The plaintext data at the source is encrypted into ciphertext (unreadable format), then it is sent to the receiver, where the ciphertext is decrypted into plaintext. Now, if the hacker tries to hack the data, the hacker receives an encrypted, unreadable form, and if the hacker tries to send modified data, the receiver can detect the modification during decryption; thereby, the data remains safe. If the file size is large, it becomes difficult to transmit the large file over the network. File size can be decreased by compressing the file for easy transmission of data. Compression is the method of diminishing the size of a file to transmit data easily in less time. When the compressed data reaches the receiver, the data is reconstructed back to the original size, and this process is called decompression.
The presentation layer in the OSI model is classified into two sublayers:
This sublayer offers services to layer-7, i.e., the application layer, and requests services from layer-5, i.e., the session layer. It supports various application services, such as Reliable Transfer Service Element (RTSE), Remote Operation Service Element (ROSE), Association Control Service Element (ACSE), and Commitment Concurrency and Recovery (CCR). This sublayer offers application-specific protocols, such as Message Oriented Text Interchange Standard (MOTIS), Remote Database Access (RDA), File Transfer Access and Manager (FTAM), Common Management Information Protocol (CMIP), Virtual Terminal (VT), Distributed Transaction Processing (DTP), Job Transfer and Manipulation (JTM), and others. It is a presentation layer protocol in the OSI model, which was formed by Citrix Systems. It is used for transferring data from server to client. It is a very thin protocol as it does not require much overhead in order to transmit data from the server over to the client. It is well-optimized for the WAN. It is the protocol that is used to implement the presentation layer of the OSI model. It provides different kinds of data representation, such as images, video, audio, numbers, etc. It is used for Microsoft Remote Procedure Call (Microsoft RPC) and Distributed Computing Environment (DCE) / Remote Procedure Calls (RPC). It is a communication protocol that was specifically designed for macOS by Apple, Inc. It provides file services for Classic Mac OS and macOS. This protocol is used to share files over the network. It is a protocol that is associated with the client-server operating system. The user can access the directory, print, message, file, clock synchronization, etc., with the help of this protocol. It supports many platforms, such as Linux, Classic Mac OS, Windows NT, Mac OS X, and Microsoft Windows. It is a telecommunications equipment that splits a stream of data into separate packets and formats packet headers for asynchronous communication on X.25 networks. It receives packets from the network and converts them into a stream of data. The PAD provides many asynchronous terminal connectivities to a host computer. It is a computer network protocol that is used to transfer data between two systems. It was first published in 1987. XDR is used by various systems such as NDMP, Network File System, NetCDF, ZFS, Open Network Computer Remote Procedure Call, and others. It is a protocol that offers ISO presentation services over TCP/IP based networks. This protocol explains an approach to provide stream-line support for OSI over TCP/IP based networks.We provides tutorials and interview questions of all technology like java tutorial, android, java frameworks
G-13, 2nd Floor, Sec-3, Noida, UP, 201301, India
[email protected] .
Latest Post
PRIVACY POLICY
A tutorial on the open systems interconnection (osi) networking reference model plus tips on how to memorize the seven layers..
The Open Systems Interconnect (OSI) model is a conceptual framework that describes networking or telecommunications systems as seven layers, each with its own function.
The layers help network pros visualize what is going on within their networks and can help network managers narrow down problems (is it a physical issue or something with the application?), as well as computer programmers (when developing an application, which other layers does it need to work with?). Tech vendors selling new products will often refer to the OSI model to help customers understand which layer their products work with or whether it works “across the stack”.
The layers (from bottom to top) are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
It wasn’t always this way. Conceived in the 1970s when computer networking was taking off, two separate models were merged in 1983 and published in 1984 to create the OSI model that most people are familiar with today. Most descriptions of the OSI model go from top to bottom, with the numbers going from Layer 7 down to Layer 1.
The layers, and what they represent, are as follows:
The Application Layer in the OSI model is the layer that is the “closest to the end user”. It receives information directly from users and displays incoming data to the user. Oddly enough, applications themselves do not reside at the application layer. Instead the layer facilitates communication through lower layers in order to establish connections with applications at the other end. Web browsers (Google Chrome, Firefox, Safari, etc.) TelNet, and FTP, are examples of communications that rely on Layer 7.
The Presentation Layer represents the area that is independent of data representation at the application layer. In general, it represents the preparation or translation of application format to network format, or from network formatting to application format. In other words, the layer “presents” data for the application or the network. A good example of this is encryption and decryption of data for secure transmission; this happens at Layer 6.
