:  Data compression to reduce the bandwidth of the data to be transmitted. The primary role of  data compression  is to reduce the number of bits to be transmitted. Multimedia files, such as audio and video, are bigger than text files and compression is more important.

Role of Presentation Layer in the OSI Model

This layer is not always used in network communications because its functions are not always necessary. Translation is only needed if different types of machines need to talk with each other. Encryption is optional in communication. If the information is public there is no need to encrypt and decrypt info. Compression is also optional. If files are small there is no need for compression.

Explaining Layer 6 in video

Most real-world protocol suites, such as TCP/IP , do not use separate presentation layer protocols. This layer is mostly an abstraction in real-world networking.

An example of a program that loosely adheres to layer 6 of OSI is the tool that manages the Hypertext Transfer Protocol (HTTP) — although it’s technically considered an application-layer protocol per the TCP/IP model.

However, HTTP includes presentation layer services within it. HTTP works when the requesting device forwards user requests passed to the web browser onto a web server elsewhere in the network.

It receives a return message from the web server that includes a multipurpose internet mail extensions (MIME) header. The MIME header indicates the type of file – text, video, or audio – that has been received so that an appropriate player utility can be used to present the file to the user.

In short, the presentation layer

Makes sure that data which is being transferred or received should be accurate or clear to all the devices which are there, in a closed network.

  • ensures proper formatting and delivery to and from the application layer;
  • performs data encryption; and
  • manages serialization of data objects.

presentation layer where

Please Whitelist This Site? I know everyone hates ads. But please understand that I am providing premium content for free that takes hundreds of hours of time to research and write. I don't want to go to a pay-only model like some sites, but when more and more people block ads, I end up working for free. And I have a family to support, just like you. :) If you like The TCP/IP Guide, please consider the download version . It's priced very economically and you can read all of it in a convenient format without ads. If you want to use this site for free, I'd be grateful if you could add the site to the whitelist for Adblock. To do so, just open the Adblock menu and select "Disable on tcpipguide.com". Or go to the Tools menu and select "Adblock Plus Preferences...". Then click "Add Filter..." at the bottom, and add this string: "@@||tcpipguide.com^$document". Then just click OK. Thanks for your understanding! Sincerely, Charles Kozierok Author and Publisher, The TCP/IP Guide
Using software to mass-download the site .
If you want to read The TCP/IP Guide offline, . Thank you.
!

   
        

The presentation layer is the sixth layer of the OSI Reference Model protocol stack, and second from the top. It is different from the other layers in two key respects. First, it has a much more limited and specific function than the other layers; it's actually somewhat easy to describe, hurray! Second, it is used much less often than the other layers; in many types of connections it is not required.

The name of this layer suggests its main function as well: it deals with the presentation of data. More specifically, the presentation layer is charged with taking care of any issues that might arise where data sent from one system needs to be viewed in a different way by the other system. It also takes care of any special processing that must be done to data from the time an application tries to send it until the time it is sent over the network.

Here are some of the specific types of data handling issues that the presentation layer handles:

The reason that the presentation layer is not always used in network communications is that the jobs mentioned above are simply not always needed. Compression and encryption are usually considered “optional”, and translation features are also only needed in certain circumstances. Another reason why the presentation layer is sometimes not mentioned is that its functions may be performed as part of the application layer.

The fact that the translation job done by the presentation layer isn't always needed means that it is common for it to be “skipped” by actual protocol stack implementations. This means that protocols at layer seven may talk directly with those at layer five. Once again, this is part of the reason why all of the functions of layers five through seven may be included together in the same software package, as described in the overview of layers and layer groupings .

The sixth OSI model layer is called the . Protocols at this layer take care of manipulation tasks that transform data from one representation to another, such as translation, compression and encryption. In many cases, no such functions are required in a particular networking stack; if so, there may not be any protocol active at layer six.

. Thanks for your support!

How-To Geek

The 7 osi networking layers explained.

The Open Systems Interconnection (OSI) networking model defines a conceptual framework for communications between computer systems.

Quick Links

  • Physical Layer
  • Data Link Layer
  • Network Layer
  • Transport Layer
  • Session Layer
  • Presentation Layer
  • Application Layer

The Open Systems Interconnection (OSI) networking model defines a conceptual framework for communications between computer systems. The model is an ISO standard which identifies seven fundamental networking layers, from the physical hardware up to high-level software applications.

Each layer in the model handles a specific networking function. The standard helps administrators to visualize networks, isolate problems, and understand the use cases for new technologies. Many network equipment vendors advertise the OSI layer that their products are designed to slot into.

OSI was adopted as an international standard in 1984. It remains relevant today despite the changes to network implementation that have occurred since first publication. Cloud, edge, and IoT can all be accommodated within the model.

Diagram showing the 7 OSI networking layers

In this article, we'll explain each of the seven OSI layers in turn. We'll start from the lowest level, labelled as Layer 1.

1. Physical Layer

All networking begins with physical equipment. This layer encapsulates the hardware involved in the communications, such as switches and cables. Data is transferred as a stream of binary digits - 0 or 1 - that the hardware prepares from input it's been fed. The physical layer specifies the electrical signals that are used to encode the data over the wire, such as a 5-volt pulse to indicate a binary "1."

Errors in the physical layer tend to result in data not being transferred at all. There could be a break in the connection due to a missing plug or incorrect power supply. Problems can also arise when two components disagree on the physical encoding of data values. In the case of wireless connections, a weak signal can lead to bit loss during transmission.

2. Data Link Layer

The model's second layer concerns communication between two devices that are directly connected to each other in the same network. It's responsible for establishing a link that allows data to be exchanged using an agreed protocol. Many network switches operate at Layer 2.

The data link layer will eventually pass bits to the physical layer. As it sits above the hardware, the data link layer can perform basic error detection and correction in response to physical transfer issues. There are two sub-layers that define these responsibilities: Logical Link Control (LLC) that handles frame synchronization and error detection, and Media Access Control (MAC) which uses MAC addresses to constrain how devices acquire permission to transfer data.

3. Network Layer

The network layer is the first level to support data transfer between two separately maintained networks. It's redundant in situations where all your devices exist on the same network.

Data that comes to the network layer from higher levels is first broken up into packets suitable for transmission. Packets received from the remote network in response are reassembled into usable data.

The network layer is where several important protocols are first encountered. These include IP (for determining the path to a destination), ICMP, routing, and virtual LAN. Together these mechanisms facilitate inter-network communications with a familiar degree of usability. However operations at this level aren't necessarily reliable: messages aren't required to succeed and may not necessarily be retried.

4. Transport Layer

The transport layer provides higher-level abstractions for coordinating data transfers between devices. Transport controllers determine where data will be sent and the rate it should be transferred at.

Layer 4 is where TCP and UDP are implemented, providing the port numbers that allow devices to expose multiple communication channels. Load balancing is often situated at Layer 4 as a result, allowing traffic to be routed between ports on a target device.

Transport mechanisms are expected to guarantee successful communication. Stringent error controls are applied to recover from packet loss and retry failed transfers. Flow control is enforced so the sender doesn't overwhelm the remote device by sending data more quickly than the available bandwidth permits.

5. Session Layer

Layer 5 creates ongoing communication sessions between two devices. Sessions are used to negotiate new connections, agree on their duration, and gracefully close down the connection once the data exchange is complete. This layer ensures that sessions remain open long enough to transfer all the data that's being sent.

Checkpoint control is another responsibility that's held by Layer 5. Sessions can define checkpoints to facilitate progress updates and resumable transmissions. A new checkpoint could be set every few megabytes for a file upload, allowing the sender to continue from a particular point if the transfer gets interrupted.

Many significant protocols operate at Layer 5 including authentication and logon technologies such as LDAP and NetBIOS. These establish semi-permanent communication channels for managing an end user session on a specific device.

6. Presentation Layer

The presentation layer handles preparation of data for the application layer that comes next in the model. After data has made it up from the hardware, through the data link, and across the transport, it's almost ready to be consumed by high-level components. The presentation layer completes the process by performing any formatting tasks that may be required.

Decryption, decoding, and decompression are three common operations found at this level. The presentation layer processes received data into formats that can be eventually utilized by a client application. Similarly, outward-bound data is reformatted into compressed and encrypted structures that are suitable for network transmission.

TLS is one major technology that's part of the presentation layer. Certificate verification and data decryption is handled before requests reach the network client, allowing information to be consumed with confidence that it's authentic.

7. Application Layer

The application layer is the top of the stack. It represents the functionality that's perceived by network end users. Applications in the OSI model provide a convenient end-to-end interface to facilitate complete data transfers, without making you think about hardware, data links, sessions, and compression.

Despite its name, this layer doesn't relate to client-side software such as your web browser or email client. An application in OSI terms is a protocol that caters for the complete communication of complex data through layers 1-6.

HTTP, FTP, DHCP, DNS, and SSH all exist at the application layer. These are high-level mechanisms which permit direct transfers of user data between an origin device and a remote server. You only need minimal knowledge of the workings of the other layers.

The seven OSI layers describe the transfer of data through computer networks. Understanding the functions and responsibilities of each layer can help you identify the source of problems and assess the intended use case for new components.

OSI is an abstract model that doesn't directly map to the specific networking implementations commonly used today. As an example, the TCP/IP protocol works on its own simpler system of four layers: Network Access, Internet, Transport, and Application. These abstract and absorb the equivalent OSI layers: the application layer spans OSI L5 to L7, while L1 and L2 are combined in TCP/IP's concept of Network Access.

OSI remains applicable despite its lack of direct real-world application. It's been around so long that it's widely understood among administrators from all backgrounds. Its relatively high level of abstraction has also ensured it's remained relevant in the face of new networking paradigms, many of which have targeted Layer 3 and above. An awareness of the seven layers and their responsibilities can still help you appreciate the flow of data through a network while uncovering integration opportunities for new components.

Presentation Layer of the OSI Model | Protocols & Functions

Claudett Minott has been a teacher for over 30 years. She started teaching after receiving a Bachelor's degree in Education. She has worked with remedial students in Science and Math. She has expertise in lesson planning and curriculum writing.

Kent is an adjunct faculty member for the College of Business at Embry-Riddle Aeronautical University and has a Master's degree in Technical Management.

Table of Contents

Osi model: overview, presentation layer in osi model, presentation layer protocols, presentation layer functions, lesson summary, what protocols are used in the presentation layer.

The presentation layer is known as a translator because it converts data from a complex format into one that the application layer understands. Presentation layer protocols include MIDI, MPEG, TDI, TLS, XDR, and HTTP/ HTML.

What is the main purpose of presentation layer?

Then main purpose of the presentation layer of the OSI model is to translate data into an acceptable format usable by the application layer. This enables secure, unambiguous transfer of data across the network.

What are the three functions of the presentation layer?

The three main functions of the presentation layer are data encryption and decryption, data translation, and data compression. These functions allow the data to be compatible, acceptable, and secure.

What is the presentation layer?

The presentation layer of the OSI model is responsible for translating, encrypting, and compressing data within the model. It is responsible for integrating all data formats into acceptable and compatible formats.

The Open Systems Interconnection (OSI) model is a conceptual framework that defines network communications. It was created by the International Organization for Standardization (ISO) in the late 1970s and adopted by the main telecommunication companies by the 1980s. The ISO is an international organization that works to systematize different products, systems, and services across member countries to ensure that quality and safety are maintained. The OSI model describes the functions of a networking system based on an overarching set of rules that encourages seamless interconnections between different software and products. The OSI model has seven layers:

  • Physical layer: First and lowest layer of the OSI model. It is used for data transmission and defines the physical connection between the sending and receiving devices, providing security for the hardware.
  • Data Link layer: This second layer facilitates data transfer between nodes on the network. It ensures that the data is transferred without errors.
  • Network layer: Third layer that routes information to their destination node based on logical network addresses.
  • Transport layer: The fourth layer is responsible for managing the size and sequence of data so that it may effectively flow across the network.
  • Session layer: Fifth layer which controls the connections between computers.
  • Presentation layer: The OSI presentation layer is the sixth layer and translates data across the network.
  • Application layer: Topmost seventh layer which stipulates the interface methods for the application process.

Layers of the OSI model

To unlock this lesson you must be a Study.com Member. Create your account

presentation layer where

An error occurred trying to load this video.

Try refreshing the page, or contact customer support.

You must c C reate an account to continue watching

Register to view this lesson.

As a member, you'll also get unlimited access to over 88,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Get unlimited access to over 88,000 lessons.

Already registered? Log in here for access

Resources created by teachers for teachers.

I would definitely recommend Study.com to my colleagues. It’s like a teacher waved a magic wand and did the work for me. I feel like it’s a lifeline.

You're on a roll. Keep up the good work!

Just checking in. are you still watching.

  • 0:00 What Is the…
  • 0:39 The OSI Model
  • 1:58 Roles, Functions & Protocols
  • 4:49 Sublayers in the…
  • 5:18 Responsibilities of…
  • 5:53 Lesson Summary

The presentation layer in OSI model is also known as the translation layer. The OSI presentation layer receives data which it then translates and formats so that data representation in the application layer and across the system is acceptable and compatible. For example, if there are differences in syntax within the data that may cause a problem with the end-user system, the presentation layer reconciles these differences. The presentation layer is a very important layer because it handles encryption, decryption, and the conversion of complex data into flat-byte strings, a format that is easily transmittable. The two primary networking features managed by the presentation layer of the OSI model are protocols and architecture.

Sub-layers in Presentation Layer

The presentation layer is composed of two sub-layers: Common Application Service Element (CASE) and Specific Application Service Element (SASE) . The CASE sub-layer offers application services in the application layer and requests services from the session layer. The SASE sub-layer provides services that are more application specific. Database access, transaction processing, order entry, and file transfer are a few of these specific services.

The set of rules that were established by the ISO and used to govern different aspects of the OSI are called protocols. Physical connections, and data formats, for example, are standard across the system. Each layer in the OSI is governed by its own protocols which are determined by a network's architecture. The presentation layer is known as a translator because it converts data from a complex format into one that the application layer understands. Presentation layer protocols include MIDI, MPEG, TDI, TLS, XDR, and HTTP/ HTML. The HTTP and HTML protocols determine how information on the world wide web is transmitted and the format in which web pages are displayed respectively.

The presentation layer in the OSI model has five main functions within the frame of presentation layer protocols.

Character Code Translation

A character code is a representation of text using a defined coding system. Character code translation is the function of the presentation layer that translates the American standard code for information interchange ( ASCII ) to the extended binary code decimal interchange code (EBCDIC). The ASCII is a character-encoding system that designates a specific code to each letter, digit, punctuation mark, and symbol used in texts. For example, the letter C in standard text is designated 67 in ASCII. The EBCDIC, on the other hand, employs an eight-bit binary code for each of these characters.

Data Conversion

The presentation layer of the OSI also functions in data conversion through bit order reversals. It converts integers to floating point numbers, and byte code for a carriage return (CR) to byte code for a carriage return with a line feed (CR/LF). Carriage return is a character used to move the cursor to the start of a line while line feed moves the cursor downward without moving it to the start of the next line.

Data Compression

To reduce the bandwidth or the amount of data that is transferred between points on a network, the presentation layer compresses it. Certain file types, such as videos, are typically larger than others and compression can be important in transmitting them.

Data Encryption and Decryption

Data encryption is the conversion of data from readable to unreadable formats to avoid unauthorized reading, while decryption reverts it to a readable format. Encryption and decryption are carried out by the presentation layer to secure data over the network. It ensures that only the communicating devices are able to understand pertinent data. This is done through a secure sockets layer (SSL) protocol, an internet security protocol based on encryption that ensures the privacy of information transmitted between web clients and servers.

Data Translation

The presentation layer also functions in translating information between the application and the network. It parses and fixes irregularities in the network and maintains transparency in the translation process so that different computer types, servers, and mainframes that are on the network are interoperable.

The Open Systems Interconnection (OSI) model is a conceptual framework that defines network communications. There are seven layers in the OSI model: physical, data link, network, transport, session, presentation , and application . The presentation layer of the OSI model is responsible for translating, encrypting, and compressing data within the model. It is responsible for integrating all data formats into acceptable and compatible formats.

The two primary networking features managed by the presentation layer of the OSI model are protocols and architecture. The presentation layer of the OSI model translates data into an acceptable format usable by the application layer. The presentation layer of the OSI model may have two sub-layers associated with its operation; the Common Application Service Element (CASE) and the Specific Application Service Element (SASE) .

Video Transcript

What is the presentation layer.

The last time you paid bills online, did you give any thought to the Open Systems Interconnect (OSI) model and its presentation layer? As computer-literate as you are, you may not know what the presentation layer , or data translator, has to do with paying your bills.

For example, when you accessed your bank account via the Internet, you used a secure connection provided by the presentation layer. The presentation layer also encrypted your account login information prior to transmission. Finally, at your financial institution's Internet server, the presentation layer decrypted your account login information, making it available for processing.

The OSI Model

Before we begin our discussion of the presentation layer in greater detail, let's introduce the networking environment in which the presentation layer exists: this is the Open Systems Interconnect (OSI) model, which has seven layers, and each layer performs a specific and supportive communicative task.

These seven OSI layers are in descending order (top layer to bottom layer) and each layer provides inputs and outputs to/from the neighboring layers. Let's go over briefly what each layer is called and what it does.

The Application Layer Provides access to available resources
The Presentation Layer Translates, encrypts and compresses data
The Session Layer Establishes, manages and terminates communicative sessions
The Transport Layer Provides reliable process-to-process message delivery and error recovery
The Network Layer Moves packets from source to destination by providing inter-networking capabilities
The Data Link Layer Organizes bits into frames, providing node-to-node delivery
The Physical Layer Transmits bits over a medium, establishing mechanical and electrical specifications

Roles, Functions and Protocols

As layer six of the OSI model, the presentation layer is primarily responsible for managing two networking characteristics: protocol and architecture. Whereas, protocol defines a standard set of guidelines under which the network operates, the network's architecture determines what protocol applies.

As the translator , the presentation layer converts the data sent by the application layer of the transmitting node into an acceptable and compatible data format based on the applicable network protocol and architecture. Upon arrival at the receiving computer, the presentation layer translates the data into an acceptable format usable by the application layer. In other words, the presentation layer takes care of any issues occurring when transmitted data must be viewed in a format different from the original format.

As a functional part of the OSI model, the presentation layer performs a multitude of data conversion algorithms and character translation functions. The first function is:

  • Character-Code Translation: Where the presentation layer translates from the American standard code for information interchange (ASCII) to the extended binary code decimal interchange code (EBCDIC).

The second function is:

  • Data Conversion: This is where the presentation layer performs bit order reversal functions, converts CR (byte code for a carriage return) to CR/LF, (byte code for a carriage return with a line feed) and converts integer numbers to floating point numbers.

Third, the presentation layer is responsible for:

  • Data Compression, by reducing the number of bits requiring transmission, which improves the data throughput.

The fourth function is:

  • Data Encryption and Decryption: Encryption is needed for security purposes when sending data across networks. An encryption algorithm is used during transmission, while a decryption algorithm is used at the receiving node. Encryption and decryption typically involves the secure sockets layer (SSL) protocol, which has become more popular when used by the presentation layer.

The fifth function of the presentation layer is:

  • Data Translation: Networks provide the capability of connecting different types of computers, servers and mainframes on the same network and may employ different character sets. The presentation layer is responsible for fixing any irregularities while making translations transparent between networked systems.

Other protocols supported at the presentation layer include:

  • Musical instrument digital interface (MIDI)
  • Moving picture experts group (MPEG)
  • Tabbed document interface (TDI)
  • Transport layer security (TLS)
  • External data representation (XDR)

Sublayers in the Presentation Layer

Depending on the network infrastructure and the platform being used, the presentation layer may have two sublayers associated with its operation: the common application service element (CASE) and specific application service element (SASE) . The CASE sublayer provides application layer services and makes service requests of the session layer. When needed by the application layer, SASE sublayer provides application services or protocols.

Responsibilities of the Presentation Layer

Because data can be communicated using different formats, platforms and sources, presentation layer is responsible for integrating all of the formats into an acceptable and compatible form. By doing so, the presentation layer establishes and maintains reliable, efficient and effective data exchanges between network components, such as gateways. When programming the presentation layer, programmers should pay strict attention to established programming structure schemes to ensure the data format is acceptable by layer five, which is the session layer, and layer seven, which is the application layer.

In this lesson, we introduced the Open Systems Interconnect (OSI) model, which has seven layers that each perform a specific and supportive communicative task. The seven layers covered, starting from layer seven and ending at layer one, were the application, presentation, session, transport, network, data link, and physical layers.

We also covered how data flows among the different layers. We focused on the presentation layer , which is primarily responsible for managing protocol and architecture. Protocol refers to a standard set of guidelines under which the network operates, while architecture determines what protocol applies.

Some functions of the presentation layer include character-code translation, data conversion, data encryption and decryption, and data translation.

We also covered CASE and SASE, the sub-layers used to aid the presentation layer, as well as how the presentation layer translates data into a form usable by the application layer.

Featured Key Words

  • Open Systems Interconnect (OSI) : has seven layers and each layer performs a specific and supportive communicative task
  • Presentation layer : primarily responsible for managing protocol and architecture
  • Protocol : defines a standard set of guidelines under which the network operates
  • Architecture : part of the network that determines what protocol applies
  • Translator : the presentation layer converts data sent by the application layer into an acceptable and compatible data format based on the applicable network protocol and architecture
  • Common application service element (CASE) : sublayer provides application layer services and makes service requests of the session layer
  • Specific application service element (SASE) : provides application services or protocols

Learning Outcomes

After this lesson ends, discover how prepared you are to complete these actions:

  • Communicate your understanding of the terms 'presentation layer' and 'OSI model'
  • Name each OSI layer and indicate what it does
  • Illustrate some of the protocols supported at the presentation layer
  • Highlight the sublayers and responsibilities of the presentation layer

Unlock Your Education

See for yourself why 30 million people use study.com, become a study.com member and start learning now..