When two computers or other networked devices need to speak with one another, a session needs to be created, and this is done at the Session Layer . Functions at this layer involve setup, coordination (how long should a system wait for a response, for example) and termination between the applications at each end of the session.
The Transport Layer deals with the coordination of the data transfer between end systems and hosts. How much data to send, at what rate, where it goes, etc. The best known example of the Transport Layer is the Transmission Control Protocol (TCP), which is built on top of the Internet Protocol (IP), commonly known as TCP/IP. TCP and UDP port numbers work at Layer 4, while IP addresses work at Layer 3, the Network Layer.
Here at the Network Layer is where you’ll find most of the router functionality that most networking professionals care about and love. In its most basic sense, this layer is responsible for packet forwarding, including routing through different routers . You might know that your Boston computer wants to connect to a server in California, but there are millions of different paths to take. Routers at this layer help do this efficiently.
The Data Link Layer provides node-to-node data transfer (between two directly connected nodes), and also handles error correction from the physical layer. Two sublayers exist here as well–the Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. In the networking world, most switches operate at Layer 2. But it’s not that simple. Some switches also operate at Layer 3 in order to support virtual LANs that may span more than one switch subnet, which requires routing capabilities.
At the bottom of our OSI model we have the Physical Layer, which represents the electrical and physical representation of the system. This can include everything from the cable type, radio frequency link (as in a Wi-Fi network), as well as the layout of pins, voltages, and other physical requirements. When a networking problem occurs, many networking pros go right to the physical layer to check that all of the cables are properly connected and that the power plug hasn’t been pulled from the router, switch or computer, for example.
Most people in IT will likely need to know about the different layers when they’re going for their certifications, much like a civics student needs to learn about the three branches of the US government. After that, you hear about the OSI model when vendors are making pitches about which layers their products work with.
In a Quora post asking about the purpose of the OSI model, Vikram Kumar answered this way: “The purpose of the OSI reference model is to guide vendors and developers so the digital communication products and software programs they create will interoperate, and to facilitate clear comparisons among communications tools.”
While some people may argue that the OSI model is obsolete (due to its conceptual nature) and less important than the four layers of the TCP/IP model, Kumar says that “it is difficult to read about networking technology today without seeing references to the OSI model and its layers, because the model’s structure helps to frame discussions of protocols and contrast various technologies.”
If you can understand the OSI model and its layers, you can also then understand which protocols and devices can interoperate with each other when new technologies are developed and explained.
In a post on GeeksforGeeks, contributor Vabhav Bilotia argues several reasons why the OSI model remains relevant, especially when it comes to security and determining where technical risks and vulnerabilities may exist.
For example, by understanding the different layers, enterprise security teams can identify and classify physical access, where the data is sitting, and provide an inventory of the applications that employees use to access data and resources.
“Knowing where the majority of your company’s data is held, whether on-premises or in cloud services, will help define your information security policy,” writes Bilotia. “You can invest in the correct solutions that provide you data visibility within the proper OSI layers once you have this knowledge.”
In addition, the OSI model can be used to understand cloud infrastructure migrations, particularly when it comes to securing data within the cloud.
And because the model has been around for so long and understood by so many, the uniform vocabulary and terms helps networking professionals understand quickly about the components of the networking system “While this paradigm is not directly implemented in today’s TCP/IP networks, it is a useful conceptual model for relating multiple technologies to one another and implementing the appropriate technology in the appropriate way,” Bilotia writes. We couldn’t agree more.
If you need to memorize the layers for a college or certification test, here are a few sentences to help remember them in order. The first letter of each word is the same as the first letter an OSI layer.
From Application to Physical (Layer 7 to Layer 1):
From Physical to Application (Layer 1 to Layer 7):
Network jobs watch: hiring, skills and certification trends, 10-year forecast shows growth in network architect jobs while sysadmin roles shrink, infoblox tackles integrated ddi across multi-cloud environments, 2024 global network outage report and internet health check, newsletter promo module test.
The first gadget Keith Shaw ever wanted was the Merlin, a red plastic toy that beeped and played Tic-Tac-Toe and various other games. A child of the '70s and teenager of the '80s, Shaw has been a fan of computers, technology and video games right from the start. He won an award in 8th grade for programming a game on the school's only computer, and saved his allowance to buy an Atari 2600.
Shaw has a bachelor's degree in newspaper journalism from Syracuse University and has worked at a variety of newspapers in New York, Florida and Massachusetts, as well as Computerworld and Network World. He won an award from the American Society of Business Publication Editors for a 2003 article on anti-spam testing, and a Gold Award in their 2010 Digital Awards Competition for the "ABCs of IT" video series.
Shaw is also the co-creator of taquitos.net , the crunchiest site on the InterWeb, which has taste-tested and reviewed more than 4,000 varieties of snack foods.
What is a network router how ai networking driving its evolution, bgp: what is border gateway protocol, and how does it work, what is a virtual machine, and why are they so useful, what is a network switch and how does it work, what is zero trust network access, what is sd-wan, and what does it mean for networking, security, cloud, what is beamforming and how does it make wireless better, colleges expand vpn capacity, conferencing to answer covid-19, show me more, security, aiops top mainframe customer challenges, bmc says.
Sponsored Links
Home » Computer Network
Description and Functions of Presentation Layer in the OSI model: In this tutorial, we are going to learn what the Presentation layer is and the Functions of the Presentation Layer in the OSI model in Computer Networking. We will also discuss the Design issues with the Presentation Layer and the working of the Presentation Layer with the help of its diagram. By Monika Jha Last updated : May 05, 2023
The Presentation Layer is concerned with the syntax and semantics of the information exchanged between two communicating devices.
This figure shows the relationship of the presentation layer to the session layer and application layer.
The following are the design issues with presentation layer:
Specific functionalities of the presentation layer are as follows:
Example: Convert ASCII code to EBCDIC code.
Related Tutorials
Comments and Discussions!
Load comments ↻
Copyright © 2024 www.includehelp.com. All rights reserved.
OSI stands for Open Systems Interconnection , where open stands to say non-proprietary. It is a 7-layer architecture with each layer having specific functionality to perform. All these 7 layers work collaboratively to transmit the data from one person to another across the globe. The OSI reference model was developed by ISO – ‘International Organization for Standardization ‘, in the year 1984.
The OSI model provides a theoretical foundation for understanding network communication . However, it is usually not directly implemented in its entirety in real-world networking hardware or software . Instead, specific protocols and technologies are often designed based on the principles outlined in the OSI model to facilitate efficient data transmission and networking operations
Data link layer (dll) – layer 2, network layer – layer 3, transport layer – layer 4, session layer – layer 5, presentation layer – layer 6, application layer – layer 7.
The OSI model, created in 1984 by ISO , is a reference framework that explains the process of transmitting data between computers. It is divided into seven layers that work together to carry out specialised network functions , allowing for a more systematic approach to networking.
For those preparing for competitive exams like GATE, a strong understanding of networking concepts, including the OSI model, is crucial. To deepen your knowledge in this area and other key computer science topics, consider enrolling in the GATE CS Self-Paced course . This course offers comprehensive coverage of the syllabus, helping you build a solid foundation for your exam preparation.
When we transfer information from one device to another, it travels through 7 layers of OSI model. First data travels down through 7 layers from the sender’s end and then climbs back 7 layers on the receiver’s end.
Data flows through the OSI model in a step-by-step process:
Each layer adds specific information to ensure the data reaches its destination correctly, and these steps are reversed upon arrival.
Let’s look at it with an Example:
Luffy sends an e-mail to his friend Zoro.
Step 1: Luffy interacts with e-mail application like Gmail , outlook , etc. Writes his email to send. (This happens in Layer 7: Application layer )
Step 2: Mail application prepares for data transmission like encrypting data and formatting it for transmission. (This happens in Layer 6: Presentation Layer )
Step 3: There is a connection established between the sender and receiver on the internet. (This happens in Layer 5: Session Layer )
Step 4: Email data is broken into smaller segments. It adds sequence number and error-checking information to maintain the reliability of the information. (This happens in Layer 4: Transport Layer )
Step 5: Addressing of packets is done in order to find the best route for transfer. (This happens in Layer 3: Network Layer )
Step 6: Data packets are encapsulated into frames, then MAC address is added for local devices and then it checks for error using error detection. (This happens in Layer 2: Data Link Layer )
Step 7: Lastly Frames are transmitted in the form of electrical/ optical signals over a physical network medium like ethernet cable or WiFi.
After the email reaches the receiver i.e. Zoro, the process will reverse and decrypt the e-mail content. At last, the email will be shown on Zoro’s email client.