Already a member? Log In

Recommended Lessons and Courses for You

Related lessons, related courses, recommended lessons for you.

Session Layer of the OSI Model: Functions, Protocols & Examples

Presentation Layer of the OSI Model | Protocols & Functions Related Study Materials

  • Related Topics

Browse by Courses

  • Economics 101: Principles of Microeconomics
  • CLEP Principles of Marketing Prep
  • Supplemental Business: Study Aid
  • CLEP Principles of Management Prep
  • Introduction to Public Speaking: Certificate Program
  • Public Speaking 101: Help and Review
  • UExcel Workplace Communications with Computers: Study Guide & Test Prep
  • CLEP Principles of Macroeconomics Prep
  • Principles of Marketing: Certificate Program
  • Business 106: Human Resource Management
  • FTCE Business Education 6-12 (051) Prep
  • Praxis Marketing Education (5561) Prep
  • Quantitative Analysis
  • Principles of Management: Certificate Program
  • Business 101: Principles of Management

Browse by Lessons

  • Census Definition, Purpose & Procedure
  • Econometrics | Definition, Method & Examples
  • Plowback Ratio | Meaning, Formula & Calculation
  • Intrinsic Value of Stocks Example & Calculation
  • World Economy | Overview, Statistics & History
  • Building Relationships in the Workplace
  • Managing Different Generations in the Workplace
  • Addressing Cultural Diversity Issues in Higher Education
  • Cultural Diversity in Criminal Justice | Issues & Problems
  • How to Be a Good Conversationalist
  • Conversationalist | Definition, Skills & Habits
  • Email Retention Law
  • Email Retention Policy: Best Practices
  • Business Intelligence: Strategy & Benefits
  • 5 C's of Marketing | Analysis, Importance & Examples

Create an account to start this course today Used by over 30 million students worldwide Create an account

Explore our library of over 88,000 lessons

  • Foreign Language
  • Social Science
  • See All College Courses
  • Common Core
  • High School
  • See All High School Courses
  • College & Career Guidance Courses
  • College Placement Exams
  • Entrance Exams
  • General Test Prep
  • K-8 Courses
  • Skills Courses
  • Teacher Certification Exams
  • See All Other Courses
  • Create a Goal
  • Create custom courses
  • Get your questions answered
  • Stack Overflow Public questions & answers
  • Stack Overflow for Teams Where developers & technologists share private knowledge with coworkers
  • Talent Build your employer brand
  • Advertising Reach developers & technologists worldwide
  • Labs The future of collective knowledge sharing
  • About the company

Collectives™ on Stack Overflow

Find centralized, trusted content and collaborate around the technologies you use most.

Q&A for work

Connect and share knowledge within a single location that is structured and easy to search.

Get early access and see previews of new features.

OSI model - What's the presentation and session layer for?

So I feel I pretty well understand the application layer, and everything below (and including) the transport layer.

The session and presentation layers, though, I don't fully understand. I've read the simplistic descriptions in Wikipedia, but it doesn't have an example of why separating out those layers is useful.

  • What is the session layer? What does it do, and under what circumstances is it better to have a session layer than simply talk to the transport with your app?
  • What is the presentation layer? (same questions as above)

Adam Davis's user avatar

7 Answers 7

The session layer is meant to store states between two connections, like what we use cookies for when working with web programming.

The presentation layer is meant to convert between different formats. This was simpler when the only format that was worried about was character encoding, ie ASCII and EBCDIC. When you consider all of the different formats that we have today(Quicktime, Flash, Pdf) centralizing this layer is out of the question.

TCP/IP doesn't make any allocation to these layers, since they are really out of the scope of a networking protocol. It's up to the applications that take advantage of the stack to implement these.

Antonio Haley's user avatar

The reasons there aren't any examples on wikipedia is that there aren't a whole lot of examples of the OSI network model, period.

OSI has once again created a standard nobody uses, so nobody really know how one should use it.

Rik's user avatar

Layers 5-6 are not commonly used in today's web applications, so you don't hear much about them. The TCP/IP stack is slightly different than a pure OSI Model.

Corey Goldberg's user avatar

One of the reasons TCP/IP is used today instead of OSI is it was too bloated and theoretical, the session and presentation layer aren't really needed as separate layers as it turned out.

Vasil's user avatar

I think that presentation layer protocols define the format of data. This means protocols like XML or ASN.1. You could argue that video/audio codecs are part of the presentation layer Although this is probably heading towards the application layer.

I can't help you with the session layer. That has always baffled me.

To be honest, there are very vague boundaries in everything above the transport layer. This is because it is usually handled by a single software application. Also, these layers are not directly associated with transporting data from A to B. Layers 4 and below each have a very specific purpose in moving the data e.g. switching, routing, ensuring data integrity etc. This makes it easier to distinguish between these layers.

David Turvey's user avatar

Presentation Layer The Presentation Layer represents the area that is independent of data representation at the application layer - in general, it represents the preparation or translation of application format to network format, or from network formatting to application format. In other words, the layer “presents” data for the application or the network. A good example of this is encryption and decryption of data for secure transmission - this happens at Layer 6.

Session Layer When two devices, computers or servers need to “speak” with one another, a session needs to be created, and this is done at the Session Layer. Functions at this layer involve setup, coordination (how long should a system wait for a response, for example) and termination between the applications at each end of the session.

Himansh's user avatar

For the presentation layer :because most of communication done between heterogeneous systems (Operating Systems,programing langages,cpu architectures)we need to use a unified idepedent specification .like ANS1 ans BRE.

ibrahim 's user avatar

Your Answer

Reminder: Answers generated by artificial intelligence tools are not allowed on Stack Overflow. Learn more

Sign up or log in

Post as a guest.

Required, but never shown

By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy .

Not the answer you're looking for? Browse other questions tagged networking model stack osi or ask your own question .

  • The Overflow Blog
  • Introducing Staging Ground: The private space to get feedback on questions...
  • How to prevent your new chatbot from giving away company secrets
  • Featured on Meta
  • The [tax] tag is being burninated
  • The return of Staging Ground to Stack Overflow
  • The 2024 Developer Survey Is Live
  • Policy: Generative AI (e.g., ChatGPT) is banned

Hot Network Questions

  • Short story about a neurodivergent child who becomes a pilot
  • VS Code not launching after incorrect command execution on Ubuntu 22.04
  • What caused localized cracking and peeling of wall paint and how should I go about fixing it?
  • is it correct to say "push the table by its far edge"?
  • Can a Kerr black hole become super-extremal?
  • Does Japanese advertises selling something with full price?
  • Python matrix class
  • Romans 3:22 – ‘of’ or ‘in’? Old translations differ from modern ones. Why?
  • Why does the proposed Lunar Crater Radio Telescope suggest an optimal latitude of 20 degrees North?
  • How does Death Ward interact with Band of Loyalty?
  • How is this function's assembly implementing the conditional?
  • What does the expression "Mignon country" refer to in Elsschot's "Cheese"?
  • are "I will check your homework later" and "I will check on your homework later" similar?
  • Is it legal to deposit a check that says pay to the order of cash
  • how do I constrain a shape key
  • Who are the mathematicians interested in the history of mathematics?
  • How might a physicist define 'mind' using concepts of physics?
  • Estimating Probability Density for Sample
  • Is the barrier to entry for mathematics research increasing, and is it at risk of becoming less accessible in the future?
  • How can I hang heavy bikes under a thick wooden shelf?
  • Homebrew spell acting as one-way mirror
  • What percentage of light gets scattered by a mirror?
  • What is the U.N. list of shame and how does it affect Israel which was recently added?
  • What’s the history behind Rogue’s ability to touch others directly without harmful effects in the comics?

presentation layer where

Presentation layer and Session layer of the OSI model

There are two popular networking models: the OSI layers model and the TCP/IP layers model. The presentation layer and session layer exist only in the OSI layers models. The TCP/IP layers model merges them into the application layer.

The Presentation Layer

The presentation layer is the sixth layer of the OSI Reference model. It defines how data and information is transmitted and presented to the user. It translates data and format code in such a way that it is correctly used by the application layer.

It identifies the syntaxes that different applications use and formats data using those syntaxes. For example, a web browser receives a web page from a web server in the HTML language. HTML language includes many tags and markup that have no meaning for the end user but they have special meaning for the web browser. the web browser uses the presentation layer's logic to read those syntaxes and format data in such a way the web server wants it to be present to the user.

presentation layer

On the sender device, it encapsulates and compresses data before sending it to the network to increase the speed and security of the network. On the receiver device, it de-encapsulates and decompresses data before presenting it to the user.

Examples of the presentation layer

Example standards for representing graphical information: JPEG, GIF, JPEG, and TIFF.

Example standards for representing audio information: WAV, MIDI, MP3.

Example standards for representing video information: WMV, MOV, MP4, MPEG.

Example standards for representing text information: doc, xls, txt, pdf.

Functions of the presentation layer

  • It formats and presents data and information.
  • It encrypts and compresses data before giving it to the session layer.
  • It de-encrypts and decompresses the encrypted and compressed data it receives from the session layer.

Session layer

The session layer is the fifth layer of the OSI layers model. It is responsible for initiating, establishing, managing, and terminating sessions between the local application and the remote applications.

It defines standards for three modes of communication: full duplex, half-duplex, and simplex.

duplex modes

In the full duplex mode, both devices can send and receive data simultaneously. The internet connection is an example of the full duplex mode.

In the half duplex mode, only one device can send data at a time. A telephone conversation is an example of the half-duplex mode.

In the simplex mode, only one device can send data. A radio broadcast is an example of the simplex mode.

Functions of the session layer

  • It is responsible for terminating sessions, creating checkpoints, and recovering data when sessions are interrupted.
  • It opens and maintains logical communication channels between network applications running on the local host and network applications running on the remote host.
  • If a network application uses an authentication mechanism before it opens a logical communication channel (session) with the remote host, it handles the authentication process.

Examples of the session layer

Structure Query Language (SQL), Remote Procedure Call (RPC), and Network File System (NFS) are examples of the session layer.

By ComputerNetworkingNotes Updated on 2024-05-05 05:30:01 IST

ComputerNetworkingNotes CCNA Study Guide Presentation layer and Session layer of the OSI model

We do not accept any kind of Guest Post. Except Guest post submission, for any other query (such as adverting opportunity, product advertisement, feedback, suggestion, error reporting and technical issue) or simply just say to hello mail us [email protected]

  • Network infrastructure

OSI model (Open Systems Interconnection)

  • Andrew Froehlich, West Gate Networks
  • Linda Rosencrance
  • Kara Gattine, Director of Editorial Operations

What is OSI model (Open Systems Interconnection)?

OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network. This model focuses on providing a visual design of how each communications layer is built on top of the other, starting with the physical cabling, all the way to the application that's trying to communicate with other devices on a network.