The OSI model consists of seven abstraction layers arranged in a top-down order:
The lowest layer of the OSI reference model is the physical layer. It is responsible for the actual physical connection between the devices. The physical layer contains information in the form of bits. It is responsible for transmitting individual bits from one node to the next. When receiving data, this layer will get the signal received and convert it into 0s and 1s and send them to the Data Link layer, which will put the frame back together.
Note: Hub, Repeater, Modem, and Cables are Physical Layer devices. Network Layer, Data Link Layer, and Physical Layer are also known as Lower Layers or Hardware Layers .
The data link layer is responsible for the node-to-node delivery of the message. The main function of this layer is to make sure data transfer is error-free from one node to another, over the physical layer. When a packet arrives in a network, it is the responsibility of the DLL to transmit it to the Host using its MAC address . The Data Link Layer is divided into two sublayers:
The packet received from the Network layer is further divided into frames depending on the frame size of the NIC(Network Interface Card). DLL also encapsulates Sender and Receiver’s MAC address in the header.
The Receiver’s MAC address is obtained by placing an ARP(Address Resolution Protocol) request onto the wire asking “Who has that IP address?” and the destination host will reply with its MAC address.
Note: Packet in the Data Link layer is referred to as Frame. Data Link layer is handled by the NIC (Network Interface Card) and device drivers of host machines. Switch & Bridge are Data Link Layer devices.
The network layer works for the transmission of data from one host to the other located in different networks. It also takes care of packet routing i.e. selection of the shortest path to transmit the packet, from the number of routes available. The sender & receiver’s IP address es are placed in the header by the network layer.
Note: Segment in the Network layer is referred to as Packet . Network layer is implemented by networking devices such as routers and switches.
The transport layer provides services to the application layer and takes services from the network layer. The data in the transport layer is referred to as Segments . It is responsible for the end-to-end delivery of the complete message. The transport layer also provides the acknowledgment of the successful data transmission and re-transmits the data if an error is found.
At the sender’s side: The transport layer receives the formatted data from the upper layers, performs Segmentation , and also implements Flow and error control to ensure proper data transmission. It also adds Source and Destination port number s in its header and forwards the segmented data to the Network Layer.
Note: The sender needs to know the port number associated with the receiver’s application. Generally, this destination port number is configured, either by default or manually. For example, when a web application requests a web server, it typically uses port number 80, because this is the default port assigned to web applications. Many applications have default ports assigned.
At the receiver’s side: Transport Layer reads the port number from its header and forwards the Data which it has received to the respective application. It also performs sequencing and reassembling of the segmented data.
1. Connection-Oriented Service: It is a three-phase process that includes:
In this type of transmission, the receiving device sends an acknowledgment, back to the source after a packet or group of packets is received. This type of transmission is reliable and secure.
2. Connectionless service: It is a one-phase process and includes Data Transfer. In this type of transmission, the receiver does not acknowledge receipt of a packet. This approach allows for much faster communication between devices. Connection-oriented service is more reliable than connectionless Service.
Note: Data in the Transport Layer is called Segments . Transport layer is operated by the Operating System. It is a part of the OS and communicates with the Application Layer by making system calls. The transport layer is called as Heart of the OSI model. Device or Protocol Use : TCP, UDP NetBIOS, PPTP
This layer is responsible for the establishment of connection, maintenance of sessions, and authentication, and also ensures security.
Note: All the below 3 layers(including Session Layer) are integrated as a single layer in the TCP/IP model as the “Application Layer”. Implementation of these 3 layers is done by the network application itself. These are also known as Upper Layers or Software Layers. Device or Protocol Use : NetBIOS, PPTP.
Let us consider a scenario where a user wants to send a message through some Messenger application running in their browser. The “ Messenger ” here acts as the application layer which provides the user with an interface to create the data. This message or so-called Data is compressed, optionally encrypted (if the data is sensitive), and converted into bits (0’s and 1’s) so that it can be transmitted.
Communication in Session Layer
The presentation layer is also called the Translation layer . The data from the application layer is extracted here and manipulated as per the required format to transmit over the network.
Note: Device or Protocol Use: JPEG, MPEG, GIF.
At the very top of the OSI Reference Model stack of layers, we find the Application layer which is implemented by the network applications. These applications produce the data to be transferred over the network. This layer also serves as a window for the application services to access the network and for displaying the received information to the user.
Example : Application – Browsers, Skype Messenger, etc.
Note: The application Layer is also called Desktop Layer. Device or Protocol Use : SMTP .
The main functions of the application layer are given below.