A reference model is a conceptual framework for understanding relationships. The purpose of the OSI reference model is to guide technology vendors and developers so the digital communications products and software programs they create can interoperate and to promote a clear framework that describes the functions of a networking or telecommunications system that's in use.

Most vendors involved in telecommunications try to describe their products and services in relation to the OSI model. This helps them differentiate among the various transport protocols, addressing schemes and communications packaging methods. And, although it's useful for guiding discussion and evaluation, the OSI model is theoretical in nature and should be used only as a general guide. That's because few network products or standard tools keep related functions together in well-defined layers, as is the case in the OSI model. The Transmission Control Protocol/Internet Protocol ( TCP/IP ) suite, for example, is the most widely used network protocol, but even it doesn't map cleanly to the OSI model.

History of the OSI model

In the 1970s, technology researchers began examining how computer systems could best communicate with each other. Over the next few years, several competing models were created and published to the community. However, it wasn't until 1984 when the International Organization for Standardization (ISO) took the best parts of competing networking reference models to propose OSI as a way to finally create a framework that technology companies around the world could use as the basis of their networking technologies .

From ISO's perspective, the easiest way to create a conceptual model was to organize the models into different abstraction layers required to organize and send data between computing systems. Looking inside each abstracted layer to see the details shows one part of this network communication process. Each layer can be thought of as a separate communication module or piece of the puzzle. But, to actually accomplish the goal of sending data from one device to another, each module must work together.

How the OSI model works

Information technology (IT) networking professionals use OSI to model or conceptualize how data is sent or received over a network. Understanding this is a foundational part of most IT networking certifications, including the Cisco Certified Network Associate (CCNA) and CompTIA Network+ certification programs. As mentioned, the model is designed to break down data transmission standards, processes and protocols over a series of seven layers, each of which is responsible for performing specific tasks concerning sending and receiving data.

The main concept of OSI is that the process of communication between two endpoints in a network can be divided into seven distinct groups of related functions, or layers. Each communicating user or program is on a device that can provide those seven layers of function.

In this architecture, each layer serves the layer above it and, in turn, is served by the layer below it. So, in a given message between users, there will be a flow of data down through the layers in the source computer, across the network and then up through the layers in the receiving computer. Only the application layer at the top of the stack doesn't provide services to a higher-level layer.

The seven layers of function are provided by a combination of applications, operating systems (OSes), network card device drivers, networking hardware and protocols that enable a system to transmit a signal over a network through various physical mediums, including twisted-pair copper, fiber optics, Wi-Fi or Long-Term Evolution (LTE) with 5G .

7 layers of the OSI model

What is the function of each layer of the OSI model? The seven Open Systems Interconnection layers are the following.

Layer 7. The application layer

The application layer enables the user -- human or software -- to interact with the application or network whenever the user elects to read messages, transfer files or perform other network-related tasks. Web browsers and other internet-connected apps, such as Outlook and Skype, use Layer 7 application protocols.

Layer 6. The presentation layer

The presentation layer translates or formats data for the application layer based on the semantics or syntax the application accepts. This layer also handles the encryption and decryption that the application layer requires.

Layer 5. The session layer

The session layer sets up, coordinates and terminates conversations between applications. Its services include authentication and reconnection after an interruption. This layer determines how long a system will wait for another application to respond. Examples of session layer protocols include X.225 and Zone Information Protocol (ZIP).

Layer 4. The transport layer

The transport layer is responsible for transferring data across a network and provides error-checking mechanisms and data flow controls. It determines how much data to send, where it gets sent and at what rate. TCP within the TCP/IP suite is the best-known example of the transport layer. This is where the communications select TCP port numbers to categorize and organize data transmissions across a network.

Layer 3. The network layer

The primary function of the network layer is to move data into and through other networks. Network layer protocols accomplish this by packaging data with correct network address information, selecting the appropriate network routes and forwarding the packaged data up the stack to the transport layer. From a TCP/IP perspective, this is where IP addresses are applied for routing purposes.

Layer 2. The data-link layer

The data-link , or protocol layer, in a program handles moving data into and out of a physical link in a network. This layer handles problems that occur as a result of bit transmission errors. It ensures that the pace of the data flow doesn't overwhelm the sending and receiving devices. This layer also permits the transmission of data to Layer 3, the network layer, where it's addressed and routed.

The data-link layer can be further divided into two sublayers. The higher layer, which is called logical link control (LLC), is responsible for multiplexing, flow control, acknowledgement and notifying upper layers if transmit/receive (TX/RX) errors occur.

The media access control sublayer is responsible for tracking data frames using MAC addresses of the sending and receiving hardware. It's also responsible for organizing each frame, marking the starting and ending bits and organizing timing regarding when each frame can be sent along the physical layer medium.

Layer 1. The physical layer

The physical layer transports data using electrical, mechanical or procedural interfaces. This layer is responsible for sending computer bits from one device to another along the network. It determines how physical connections to the network are set up and how bits are represented into predictable signals as they're transmitted either electrically, optically or via radio waves.

Layers 1 through 7 of the OSI model

Cross-layer functions

Cross-layer functions, or services that may affect more than one layer, include the following:

  • security service telecommunication as defined by the International Telecommunication Union Standardization Sector (ITU-T) X.800 recommendation;
  • management functions that enable the configuration, instantiation, monitoring and terminating of the communications of two or more entities;
  • Multiprotocol Label Switching ( MPLS ), which operates at an OSI model layer that lies between the Layer 2 data-link layer and the Layer 3 network layer -- MPLS can carry a variety of traffic, including Ethernet frames and IP packets;
  • Address Resolution Protocol (ARP) translates IPv4 addresses (OSI Layer 3) into Ethernet MAC addresses (OSI Layer 2); and
  • domain name system (DNS), which is an application layer service that's used to look up the IP address of a domain name.

Pros and cons of the OSI model

The OSI model has a number of advantages, including the following:

  • It's considered a standard model in computer networking.
  • The model supports connectionless , as well as connection-oriented, services. Users can take advantage of connectionless services when they need faster data transmissions over the internet and the connection-oriented model when they're looking for reliability.
  • It has the flexibility to adapt to many protocols.
  • The model is more adaptable and secure than having all services bundled in one layer.

The disadvantages of the OSI model include the following:

  • It doesn't define any particular protocol.
  • The session layer, which is used for session management, and the presentation layer, which deals with user interaction, aren't as useful as other layers in the OSI model.
  • Some services are duplicated at various layers, such as the transport and data-link layers.
  • Layers can't work in parallel; each layer must wait to receive data from the previous layer.

OSI model vs. TCP/IP model

The OSI reference model describes the functions of a telecommunication or networking system, while TCP/IP is a suite of communication protocols used to interconnect network devices on the internet. TCP/IP and OSI are the most broadly used networking models for communication.

The OSI and TCP/IP models have similarities and differences. The main similarity is in their construction, as both use layers, although the OSI model consists of seven layers, while TCP/IP consists of just four layers.

Another similarity is that the upper layer for each model is the application layer, which performs the same tasks in each model but may vary according to the information each receives.

The functions performed in each model are also similar because each uses a network and transport layer to operate. The OSI and TCP/IP model are mostly used to transmit data packets, although they each use different means and paths to reach their destinations.

Additional similarities between the OSI and TCP/IP models include the following:

  • Both are logical models.
  • Both define standards for networking.
  • They each divide the network communication process in layers.
  • Both provide frameworks for creating and implementing networking standards and devices.
  • They enable one manufacturer to make devices and network components that can coexist and work with the devices and components made by other manufacturers.
  • Both divide complex functions into simpler components.

Differences between the OSI and TCP/IP models include the following:

  • OSI uses three layers -- application, presentation and session -- to define the functionality of upper layers, while TCP/IP uses only the application layer.
  • OSI uses two separate layers -- physical and data-link -- to define the functionality of the bottom layers, while TCP/IP uses only the link layer.
  • OSI uses the network layer to define the routing standards and protocols, while TCP/IP uses the internet layer.

Next: Explore 12 common network protocols all network engineers should know here .

Continue Reading About OSI model (Open Systems Interconnection)

  • What is the difference between TCP/IP model vs. OSI model?
  • Future of networking technology relies on 5G, edge computing
  • 7 TCP/IP vulnerabilities and how to prevent them
  • Edge computing and 5G bring the edge to remote workers
  • SANs Institute OSI model overview

Related Terms

Dig deeper on network infrastructure.

presentation layer where

Transmission Control Protocol (TCP)

presentation layer where

network load balancing (NLB)

RahulAwati

encapsulation (object-orientated programming)

RobertSheldon

Organizations have ramped up their use of communications platform as a service and APIs to expand communication channels between ...

Google will roll out new GenAI in Gmail and Docs first and then other apps throughout the year. In 2025, Google plans to ...

For successful hybrid meeting collaboration, businesses need to empower remote and on-site employees with a full suite of ...

Mobile payments provide customers with a fast and secure way to pay without cash or physical cards. Managing these systems can be...

Mobile payment systems can vary in terms of their fees, setup process and functionality. Organizations must know how to choose ...

To succeed with enterprises, pricing for Copilot+ PC will have to come down for high-volume sales and business software will need...

A main focus of the Dell Technologies World 2024 conference was AI and how it impacts infrastructure environments. Dell ...

In this Q&A, Dell's Matt Baker lays out how its AI Factory is designed for faster AI adoption, why there are so many chatbots and...

An incredible amount of research must go into data center site selection. If the location does not fit company demands, the data ...

IT service providers are upskilling a large portion of their workforces on the emerging technology. The campaign seeks to boost ...

Early-stage companies featured at MIT Sloan's annual CIO event tap partners to speed up technology deployment and broaden their ...

Kaseya's pledge to partners promises more pricing controls and a new subscription service that lets MSPs manage and secure their ...

Our travels through the OSI seven layers of networking have shown that each layer has specific weaknesses and angles of attack. In turn, each has its best defenses. Now, we’ve come to the OSI presentation layer. Here translation, encryption and compression all happen.

What Is the Presentation Layer?

The simplest way to describe the OSI presentation layer is as follows: it is where machine-readable code gets processed into something the end user can use later in the application layer. This layer is where formatting, conversion and encryption happen. Without it, unless you’re a developer, you likely won’t know what you’re looking at.

Attacks and Threats

If you are using an HTTPS website, encryption would happen at the presentation layer. That means getting your encryption right matters here. Therefore threat actors look for exploits in encryption flaws within the OSI presentation layer. One of the most common tactics is SSL hijacking or sniffing.

Like we said in previous entries, man-in-the-middle (MitM) attacks are one of the go-to moves for threat actors. In conjunction with malware, SSL hijacking can be damaging at the OSI presentation layer. If an attacker has already installed malware on a machine, the MitM would use a proxy to serve as an untrusted certificate authority. If this is the case, the browser will trust the wrong certificate authority and now the attacker will be able to read all messages. For this reason, it is important that your antivirus is up to date and you are doing what you can to stop malware from entering your devices.