Note: The OSI model acts as a reference model and is not implemented on the Internet because of its late invention. The current model being used is the TCP/IP model.
|
|
|
|
|
---|---|---|---|---|
7 | Helps in identifying the client and synchronizing communication. | Message | ||
6 | Data from the application layer is extracted and manipulated in the required format for transmission. | Message | , , | |
5 | Establishes Connection, Maintenance, Ensures Authentication and Ensures security. | Message (or encrypted message) | ||
4 | Take Service from Network Layer and provide it to the Application Layer. | Segment | ||
3 | Transmission of data from one host to another, located in different networks. | Packet | ||
2 | Node to Node Delivery of Message. | Frame | , | |
1 | Establishing Physical Connections between Devices. | Bits | , , , Cables |
TCP/IP protocol ( Transfer Control Protocol/Internet Protocol ) was created by U.S. Department of Defense’s Advanced Research Projects Agency (ARPA) in 1970s.
Some key differences between the OSI model and the TCP/IP Model are:
OSI vs TCP/IP
Even though the modern Internet doesn’t strictly use the OSI Model (it uses a simpler Internet protocol suite), the OSI Model is still very helpful for solving network problems. Whether it’s one person having trouble getting their laptop online, or a website being down for thousands of users, the OSI Model helps to identify the problem. If you can narrow down the issue to one specific layer of the model, you can avoid a lot of unnecessary work.
Imperva security solutions protect your applications at different levels of the OSI model. They use DDoS mitigation to secure the network layer and provide web application firewall (WAF), bot management, and API security to protect the application layer.
To secure applications and networks across the OSI stack, Imperva offers multi-layered protection to ensure websites and applications are always available, accessible, and safe. The Imperva application security solution includes:
The OSI Model defines the communication of a computing system into 7 different layers. Its advantages include:
In conclusion, the OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven distinct layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application. Each layer has specific responsibilities and interacts with the layers directly above and below it, ensuring seamless communication and data exchange across diverse network environments. Understanding the OSI model helps in troubleshooting network issues, designing robust network architectures, and facilitating interoperability between different networking products and technologies.
Is osi layer still used.
Yes, the OSI model is still used by networking professionals to understand data abstraction paths and processes better.
Layer 7 or Application layer is highest layer of OSI model.
Layer 8 doesn’t actually exist in the OSI model but is often jokingly used to refer to the end user. For example: a layer 8 error would be a user error.
Please login to comment....
Each layer explained
The Open Systems Interconnection (OSI) model defines a networking framework to implement protocols in layers, with control passed from one layer to the next. It is primarily used today as a teaching tool. It conceptually divides computer network architecture into 7 layers in a logical progression.
The lower layers deal with electrical signals, chunks of binary data , and routing of these data across networks. Higher levels cover network requests and responses, representation of data, and network protocols, as seen from a user's point of view.
The OSI model was originally conceived as a standard architecture for building network systems, and many popular network technologies today reflect the layered design of OSI.
At Layer 1, the Physical layer of the OSI model is responsible for the ultimate transmission of digital data bits from the Physical layer of the sending (source) device over network communications media to the Physical layer of the receiving (destination) device.
Examples of layer 1 technologies include Ethernet cables and hubs . Also, hubs and other repeaters are standard network devices that function at the Physical layer, as are cable connectors.
At the Physical layer, data is transmitted using the type of signaling supported by the physical medium: electric voltages, radio frequencies, or pulses of infrared or ordinary light.
When obtaining data from the Physical layer, the Data Link layer checks for physical transmission errors and packages bits into data frames. The Data Link layer also manages physical addressing schemes such as MAC addresses for Ethernet networks, controlling access of network devices to the physical medium.
Because the Data Link layer is the most complex layer in the OSI model, it is often divided into two parts: the Media Access Control sub-layer and the Logical Link Control sub-layer.
The Network layer adds the concept of routing above the Data Link layer. When data arrives at the Network layer, the source and destination addresses contained inside each frame are examined to determine if the data has reached its final destination. If the data has reached the final destination, layer 3 formats the data into packets delivered to the Transport layer. Otherwise, the Network layer updates the destination address and pushes the frame down to the lower layers.
To support routing, the Network layer maintains logical addresses such as IP addresses for devices on the network. The Network layer also manages the mapping between these logical addresses and physical addresses. In IPv4 networking, this mapping is accomplished through the Address Resolution Protocol (ARP); IPv6 uses Neighbor Discovery Protocol (NDP).