As mentioned in the previous piece on the session layer , attackers will take advantage of bad coding practices . That’s true at this layer as well. Keep this in mind when you choose and add software into your enterprise.

The Journey Through the OSI Seven-Layer Model

We’re almost done with the journey through the OSI seven-layer model. After the OSI presentation layer, we’ll look at the application layer. By far, this is where the widest range of attacks and breaches can occur. Therefore, it’s very important to understand.

More from Mobile Security

Juice jacking: is it a real issue or media hype.

4 min read - You get off a flight and realize your phone is almost out of battery, which will make getting an Uber at your destination a bit challenging. Then you see it — a public charging station at the next gate like a pot of gold at the end of the rainbow. As you run rom-com style to the USB port, you may briefly wonder if it’s actually safe from a cybersecurity perspective to plug in your phone. The answer is technically…

Third-party app stores could be a red flag for iOS security

4 min read - Even Apple can’t escape change forever. The famously restrictive company will allow third-party app stores for iOS devices, along with allowing users to “sideload” software directly. Spurring the move is the European Union’s (EU) Digital Markets Act (DMA), which looks to ensure open markets by reducing the ability of digital “gatekeepers” to restrict content on devices. While this is good news for app creators and end-users, there is a potential red flag: security. Here’s what the compliance-driven change means for…

A view into Web(View) attacks in Android

9 min read - James Kilner contributed to the technical editing of this blog. Nethanella Messer, Segev Fogel, Or Ben Nun and Liran Tiebloom contributed to the blog. Although in the PC realm it is common to see financial malware used in web attacks to commit fraud, in Android-based financial malware this is a new trend. Traditionally, financial malware in Android uses overlay techniques to steal victims’ credentials. In 2022, IBM Security Trusteer researchers discovered a new trend in financial mobile malware that targets…

Topic updates

Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.

Presentation Layer: Protocols, Examples, Services | Functions of Presentation Layer

Presentation Layer is the 6th layer in the Open System Interconnection (OSI) model where all application programmer consider data structure and presentation, beyond of simply sending the data into form of datagram otherwise packets in between the hosts. Now, we will explain about what is presentation layer with its protocols, example, service ; involving with major functions of presentation Layer with ease. At the end of this article, you will completely educate about What is Presentation Layer in OSI Model without any hassle.

What is Presentation Layer?

Definition : Presentation layer is 6th layer in the OSI model , and its main objective is to present all messages to upper layer as a standardized format. It is also known as the “ Translation layer “.  This layer takes care of syntax and semantics of messages exchanged in between two communication systems. Presentation layer has responsible that receiver can understand all data, and it will be to implement all data languages can be dissimilar of two communication system.

Presentation Layer Tutorial Headlines:

In this section, we will show you all headlines about this entire article; you can check them as your choice; below shown all:

Let’s Get Started!!

  functions of presentation layer.

Presentation layer performs various functions in the OSI model ; below explain each one – 

Protocols of Presentation Layer

Example of presentation layer protocols:.

Here, we will discuss all examples of presentation layer protocols; below explain each one –  

Multipurpose Internet Mail Extensions (MIME) : MIME protocol was introduced by Bell Communications in 1991, and it is an internet standard that provides scalable capable of email for attaching of images, sounds and text in a message.

Apple Filing Protocol (AFP ) : AFP protocol is designed by Apple company for sharing all files over the entire network .

Network Data Representation (NDR) : NDR is an data encoding standard, and it is implement in the Distributed Computing Environment (DCE).

Telnet (Telecommunication Network) : Telnet protocol was introduced in 1969, and it offers the command line interface for making communication along with remote device or server .

eXternal Data Representation (XDR) : This protocol provides the description and encoding of entire data, and  it’s main goal is to transfer data in between dissimilar computer architecture.

Presentation Layer Services

Design issues with presentation layer, faqs (frequently asked questions), what is meant by presentation layer in osi model.

Presentation Layer is the 6th layer in the Open System Interconnection (OSI) model that is the lowest layer, where all application programmer consider data structure and presentation, beyond of simply sending the data into form of datagram otherwise packets in between the hosts.

What protocols are used in the presentation layer?

Can you explain some presentation layer examples, what are the main functions of the presentation layer, what are services of presentation layer in osi.

Presentation layer has a responsibility for formatting, translation, and delivery of the information for getting to process otherwise display .

Also Read: Data Link Layer: Protocols, Examples | Functions of Data Link Layer

If you have any experience, tips, tricks, or query regarding this issue? You can drop a comment!

Related Posts

UiPath Blog

Digital Transformation

Industry Solutions

Community Blog

Resource Center

What is the Presentation Layer, Anyway?

Katie Behrens headshot

If you’ve ever heard the term “presentation layer” thrown around in discussions of computers or software, you may have been able to make a pretty good guess at what it is. In the world of robotic process automation (RPA) , the presentation layer becomes a major topic, so let’s take a minute to flesh it out.

Layers

In technical speech, the presentation layer is the sixth of seven layers of OSI code that translates data stored in another layer into something a human can interpret. It’s the presentation layer that knows to put the right information into the appropriate fields of a customer record, for example: Name, Date of Birth, Address, etc. The presentation layer is where you’ll find the code for making a program look nice as well. Most importantly to this discussion, the presentation layer is where RPA functions .

One of the main goals of RPA software is for it to behave just like a human being would in any situation. Since most human workers interact with data through the presentation layer of a software program, that’s what RPA robots do. This key component of RPA allows a business to keep its existing information systems while trying new things. You don’t need to overhaul everything in order to make new uses for the information you have.

With the presentation layer aspect of RPA, a company can gain a certain amount of technology independence . Your IT professionals are more important than ever, but RPA software like UiPath allows more people to interact with the data and the systems that make them better workers. An employee doesn’t have to wait for a “deep tech” solution if she can set up her own automation workflow. In addition, as existing systems get more and more out of date (though still vital to a company’s processes), there will be fewer and fewer computer programmers able to rework them. It’s similar to the idea that very few computer repair shops can fix a machine that runs floppy disks: the knowledge is simply lost over time. By using a presentation layer approach, you can cut that dependency and trust that any new IT hires will be able to keep pace.

There are other benefits to the RPA presentation layer approach, some of which are outlined in the 2011 Forrester report, “The Role of IT in Business-Driven Process Automation.” RPA’s ability to work with the presentation layer is, essentially, what makes it so useful in the world of automation.

Client Service Representative , Arts People

Related articles

Dotted Grid

UiPath named a Leader in Gartner® Magic Quadrant™ for five years in a row

Dotted Grid

UiPath Named a Leader in the 2023 Gartner® Magic Quadrant™ Report for Robotic Process Automation

Dotted Grid

Meet the first country in EMEA with an RPA Developer National Qualification

Get articles from automation experts in your inbox.

Sign up today and we'll email you the newest articles every week.

Thank you for subscribing!

Thank you for subscribing! Each week, we'll send the best automation blog posts straight to your inbox.

Contentful Studio is here! Discover what’s new

Headless CMS explained in 1 minute

Updated: May 2, 2024

Traditional Content Management System architecture was once the standard for web development, but as business needs and customer expectations grow more complex, the more common technology used these days is known as Headless CMS, or Headless Content Management System. This page breaks down what Headless CMS is, including why the industry landed on “headless” as the chosen turn of phrase. Read on to find out more!

On this page

What is a headless cms.

A headless CMS is a content management system that separates the presentation layer (where content is presented) from the backend (where content is managed). A headless CMS allows you to manage content in one place and be able to deploy that content on any digital channel you choose. Separating the frontend from the backend unlocks your content, making it easier for marketers to manage content independently, and for developers to build faster, automate changes, and manage digital at scale. In a traditional CMS, content is tangled up with code and locked in silos, making reusing content — and creating modern digital experiences — next to impossible.

CMS Evolution Headless

The origins of headless CMS

To understand what a headless CMS solution is, it helps to first look at the traditional content management system and what it was designed to do. Traditional CMSes have been around since the early days of web development. Platforms like Wordpress, Drupal, and Sitecore were designed to store and present content elements like text, images, and video on websites specifically.

The traditional CMS approach to managing content puts everything into one big bucket — content, images, HTML, and CSS. This made it impossible to reuse content because it was commingled with code.

As digital channels and devices have evolved, the need for more flexible solutions has emerged. Now, enterprises are developing websites, mobile apps, digital displays, conversational interfaces, and more. Meanwhile, the traditional CMS failed to keep pace. Why? Because a CMS organizes content in webpage-oriented frameworks, making it impossible for the same content to fit other digital platforms or software.

Headless CMS vs. traditional CMS at-a-glance

Use this table as a quick reference to see how traditional CMS stacks up against headless CMS when it comes to critical tech features needed to do your job properly.

Traditional CMSHeadless CMS
In-houseIn the cloud
Project-focusedProduct-focused
Built for a single pageBuilding block for many products
LimitedLimitless
One-to-oneOne-to-many
WaterfallAgile
ScheduledContinuous
Monolithic, all-in-oneMicroservice, best-in-class
Large up-front costQuick proof of concept
Inherent to the systemManaged

How does a headless CMS solution work?

Content housed in a headless CMS is delivered via APIs for seamless display across any site, device, or other digital touchpoint. This makes content in a headless CMS endlessly reusable, no matter the omnichannel customer experience used today, or the channels that emerge in the future. This is different from Wordpress and other monolithic CMSes that tightly couple the frontend with the backend, keeping you locked into how content can (and cannot) be displayed.

Think about headless architecture and APIs like this: the main job of a headless CMS is to store and manage your content. It doesn’t really care what you want to do with that content. The main job of display platforms like a website or mobile app is to present content to people. They don’t really care how that content is stored or managed. APIs are the magical connection points that allow these backend systems (e.g., headless CMS) and frontend systems (e.g., website) to communicate in the specific ways a digital team wants them to.

The difference between headless CMS and decoupled CMS

As you learn more about different types of content management solutions, you’ll probably come across another term, “decoupled CMS.” As the name indicates, the defining feature of a decoupled CMS is that the backend and frontend are separate. This separation is similar to a headless CMS, however, a decoupled CMS comes with a head, but using it is completely optional. Some use the terms interchangeably, but they are not identical. The main difference is a headless CMS does not include a presentation layer at all but instead allows developers to decide how they would like to display content. This is often through interactive JSON frameworks like React or Vue.js or site generators like Vercel.

Best practices to setting up headless CMS solutions

While a headless CMS software solution enables you to deploy content across any presentation layer, it doesn’t solve an underlying problem: it does not give your content structure. As long as your content is unstructured, it cannot be easily repurposed across different platforms and channels. Structured content is a general term referring to content that is broken down into small building blocks, organized in a predictable way, and classified with metadata.

To illustrate how unstructured content is typically put to work, let’s use a webpage for an example. Unstructured content blends together all the content and code that create that webpage. This is often done in a WYSIWYG editor, which stands for “what you see is what you get.” Digital content creators are usually familiar with WYSIWYGs as it gives them the ability to make content edits in the backend. This creates perfectly fine webpages, however, content is stuck to that format. What you see is what you get … and nothing else.

A structured content approach separates the various elements of that page into distinct components, such as author, title, body, image, image description, definitions, e-commerce information, product pricing, terms and conditions, and more. All these components can still be assembled to create the same webpage, but they can also be reassembled to create various iterations of the webpage, personalized for a distinct audience, reorganized for a specific campaign, or trimmed down for a mobile experience.

The way this structured content is pulled off on the backend is through something called a content model. A content model defines and organizes all the different content types that an organization uses. In the example above, all of the different elements listed are considered distinct content types (author title, image, caption, body text, etc.). Content models are comprised of and can reuse these content types to become tailored to the unique needs of each organization, so that content creators aren’t stuck with the overly prescriptive page templates of a traditional CMS.

Benefits of headless CMS and why you need it

Now that we’ve defined what a headless CMS is, how it works, and the ways in which it is a better solution for your content management than traditional CMS, let’s dig deeper into the value implementing headless CMS into your organization can bring.

Unify content into a single content hub

By making content endlessly reusable, the structured content of a headless CMS eliminates manual processes like copy and pasting. This makes editing way easier — change the copy or image in one place, and that change applies everywhere the content is located. With all content stored in one centralized content hub , content editors can easily apply the COPE principle: Create Once, Publish Everywhere. Another way to think of this principle is to edit once, update everywhere.

Enable collaborative workflows

By separating the frontend (or presentation layer) from the backend and organizing content with reusable content models, a headless CMS allows content editors and developers to work in parallel. Content editors can nimbly update content across all channels without developer support, freeing up developers to tackle more strategically important work. This offers a competitive advantage for companies that want to increase their speed to market and make the best use of their developers’ time.

Increase reusability and scalability

Headless CMS makes content reusability a breeze. Content reusability is a key component for making the most of resources spent on content creation. When all content is accessible for use on any digital endpoint, digital teams can repurpose content across devices and channels. It also allows content to scale across different regions, use cases, and campaigns. Content can be optimized for various user experiences by integrating tools for personalization and localization to ensure the right content reaches the right audience at the right time.

Read on below

Explore more headless CMS resources

the-ultimate-guide-to-headless-cms-card

The ultimate guide to headless CMS

content-reusability-workbook-card

Content reusability guide

modern-website-strategy-guide-card

The modern website strategy guide

Scratching your head each time “headless architecture” enters the conversation? This post goes out to you. We define the term and then go deeper, covering its seven key features.

Headless architecture: Seven things to know

presentation layer where

Contentful SEO guide: Headless & SEO

Announcing updates to the Contentful Composable Content Platform: content orchestration, Studio, new partner integrations, and App Framework enhancements.

Unlock the power of digital content with the Contentful Composable Content Platform

What is headless seo.

Headless SEO is the process of optimizing your headless CMS website to enhance performance in organic search results. This ensures your content is served in a way that is easy for search engines to understand and index. Because a headless CMS manages content centrally and distributes it across various channels and devices, headless SEO allows for content optimization regardless of where or how it's displayed.

Myths suggest headless SEO is more challenging or complicated than monolithic systems, yet the flexibility and scalability of headless CMS frees digital teams. Notably, a headless CMS benefits SEO by enabling centralized content management, accelerating go-to-market scalability, breaking the constraints of monolithic CMSes, and delivering lightning fast pagespeed.

By empowering digital teams to efficiently and effectively deliver content to audiences through organic search results and beyond, headless SEO enhances the effectiveness of your online presence. See our SEO guide to learn more about headless SEO .

Why go with Contentful for your content management needs

Contentful pioneered the headless-approach to content management – and now it’s pioneering the next wave of content management with composable content . While a headless CMS solution focuses on unifying content in one place to make structuring and reusing it a breeze, a composable content platform doesn’t require you to first migrate your content to one location before structuring and deploying it. This saves you time, flexes to fit into your existing tech stack, and allows you to find new ways to reuse and create new content with components from disparate storage systems, like your CRM, PIM, or ECM.

The Contentful Composable Content Platform is API-first, which means it easily integrates with different data sources and new functionality as digital experiences and technology evolve. With built-in orchestration, a robust app ecosystem, and app framework to easily extend the platform, Contentful frees teams across the business to work together to connect, create, and extend content more efficiently. Contentful helps companies unlock the power of digital content so they can build faster and deliver at scale, making their content a strategic business asset.

Additionally, the Contentful GraphQL API and RESTful APIs allow developers to programmatically manage and orchestrate content within the platform itself. This includes easy creation of new project spaces, assigning user roles, managing webhooks, content import/export and content modeling , which is scriptable from any source.

Because Contentful is an open-source, API-first platform, it is completely extensible to fit your unique needs. The Contentful Marketplace powers this extensibility, letting you browse through apps, most of which are free and open-source, that extend and expand the capabilities of Contentful for almost any use case you could need. You can integrate your favorite third-party services, build better workflows and customize what you can do with Contentful.

Essentially, the Contentful Composable Content Platform brings the building blocks of content together to create once and reuse everywhere in any digital experience. Being API-first with an extensive app ecosystem enables teams to build for customers and employees - whether it’s to make a process easier, adapt to a changing need, or deliver a better customer experience.

Content is more than words on a webpage – it’s every part of every digital experience. Unlock the power of digital content by removing silos and bottlenecks to make content the strategic business asset it should be. Having every piece of content you’ve ever created immediately at your disposal means you have what you need to compose for any use case, helping you scale quickly and deliver faster.

When people enjoy composing digital experiences together, it’s good for your team and the people you’re building for. Free teams across your business with flexible tools that make it possible to bring the best ideas to life. So you can build what you love and love what you build.

Get a tour of our Contentful’s headless content platform.

Developer? Start building in Contentful for free .

How to use Layers in Paint in Windows 11

Add a layer, hide a layer, duplicate layer, merge layers, rearrange layers, delete a layer, support for transparency, change canvas color, how do i stack two images in paint, how to save layers in windows paint, sangeetaghera@twc.

Layer number dependent ferroelasticity in 2D Ruddlesden–Popper organic-inorganic hybrid perovskites

Add to collection, downloadable content.

presentation layer where

  • Affiliation: College of Arts and Sciences, Department of Applied Physical Sciences
  • Other Affiliation: Department of Nuclear Science and Engineering and Department of Materials Science and Engineering, Massachusetts Institute of Technology, Cambridge, MA, United States
  • Other Affiliation: Advanced Membranes and Porous Materials (AMPM) Center, Physical Sciences and Engineering Division, King Abdullah University of Science and Technology (KAUST), Thuwal, Saudi Arabia
  • Ferroelasticity represents material domains possessing spontaneous strain that can be switched by external stress. Three-dimensional perovskites like methylammonium lead iodide are determined to be ferroelastic. Layered perovskites have been applied in optoelectronic devices with outstanding performance. However, the understanding of lattice strain and ferroelasticity in layered perovskites is still lacking. Here, using the in-situ observation of switching domains in layered perovskite single crystals under external strain, we discover the evidence of ferroelasticity in layered perovskites with layer number more than one, while the perovskites with single octahedra layer do not show ferroelasticity. Density functional theory calculation shows that ferroelasticity in layered perovskites originates from the distortion of inorganic octahedra resulting from the rotation of aspherical methylammonium cations. The absence of methylammonium cations in single layer perovskite accounts for the lack of ferroelasticity. These ferroelastic domains do not induce non-radiative recombination or reduce the photoluminescence quantum yield.
  • photoluminescence
  • two-dimensional modeling
  • methylammonium
  • electronic equipment
  • two dimensional quantitative structure activity relationship
  • detection method
  • quantum yield
  • density functional theory
  • performance assessment
  • https://doi.org/10.17615/yf6e-5v25
  • https://doi.org/10.1038/s41467-021-21493-w
  • In Copyright
  • Attribution 4.0 International
  • Nature Communications
  • U.S. Department of Energy, USDOE
  • Office of Science, SC
  • Defense Threat Reduction Agency, DTRA, (HDTRA1-20-2-0002)
  • U.S. Department of Defense, DOD
  • Basic Energy Sciences, BES
  • Nature Research

This work has no parents.

Thumbnail Title Date Uploaded Visibility Actions
2024-05-29 Public

Select type of work

Master's papers.

Deposit your masters paper, project or other capstone work. Theses will be sent to the CDR automatically via ProQuest and do not need to be deposited.

Scholarly Articles and Book Chapters

Deposit a peer-reviewed article or book chapter. If you would like to deposit a poster, presentation, conference paper or white paper, use the “Scholarly Works” deposit form.

Undergraduate Honors Theses

Deposit your senior honors thesis.

Scholarly Journal, Newsletter or Book

Deposit a complete issue of a scholarly journal, newsletter or book. If you would like to deposit an article or book chapter, use the “Scholarly Articles and Book Chapters” deposit option.

Deposit your dataset. Datasets may be associated with an article or deposited separately.

Deposit your 3D objects, audio, images or video.

Poster, Presentation, Protocol or Paper

Deposit scholarly works such as posters, presentations, research protocols, conference papers or white papers. If you would like to deposit a peer-reviewed article or book chapter, use the “Scholarly Articles and Book Chapters” deposit option.

  • Stanford University
  • Past Events

2024 Digital Humanities Research Showcase

  • Center for Spatial and Textual Analysis (CESTA)

2024 Digital Humanities Research Showcase

Monday, June 3, 2024 12pm to 7pm PT

Building 160, Wallenberg Hall, 4th Floor, Back Area 450 Jane Stanford Way, Building 160, Stanford, CA 94305 View map

This event is open to: Students Faculty Staff

Request disability accommodations and access info

  • Share 2024 Digital Humanities Research Showcase on Facebook
  • Share 2024 Digital Humanities Research Showcase on Twitter
  • Share 2024 Digital Humanities Research Showcase on LinkedIn

This event is over.

Event details:.

12-12:30 pm  -- Lunch, Welcome Remarks, and Presentation on "A Decade of CESTA Data"

12:30-3:30 pm  -- DH Research Fellows' Showcase

12:30 - 1:50 PM :  The Meaning and Measurement of Place

with presentations from: 

Matt Randolph (PhD Candidate in History):  "Bringing AI to Archibald Grimké's Archive: A Case Study of Artificial Intelligence for Histories of Race and Slavery"

This digital project builds upon two years of research collaborations connecting Stanford's History Department with historians and archivists at Howard University in Washington, D.C. We have reviewed, digitized, and transcribed a corpus of letters from Howard's archives relating to African American intellectual and diplomat Archibald Grimké and his family in Washington, D.C. (particularly his then teenage daughter Angelina) as well as Grimké’s correspondence with Dominican leaders and U.S. State Department officials. Through Google's AI software, Gemini, our team has produced transcriptions of handwritten documents that were photographed in the archives. I will present the opportunities and challenges we navigated in leveraging artificial intelligence tools for archival work and historical research methods. 