The Transport Layer delivers data across network connections. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are the most common examples of Transport Layer 4 network protocols. Different transport protocols may support a range of optional capabilities, including error recovery, flow control, and support for re-transmission.
The Session Layer manages the sequence and flow of events that initiate and tear down network connections. At layer 5, it is built to support multiple types of connections that can be created dynamically and run over individual networks.
The Presentation layer has the simplest function of any piece of the OSI model. At layer 6, it handles syntax processing of message data such as format conversions and encryption/decryption needed to support the Application layer above it.
The Application layer supplies network services to end-user applications. Network services are protocols that work with the user's data. For example, in a web browser application, the Application layer protocol HTTP packages the data needed to send and receive web page content. This layer 7 provides data to (and obtains data from) the Presentation layer.
Get the Latest Tech News Delivered Every Day
Cite this chapter.
Part of the book series: Applications of Communications Theory ((ACTH))
259 Accesses
This chapter discusses the Application and Presentation Layers of the Reference Model of Open Systems Interconnection (OSI) [1]. The Application and Presentation Layers perform functions necessary to exchange information between application processes; the Application Layer is concerned with the semantic aspects of the information exchange, while the Presentation Layer is concerned with the syntactic aspects. The ability to manage the semantic and syntactic elements of the information to be exchanged is key to ensuring that the information can be interpreted by the communicants.
This is a preview of subscription content, log in via an institution to check access.
Subscribe and save.
Tax calculation will be finalised at checkout
Purchases are for personal use only
Institutional subscriptions
Unable to display preview. Download preview PDF.
ISO 7498, “Information processing systems—Open Systems Interconnection—Basic Reference Model,” 1984. CCITT Recommendation X.200, “Reference model of open systems interconnection for CCITT applications,” 1984 (updated expected in 1988).
Google Scholar
ISO DIS 9545, “Information processing systems—Open Systems Interconnection—Application Layer structure,” September 1988.
ISO TR 9007, “Concepts and terminology for the conceptual schema and the information base,” 1985.
ISO 8649, “Information processing systems—Open systems interconnection—Service definition for the association control service element,” 1988. ISO 8650, “Information processing systems—Open systems interconnection—Protocol specification for the association control service element,” 1988. CCITT Recommendation X.217, “Association control service definition for open systems interconnection for CCITT applications,” 1988. CCITT Recommendation X.227, “Association control protocol specification for open systems interconnection for CCITT applications,” final text December, 1987.
ISO 8571, “Information processing systems—Open systems interconnection—File transfer, access, and management,” Parts 1–4, 1988.
ISO/DIS 9804, “Information processing systems”Open systems interconnection—Service definition for commitment, concurrency, and recovery,” 1988 (text in SC 21 N 2573, March, 1988). ISO DIS 9805, “Information processing systems—Open systems interconnection—Protocol specification for commitment, concurrency, and recovery,” 1988 (text in SC 21 N 2574, March, 1988). CCITT Recommendation X.237, “Commitment, concurrency, and recovery service definition,” Draft Text, 1988. CCITT Recommendation X.247, “Commitment, concurrency, and recovery protocol specification, Draft Text, 1988.
ISO DIS 9040, “Information processing systems—Open systems interconnection—Virtual terminal service—Basic class,” 1988 (text in SC 21 N 2615, March, 1988). ISO DIS 9041, “Information processing systems—Open systems interconnection—Virtual terminal protocol—Basic class,” 1988 (text in SC 21 N 2616, March, 1988).
ISO DIS 9066–1, “Reliable transfer service”, 1988 (text in SC 18 N 1408, March, 1988). ISO DIS 9066–2, “Reliable transfer protocol specification,” 1988 (text in SC 18 N 1409). CCITT Recommendation X.218, “Reliable transfer: Model and service definition,” 1988. CCITT Recommendation X.228, “Reliable transfer: Protocol specification,” 1988.
ISO DIS 9072–1, “Remote operations service,” 1988 (text in SC 18 N 1410, March, 1988). ISO DIS 9072–2, “Remote operations protocol specification,” 1988 (text in SC 18 N 1411, March, 1988). CCITT Recommendation X.219, “Remote operations: Model, notation, and service definition,” 1988. CCITT Recommendation X.229, “Remote operations: Protocol specification,” 1988.
ISO DIS 9594, “Information processing—Open systems interconnection—The directory,” parts 1–8, 1988 (text in SC 21 N 2751 through N 2758, April, 1988). CCITT X.500, “Series recommendations on directory,” November, 1987.
ISO DIS 10021, “Information processing—Text communication—Message oriented text interchange system,” 1988 (text in SC 18 N 1487 through N 1493, May, 1988). CCITT X.400, “Series recommendations for message handling systems,” 1988.
ISO 8613/1–8, “Office document architecture and interchange format,” 1988, awaiting publication. CCITT T.400, “Series recommendations for document architecture, transfer, and manipulation,” 1988.
ISO 8824, “Information processing systems—Open systems interconnection—Specification of abstract syntax notation one (ASN.1),” 1987; and ISO 8824/PDAD 1, “Information processing systems—Open systems interconnection—Specification for ASN.1: Proposed draft Addendum 1 on ASN.1 extensions,” 1988 (final text in SC 21 N 2341 Revised, April, 1988). CCITT Recommendation X.208, “Specification of abstract syntax notation one (ASN.1),” 1988.
ISO 8822, “Information processing systems—Open systems interconnection—Connection oriented presentation service definition,” 1988. CCITT Recommendation X.216, “Presentation service definition for open systems interconnection for CCITT applications,” 1988.
ISO 8825, “Information processing—Open systems interconnection—Specification of basic encoding rules for abstract syntax notation one (ASN.1),” 1987; and ISO 8825/ PDAD 1, “Information processing systems—Open systems interconnection—Specification of basic encoding rules for ASN.1: Proposed draft addendum 1 on ASN.1 extensions,” 1988 (text in SC 21 N 2342 Revised, April, 1988). CCITT Recommendation X.209, “Specification of basic encoding rules for abstract syntax notation one (ASN.1),” 1988.
ISO 8823, “Information processing systems—Open systems interconnection—Connection oriented presentation protocol specification,” 1988. CCITT Recommendation X.226, “Presentation protocol specification for open systems interconnection for CCITT applications,” 1988.
ISO 8326, “Information processing systems—Open systems interconnection—Basic connection oriented session service definition,” 1987; and ISO 8326/AD 2, “Information processing systems—Open systems interconnection—Basic connection oriented session service definition—Addendum 2: Incorporation of unlimited user data,” 1988. ISO 8327, “Information processing systems—Open systems interconnection—Basic connection oriented session protocol specification,” 1987; and ISO 8327/AD 2, “Information processing systems—Open systems interconnection—Basic connection oriented session protocol specification—Addendum 2: Unlimited session user data protocol specification,” 1988.
CCITT Recommendation X.215, “Session service definition for open systems interconnection for CCITT applications,” 1988. CCITT Recommendation X.225, “Session protocol specification for open systems interconnection for CCITT applications,” 1988.
Download references
Authors and affiliations.
AT&T Bell Laboratories, 07733, Holmdel, New Jersey, USA
Paul D. Bartoli
You can also search for this author in PubMed Google Scholar
Editors and affiliations.
Unisys West Coast Research Center, Santa Monica, 90406, California, USA
Carl A. Sunshine
Reprints and permissions
© 1989 Plenum Press, New York
Bartoli, P.D. (1989). OSI Presentation and Application Layers. In: Sunshine, C.A. (eds) Computer Network Architectures and Protocols. Applications of Communications Theory. Springer, Boston, MA. https://doi.org/10.1007/978-1-4613-0809-6_13
DOI : https://doi.org/10.1007/978-1-4613-0809-6_13
Publisher Name : Springer, Boston, MA
Print ISBN : 978-1-4612-8093-4
Online ISBN : 978-1-4613-0809-6
eBook Packages : Springer Book Archive
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
Policies and ethics
IMAGES
VIDEO
COMMENTS
Prerequisite : OSI Model. Introduction : Presentation Layer is the 6th layer in the Open System Interconnection (OSI) model. This layer is also known as Translation layer, as this layer serves as a data translator for the network. The data which this layer receives from the Application Layer is extracted and manipulated here as per the required ...
OSI Layer 6 - Presentation Layer. The presentation layer is responsible for the delivery and formatting of information to the application layer for further processing or display. It relieves the application layer of concern regarding syntactical differences in data representation within the end-user systems. An example of a presentation service ...
What is Presentation Layer. Definition: Presentation layer is 6th layer in the OSI model, and its main objective is to present all messages to upper layer as a standardized format.It is also known as the "Translation layer". This layer takes care of syntax and semantics of messages exchanged in between two communication systems.
The Top layer of the OSI model is the application layer. It provides the protocols and services that are required by the network-aware applications to connect to the network. FTP, TFTP, POP3, SMTP, and HTTP are examples of standards and protocols used in this layer.