Ellis Schriefer (PhD Candidate in Iberian and Latin American Cultures):  "Narratives and Neighborhoods: Unpacking Media Representations of El Raval and Lavapiés with NLP"

In my talk, I will be discussing how I used NLP (specifically topic modeling and word frequency) to better understand how the mainstream Spanish media outlet, El País, has depicted two working-class, immigrant neighborhoods (El Raval in Barcelona and Lavapiés in Madrid) in articles from 1996-2024.  

Kelly Boles (PhD Candidate in Education):  "The Spatiality of Teacher Professional Learning Ecologies"

Geospatial variability is a crucial, yet often omitted, contextual aspect of teaching and learning. In this talk, I illustrate how spatial data science methods reveal important locale- and region-based inequities in STEM teachers' professional learning opportunities. Specifically, I present selected findings that show how teachers' learning opportunities vary in nature and quality across geographic space. I argue that both students and teachers are learners, whose learning opportunities are shaped by the shared communities and contexts in which they work, live, and attend school. Honoring these shared experiences suggests a new approach to the study of teacher quality and evaluation, particularly as applied to practitioners in underserved communities.

2:10 - 3:30 PM:  Categories and Connections in Knowledge Systems  with presentations from: 

Anuj Amin (PhD Candidate in Religious Studies):  "Divine Prisons and Sacred Bindings: Late Ancient Aramaic Incantation Bowls"

During my presentation, which will be recorded over Zoom, I will discuss a general background of my corpus, previous scholarship on the material, how my methodology is unique, the creation of my database, the analytics performed, and future directions. 

Junyi Tao (MS Student in Symbolic Systems):  "Three Layers of the Knowledge Landscape: A Case Study of the Stanford Encyclopedia of Philosophy"

This project takes a deeper look into the widely influential Stanford Encyclopedia of Philosophy (SEP) and reveals three layers of the philosophy landscape it presents. The first layer is the content of entries, each offering an overview of a philosophical topic or thinker. Beneath this lies a layer of citations that manifest the dialogues among scholars within the community. From this, we start to see more clearly how social power is intertwined with the narrative of intellectual history—for example, whose voices count? The last one is the layer of meta-content assigned by the SEP’s authors and editors, such as links between related entries, which shapes the architecture of this “knowledge system”. At the end of this talk, I would also like to share some methodological reflections.

Elaine Lai (PhD Candidate in Religious Studies): " Intertextual Heatmap of the  Secret Tantra of the Sun: Blazing Luminous Matrix of Samantabhadrī "

The  Tantra of the Sun  was the first Buddhist scripture in the tradition of the Great Perfection to feature an all-female cast. Traditional histories claim that this tantra is a major source text for a textual cycle/tradition that emerged in the 14th century called the  Heart Essence of the Ḍākinī , where the feminine is likewise elevated. In this talk, I share how I built an intertextual heatmap from scratch to visualize how and where the  Tantra of the Sun  is quoted and referenced throughout the  Heart Essence of the Ḍākin ī and its largest commentarial cycle. I share a tutorial of the final heatmap product where the user can toggle between citational matches and see for themselves how they move through either corpus of literature. I end with broader issues of methodology, including how I chose to handle problematic OCR renderings, and the inevitability of having to engage in close readings of textual materials alongside the use of different technologies.

4-6 pm  -- Faculty Research Presentations

with presentations from:

Patricia Alessandrini (Music Department); Bridget Algee-Hewitt (Center for Comparative Studies in Race and Ethnicity); Mark Algee-Hewitt (English Department); Nora Barakat (History Department); Patricia Blessing (Department of Art and Art History); Joel Cabrita (History Department); Giovanna Ceserani (Classics Department); Robin Chapdelaine (Center for African Studies); Nicole Coleman (Stanford Libraries); Zephyr Frank (History Department); Sarah Levine (School of Education); Lerone Martin (Departments of African and African American Studies, and Religious Studies); Helena Miton (School of Business); Grant Parker (Departments of Classics, and African and African American Studies); Felicia Smith (Stanford Libraries); Richard Roberts (History Department); Alice Staveley (English Department); Elaine Treharne (English Department); Ali Yaycioglu (History Department)

6-7 pm  -- Undergraduate Researchers' Poster Fair and Reception

with 16 Undergraduate Researchers who worked on CESTA projects during 2024 Winter and Spring quarters!

Your browser does not support iframes.

  • How to Login
  • Use Teams on the web
  • Join a meeting in Teams
  • Join without a Teams account
  • Join on a second device
  • Join as a view-only attendee
  • Join a breakout room
  • Join from Google
  • Schedule a meeting in Teams
  • Schedule from Outlook
  • Schedule from Google
  • Schedule with registration
  • Instant meeting
  • Add a dial-in number
  • See all your meetings
  • Invite people
  • Meeting roles
  • Add co-organizers
  • Hide attendee names
  • Tips for large Teams meeting
  • Lock a meeting
  • End a meeting
  • Manage your calendar
  • Meeting controls
  • Prepare in a green room
  • Share content
  • Share slides
  • Share sound
  • Apply video filters
  • Mute and unmute
  • Spotlight a video
  • Multitasking
  • Raise your hand
  • Live reactions
  • Take meeting notes
  • Customize your view
  • Laser pointer
  • Cast from a desktop
  • Use a green screen
  • Join as an avatar
  • Customize your avatar
  • Use emotes, gestures, and more
  • Get started with immersive spaces
  • Use in-meeting controls
  • Spatial audio
  • Overview of Microsoft Teams Premium
  • Intelligent productivity
  • Advanced meeting protection
  • Engaging event experiences
  • Change your background
  • Meeting themes
  • Audio settings
  • Manage attendee audio and video
  • Reduce background noise
  • Voice isolation in Teams
  • Mute notifications
  • Use breakout rooms
  • Live transcription
  • Language interpretation
  • Live captions
  • End-to-end encryption
  • Presenter modes
  • Call and meeting quality
  • Meeting attendance reports
  • Using the lobby
  • Meeting options
  • Record a meeting
  • Meeting recap
  • Play and share a meeting recording
  • Delete a recording
  • Edit or delete a transcript
  • Switch to town halls
  • Get started
  • Schedule a live event
  • Invite attendees
  • organizer checklist
  • For tier 1 events
  • Produce a live event
  • Produce a live event with Teams Encoder
  • Best practices
  • Moderate a Q&A
  • Allow anonymous presenters
  • Attendee engagement report
  • Recording and reports
  • Attend a live event in Teams
  • Participate in a Q&A
  • Use live captions
  • Schedule a webinar
  • Customize a webinar
  • Publicize a webinar
  • Manage webinar registration
  • Manage what attendees see
  • Change webinar details
  • Manage webinar emails
  • Cancel a webinar
  • Manage webinar recordings
  • Webinar attendance report
  • Get started with town hall
  • Attend a town hall
  • Schedule a town hall
  • Customize a town hall
  • Host a town hall
  • Use RTMP-In
  • Town hall insights
  • Manage town hall recordings
  • Cancel a town hall
  • Can't join a meeting
  • Camera isn't working
  • Microphone isn't working
  • My speaker isn’t working
  • Breakout rooms issues
  • Immersive spaces issues
  • Meetings keep dropping

presentation layer where

Share slides in Microsoft Teams meetings with PowerPoint Live

PowerPoint Live in Teams gives both the presenter and audience an inclusive and engaging experience, combining the best parts of presenting in PowerPoint with the connection and collaboration of a Microsoft Teams meeting.

Your browser does not support video. Install Microsoft Silverlight, Adobe Flash Player, or Internet Explorer 9.

When you’re the presenter, you have a unique view that lets you control your presentation while staying engaged with your audience, seeing people’s video, raised hands, reactions, and chat as needed.

And if you’re an audience member, you can interact with the presentation and personalize your viewing experience with captions, high contrast slides, and slides translated into your native language.

Here’s how it works:  

Tip:  Are you an audience member? Jump down to learn more about how you can interact during the presentation.

Presenter view

PowerPoint presentation in Teams

Present your slides

PowerPoint Live sharing file options

If you're in PowerPoint for the web, select Present > Present in Teams .

Your slides will appear in the Teams meeting, with your Notes next to them.

Navigate through the slides

Navigation arrows in PowerPoint Live

Use the navigation arrows to go forward and backward.

Use the thumbnail strip to jump ahead or backwards.

Select Go to slide to see a grid view of all slides in the presentation. Select one to jump to it.

Stay connected to the audience

One of the benefits of using PowerPoint Live to present instead of sharing your screen is that you have quick access to all your meeting tools you need to engage with the audience and to read the room in one view. This is especially true if you’re presenting from a single screen.

Turn Chat on or off to view what your audience is saying.

See audience reactions and raised hands in real-time.

Change the Layout of your presentation and choose how your live camera feed appears in your presentation, like Standout or Cameo . It helps the audience read your non-verbal cues and keeps them engaged.

Use the Laser pointer , Pen , Highlighter , or Eraser to clearly reference items on your slides.

Audience view

As an audience member, you’re able to personalize your experience without affecting anyone else. Try these options to find what works best for you:

Select Sync to Presenter, next to the navigation arrows

Note:  If presenters don't want people to be able to independently navigate through a PowerPoint file they are sharing, use the  Private view  toggle to turn it off.

Click any hyperlink on slides to get more context right away.

Interact with videos on slides to adjust the volume or jump to a timestamp and consume it at your own pace.

Use a screen reader to get full access to the slide content.

Select Translate slides

Switch to a high contrast view to make the slides easier to view if you have low vision. Select More options > View slides in high contrast .

Your viewing experience will be at a higher fidelity, letting you see crisp text and smooth animations. PowerPoint Live also requires significantly less network bandwidth than typical sharing, making it the best option when network connectivity is a problem.

Independent magnifying and panning

You can zoom in and pan on a presentation slide without affecting what others see. Use your mouse, trackpad, keyboard, touch, or the Magnify Slide option as applicable. 

To zoom in or out on a slide, do any one of the following: 

Hover over the slideshow and pinch or stretch on trackpad.

Pinch or use the stretch touch gesture (on a touch-enabled device).

Press the + or – keys.

Hover over slide, hold down Ctrl key and scroll with mouse wheel.

In the More Actions menu, click the + or – buttons.

To pan around your slide, do any one of the following:

Press the arrow keys.

Click and drag using a mouse.

Click and drag on a trackpad.

Use one finger to touch and drag (on touch-enabled device).

When done zooming and panning, press  Esc to reset your screen.   

Important: 

PowerPoint Live is not supported in Teams live events, CVI devices, and VTC devices.

If you're using Teams on the web, you’ll need Microsoft Edge 18 or later, or Google Chrome 65 or later, to see the presenter view.

Presenter view is hidden by default for small screen devices but can be turned on by selecting More options below the current slide and then Show presenter view (or by selecting the sharing window and then pressing Ctrl+Shift+x).

Meetings recordings won’t capture any videos, animations, or annotation marks in the PowerPoint Live session.