In the seven-layer OSI model of computer networking, the presentation layer is layer 6 and serves as the data translator for the network. [2] [3] [4] ... In many widely used applications and protocols no distinction is actually made between the presentation and application layers. For example, ...
The presentation layer is the sixth layer of the OSI Reference model. It defines how data and information is transmitted and presented to the user. It translates data and format code in such a way that it is correctly used by the application layer. It identifies the syntaxes that different applications use and formats data using those syntaxes.
The model was made to break down each functional layer so that overall design complexity could be lessened. The model was constructed with seven layers for the flow of information. These are: Application Layer. Presentation layer. Session layer. Transport layer. Network layer. Data link layer.
If not for the presentation layer, the data would be sent as datagrams or data packets between hosts. This layer ensures a successful file transfer. In computer networking, the OSI model layer 6 is sometimes referred to as the syntax layer because it maintains the proper syntax of transferred data. This layer also deals with the semantics of ...
The Presentation Layer is a crucial component of the OSI model, responsible for ensuring that data exchanged between systems is in a format that can be understood and used. By performing functions such as data translation, formatting, compression, and encryption, the Presentation Layer plays a vital role in maintaining data integrity ...
Presentation Layer - OSI Reference Model. The primary goal of this layer is to take care of the syntax and semantics of the information exchanged between two communicating systems. Presentation layer takes care that the data is sent in such a way that the receiver will understand the information (data) and will be able to use the data.
Layer 6 OSI Model. An example of a program that loosely adheres to layer 6 of OSI is the tool that manages the Hypertext Transfer Protocol (HTTP) — although it's technically considered an application-layer protocol per the TCP/IP model. However, HTTP includes presentation layer services within it.
The presentation layer resides at Layer 6 of the Open Systems Interconnection (OSI) communications model and ensures that communications that pass through it are in the appropriate form for the recipient application. In other words, the presentation layer presents the data in a readable format from an application layer perspective.
Physical layer: First and lowest layer of the OSI model. It is used for data transmission and defines the physical connection between the sending and receiving devices, providing security for the ...
Structural Differences. OSI model: Introduced as a comprehensive, protocol-independent framework, the OSI model details seven distinct layers, offering a more granular approach to network communication. TCP/IP model: Developed earlier by the U.S. Department of Defense, the TCP/IP model consists of four layers (Application, Transport, Internet ...
The presentation layer is the 6 th layer from the bottom in the OSI model. This layer presents the incoming data from the application layer of the sender machine to the receiver machine. It converts one format of data to another format of data if both sender and receiver understand different formats; hence this layer is also called the ...
The 7 layers of the OSI model. The layers (from bottom to top) are: Physical, Data Link, Network, Transport, Session, Presentation, and Application. It wasn't always this way. Conceived in the ...
Description and Functions of Presentation Layer in the OSI model: In this tutorial, we are going to learn what the Presentation layer is and the Functions of the Presentation Layer in the OSI model in Computer Networking. ... Example: Convert ASCII code to EBCDIC code. 2. Encryption. The system must be able to assure privacy regarding the ...
Prerequisite : OSI Model Introduction : Presentation Layer is the 6th layer in the Open System Interconnection (OSI) model. This layer is also known as Translation layer, as this layer serves as a data translator for the network. The data which this layer receives from the Application Layer is extracted and manipulated here as per the required form
The Open Systems Interconnection (OSI) model defines a networking framework to implement protocols in layers, with control passed from one layer to the next. It is primarily used today as a teaching tool. It conceptually divides computer network architecture into 7 layers in a logical progression. The lower layers deal with electrical signals ...
In subject area: Computer Science. The Presentation Layer in the OSI model is defined as the layer that enables interaction between different application layer implementations by translating data formats and languages to facilitate communication. AI generated definition based on: Security for Microsoft Windows System Administrators, 2011.
13. ion LayersPaul D. BartoliI. IntroductionThis chapter discusses the Application and Presentation Layers of the Reference Model. of Open Systems Interconnection (OSI) [1]. The Applica tion and Presentation Layers perform functions necessary to exchange information between application processes; the Application Layer is con cerned with the ...
The presentation layer is the sixth layer of the Open Systems Interconnection (OSI), model. In computer networking, the OSI model is a concept that describes the transmission of data from one computer to another. Each layer in the model is a packet of protocols, or procedures that govern data transmission, which allow the layer to execute ...