When you share from Teams, the PowerPoint Live section lists the most recent files you've opened or edited in your team SharePoint site or your OneDrive. If you select one of these files to present, all meeting participants will be able to view the slides during the meeting. Their access permissions to the file outside of the meeting won't change.

If you select Browse and choose to present a PowerPoint file that hasn't been uploaded to Teams before, it will get uploaded as part of the meeting. If you're presenting in a channel meeting, the file is uploaded to the Files tab in the channel, where all team members will have access to it. If you're presenting in a private meeting, the file is uploaded to your OneDrive, where only the meeting participants will be able to access it.

Facebook

Need more help?

Want more options.

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

presentation layer where

Microsoft 365 subscription benefits

presentation layer where

Microsoft 365 training

presentation layer where

Microsoft security

presentation layer where

Accessibility center

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.

presentation layer where

Ask the Microsoft Community

presentation layer where

Microsoft Tech Community

presentation layer where

Windows Insiders

Microsoft 365 Insiders

Was this information helpful?

Thank you for your feedback.

Mechanical properties of multi-material polymers additively manufactured with fused layer modeling using a single nozzle

  • Junk, Stefan
  • Schaumburg, Konrad

Additive manufacturing technologies for plastics are typically used in industry for prototypes, presentation models and small batches but also additive tooling. Especially for low volumes, this manufacturing method offers a high degree of efficiency, since no special tools or fixtures are required, which leads to a significant reduction in manufacturing costs and manufacturing time. Up to now, applications have usually been made using only one material, as the use of different materials in a single printing process is a particular challenge. In this contribution, the state of the art for printing processes suitable for multi-material printing and associated application examples are first presented in a literature search. The focus of this contribution is on the fused layer modeling (FLM) process with experiments and analysis on the application of different materials (PLA, PETG, ASA and PC Blend). A 3D-printer with a single nozzle is available for the practical experiments. Due to an additional multi-material device this 3D-printer is capable of processing up to five different materials in one printing process. Colorful presentation models are the first step to gain experience in multi-material printing. The investigation will then be extended to include the combination of different materials. For this purpose, standardized plastic tensile specimens are additively manufactured and subjected to tensile testing in order to analyze material properties. The tensile specimens are manufactured in different patterns and material combinations. This results in measurements that allow a comparison with the initial materials. In addition, the challenges in the printing process, material selection and material arrangement are demonstrated. In order to develop a functional multi-material component, sufficient fusion in the bonding layer between the materials must be ensured.

IMAGES

  1. Presentation Layer

    presentation layer where

  2. presentation layer simple

    presentation layer where

  3. presentation layer definition

    presentation layer where

  4. Where to Use Tiers and Layers Graphics in a Presentation

    presentation layer where

  5. PPT

    presentation layer where

  6. presentation layer in 3 tier architecture

    presentation layer where

VIDEO

  1. OSI Model

  2. OSI model

  3. Presentation layer

  4. Session, Presentation & Application Layer

  5. Presentation layer of OSI in detail || Layer's functios || Computer network

  6. FUNCTIONS AND DESIGN ISSUES IN PRESENTATION LAYER || COMPUTER NETWORKS

COMMENTS

  1. Presentation layer

    The presentation layer ensures the information that the application layer of one system sends out is readable by the application layer of another system. On the sending system it is responsible for conversion to standard, transmittable formats. [7] On the receiving system it is responsible for the translation, formatting, and delivery of ...

  2. Presentation Layer in OSI model

    Prerequisite : OSI Model. Introduction : Presentation Layer is the 6th layer in the Open System Interconnection (OSI) model. This layer is also known as Translation layer, as this layer serves as a data translator for the network. The data which this layer receives from the Application Layer is extracted and manipulated here as per the required ...

  3. Presentation Layer

    The presentation layer is the lowest layer at which application programmers consider data structure and presentation, instead of simply sending data in the form of datagrams or packets between hosts. This layer deals with issues of string representation - whether they use the Pascal method (an integer length field followed by the specified ...

  4. The OSI Model

    The Presentation Layer formats and encrypts data. OSI Layer 7. Layer 7 is the application layer. True to its name, this is the layer that is ultimately responsible for supporting services used by end-user applications. Applications include software programs that are installed on the operating system, like Internet browsers (for example, Firefox ...

  5. What is presentation layer?

    The presentation layer is located at Layer 6 of the OSI model. The tool that manages Hypertext Transfer Protocol ( HTTP) is an example of a program that loosely adheres to the presentation layer of OSI. Although it's technically considered an application-layer protocol per the TCP/IP model, HTTP includes presentation layer services within it.

  6. Presentation Layer

    Presentation Layer is the Layer 6 of the seven-layer Open Systems Interconnection (OSI) reference model. The presentation layer structures data that is passed down from the application layer into a format suitable for network transmission. This layer is responsible for data encryption, data compression, character set conversion, interpretation ...

  7. Layer Six

    Explore the crucial role of the Presentation Layer in the OSI Model, where data encoding, encryption, and formatting take center stage. Learn how this layer ...

  8. The TCP/IP Guide

    Presentation Layer (Layer 6) The presentation layer is the sixth layer of the OSI Reference Model protocol stack, and second from the top. It is different from the other layers in two key respects. First, it has a much more limited and specific function than the other layers; it's actually somewhat easy to describe, hurray! Second, it is used ...

  9. The 7 OSI Networking Layers Explained

    Data Link Layer. Network Layer. Transport Layer. Session Layer. Presentation Layer. Application Layer. Summary. The Open Systems Interconnection (OSI) networking model defines a conceptual framework for communications between computer systems. The model is an ISO standard which identifies seven fundamental networking layers, from the physical ...

  10. Presentation Layer of the OSI Model

    The presentation layer is a very important layer because it handles encryption, decryption, and the conversion of complex data into flat-byte strings, a format that is easily transmittable. The ...

  11. OSI model

    The session layer is meant to store states between two connections, like what we use cookies for when working with web programming. The presentation layer is meant to convert between different formats. This was simpler when the only format that was worried about was character encoding, ie ASCII and EBCDIC. When you consider all of the different ...

  12. Presentation layer and Session layer of the OSI model

    The presentation layer is the sixth layer of the OSI Reference model. It defines how data and information is transmitted and presented to the user. It translates data and format code in such a way that it is correctly used by the application layer. It identifies the syntaxes that different applications use and formats data using those syntaxes.

  13. Presentation Layer

    In the presentation layer, data translation is the primary activity performed. The sender's application passes data down to the presentation layer, where it is put into a common format. When the data is received on the other end, the presentation layer changes the data from the common format back into a format that is useable by the application.

  14. Presentation Layer in OSI Model

    The presentation layer is the 6 th layer from the bottom in the OSI model. This layer presents the incoming data from the application layer of the sender machine to the receiver machine. It converts one format of data to another format of data if both sender and receiver understand different formats; hence this layer is also called the ...

  15. What is the Presentation Layer?

    Presentation Layer: The presentation layer is layer 6 of the 7-layer Open Systems Interconnection (OSI) model. It is used to present data to the application layer (layer 7) in an accurate, well-defined and standardized format. The presentation layer is sometimes called the syntax layer.

  16. What is the OSI model? The 7 layers of OSI explained

    The seven Open Systems Interconnection layers are the following. Layer 7. The application layer. The application layer enables the user -- human or software -- to interact with the application or network whenever the user elects to read messages, transfer files or perform other network-related tasks.

  17. PDF Presentation Layer

    The presentation layer is concerned with preserving the meaning of information sent across a network. The presentation layer may represent (encode) the data in various ways (e.g., data compression, or encryption), but the receiving peer will convert the encoding back into its original meaning. The presentation layer concerns itself with the ...

  18. The OSI Model and You Part 6: Stopping Threats at the OSI Presentation

    The simplest way to describe the OSI presentation layer is as follows: it is where machine-readable code gets processed into something the end user can use later in the application layer.

  19. Presentation Layer: Protocols, Examples, Services

    Presentation Layer is the 6th layer in the Open System Interconnection (OSI) model that is the lowest layer, where all application programmer consider data structure and presentation, beyond of simply sending the data into form of datagram otherwise packets in between the hosts.

  20. Presentation Layer of the OSI Model: Definition and Function

    The presentation layer is the sixth layer of the Open Systems Interconnection (OSI), model. In computer networking, the OSI model is a concept that describes the transmission of data from one computer to another. Each layer in the model is a packet of protocols, or procedures that govern data transmission, which allow the layer to execute ...

  21. What is the Presentation Layer, Anyway?

    It's the presentation layer that knows to put the right information into the appropriate fields of a customer record, for example: Name, Date of Birth, Address, etc. The presentation layer is where you'll find the code for making a program look nice as well. Most importantly to this discussion, the presentation layer is where RPA functions.

  22. Headless CMS explained in one minute

    A headless CMS is a content management system that separates the presentation layer (where content is presented) from the backend (where content is managed). A headless CMS allows you to manage content in one place and be able to deploy that content on any digital channel you choose. Separating the frontend from the backend unlocks your content ...

  23. How to view artwork in Illustrator

    To view all artwork in a layer as outlines, Ctrl‑click (Windows) or Command-click (macOS) the eye icon for the layer in the Layers panel. Ctrl‑click (Windows) or Command-click (macOS) again to return to previewing artwork in color. ... In Presentation mode, the active artboard of the current Illustrator document fills the entire screen. In ...

  24. How to use Layers in Paint in Windows 11

    Open the Windows 11 Paint app. You will see a Layers button in the top-right corner of the command bar. Click that button. A Layers panel will appear on the right side of the canvas, displaying ...

  25. Scholarly Article or Book Chapter

    Layer number dependent ferroelasticity in 2D Ruddlesden-Popper organic-inorganic hybrid perovskites ... Poster, Presentation, Protocol or Paper. Deposit scholarly works such as posters, presentations, research protocols, conference papers or white papers. If you would like to deposit a peer-reviewed article or book chapter, use the ...

  26. 2024 Digital Humanities Research Showcase

    12-12:30 pm -- Lunch, Welcome Remarks, and Presentation on "A Decade of CESTA Data" 12:30-3:30 pm -- DH Research Fellows' Showcase 12:30 - 1:50 PM : The Meaning and Measurement of Place with presentations from: Matt Randolph (PhD Candidate in History): "Bringing AI to Archibald Grimké's Archive: A Case Study of Artificial Intelligence for Histories of Race and Slavery" This digital project ...

  27. Share slides in Microsoft Teams meetings with PowerPoint Live

    Present your slides. If you're already in a Teams meeting, select Share and then under the PowerPoint Live section, choose the PowerPoint file you're wanting to present. If you don't see the file in the list, select Browse OneDrive or Browse my computer. If your presentation is already open in PowerPoint for Windows or Mac, go to the file ...

  28. Mechanical properties of multi-material polymers additively

    Colorful presentation models are the first step to gain experience in multi-material printing. The investigation will then be extended to include the combination of different materials. ... The focus of this contribution is on the fused layer modeling (FLM) process with experiments and analysis on the application of different materials (PLA ...