Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,060 --> 00:00:06,000
All right, all right, hello, guys, so we've got a great video here because we are now going to learn
2
00:00:06,000 --> 00:00:07,710
the great Osai model.
3
00:00:08,530 --> 00:00:12,300
It sounds like something that belongs in the United Nations or something, but.
4
00:00:13,180 --> 00:00:17,350
I'll tell you, once you get this, you're going to get it all.
5
00:00:19,650 --> 00:00:20,670
So just to break it down.
6
00:00:21,590 --> 00:00:23,210
With the use of computer networks.
7
00:00:23,840 --> 00:00:30,740
Well, the necessity of a common standard has emerged in order to integrate different manufacturers
8
00:00:30,740 --> 00:00:32,090
into each other's networks.
9
00:00:32,870 --> 00:00:38,720
And the past companies developed their own special network systems and presented them to the customers
10
00:00:38,720 --> 00:00:39,650
as a package.
11
00:00:39,650 --> 00:00:43,780
And no, you have to stay within our domain, right?
12
00:00:44,240 --> 00:00:50,990
It was very expensive and it actually didn't do anybody any good because although they could work pretty
13
00:00:50,990 --> 00:00:56,450
well within themselves, it's very difficult or next to impossible, really for them to communicate
14
00:00:56,810 --> 00:00:59,150
with networks outside of themselves.
15
00:00:59,540 --> 00:01:05,600
For example, IBM operating systems were able to communicate with each other using IBM network devices.
16
00:01:05,660 --> 00:01:06,650
Well, that makes sense.
17
00:01:07,580 --> 00:01:14,450
But as a result of the inability of supply to meet the demand in network systems like, you know, worldwide
18
00:01:14,450 --> 00:01:21,020
and the pressure of hardware manufacturers in the network market, it was kind of understood that a
19
00:01:21,020 --> 00:01:25,670
standard model should be established for the functions of network systems.
20
00:01:26,650 --> 00:01:34,000
So for this reason, the OSAI reference model, which is the computer network standard, was introduced
21
00:01:34,000 --> 00:01:35,470
by the ISO.
22
00:01:35,710 --> 00:01:40,020
Now the ISO is just the International Organization for Standardization.
23
00:01:40,400 --> 00:01:40,660
Right.
24
00:01:41,320 --> 00:01:43,030
And that was back in 1978.
25
00:01:44,100 --> 00:01:52,020
So this standard, which was indeed first revealed in 78, was rearranged in 1984, and then it was
26
00:01:52,020 --> 00:01:58,800
published as the Osai or open system interconnection reference model.
27
00:02:00,420 --> 00:02:05,640
So the model has been widely accepted, and it's actually become a guideline for network operation.
28
00:02:06,930 --> 00:02:10,320
So the Aussie model is just that it's a standard.
29
00:02:11,630 --> 00:02:11,960
Now.
30
00:02:12,930 --> 00:02:16,890
Just as in the past, anyone can develop a network communication model on her own.
31
00:02:17,640 --> 00:02:23,790
However, if the U.S. model is not referenced, it's going to be difficult to communicate with other
32
00:02:23,790 --> 00:02:30,750
networks, and different manufacturers won't be able to produce hardware and software to work on that
33
00:02:30,840 --> 00:02:31,650
network system.
34
00:02:32,220 --> 00:02:33,060
So why bother?
35
00:02:33,840 --> 00:02:40,350
Because the U.S. reference model has divided the processes from the communication medium of both wired
36
00:02:40,350 --> 00:02:47,160
and wireless to the user into seven different layers of computer networks.
37
00:02:49,340 --> 00:02:57,080
Now these are the layers, and I will read them to you as they are listed because they are always in
38
00:02:57,080 --> 00:02:57,620
this order.
39
00:02:59,120 --> 00:03:01,220
So the first layer is the physical layer.
40
00:03:02,150 --> 00:03:04,640
Second is the data link layer.
41
00:03:06,070 --> 00:03:08,440
Third is the network layer.
42
00:03:09,220 --> 00:03:11,500
Fourth is the transport layer.
43
00:03:12,870 --> 00:03:21,720
Fifth session, layer six presentation layer and finally seven the application layer.
44
00:03:23,520 --> 00:03:23,820
All right.
45
00:03:24,660 --> 00:03:31,440
So always-I is the established standard model for providing data communications, so this hierarchical
46
00:03:31,440 --> 00:03:37,230
network model makes it easier to design and manage computer networks for everybody all over the world,
47
00:03:37,590 --> 00:03:38,730
no matter what their languages.
48
00:03:40,270 --> 00:03:45,580
So according to the Osai model, data is transmitted through all these layers.
49
00:03:46,530 --> 00:03:52,350
Therefore, it's a model that a network specialist should know very well in order to analyze and best
50
00:03:52,350 --> 00:03:58,290
solve a problem in the entire network system because each layer has a task.
51
00:03:59,360 --> 00:04:04,790
Protocols at work on each layer, and these protocols have tasks.
52
00:04:05,390 --> 00:04:05,870
Yeah.
53
00:04:06,620 --> 00:04:11,150
So why don't we just take a look at these layers right now and get used to what they do?
54
00:04:12,560 --> 00:04:14,040
So we've got layer one here, right?
55
00:04:14,060 --> 00:04:22,580
This is the physical layer, and it's the physical layer that defines how data particles or bits are
56
00:04:22,580 --> 00:04:29,300
transmitted in transmission media and the transmission media is just like a cable.
57
00:04:29,570 --> 00:04:32,910
It can be fiber optics as well as the air.
58
00:04:32,930 --> 00:04:33,320
Right.
59
00:04:33,530 --> 00:04:35,030
Wi-Fi radio signals all that.
60
00:04:35,980 --> 00:04:43,570
Now on the sending side, the physical layer sends of ones and zeros in a way that a transmission medium
61
00:04:43,570 --> 00:04:44,380
can understand it.
62
00:04:44,470 --> 00:04:50,170
So its electrical signals radio signals its light flashes, right?
63
00:04:50,770 --> 00:04:57,850
So on the receiving side, the physical layer converts the signals red from the transmission medium
64
00:04:57,850 --> 00:04:59,920
back to ones and zeros.
65
00:05:01,550 --> 00:05:07,250
So in order for network equipment from different manufacturers to communicate seamlessly with each other,
66
00:05:07,640 --> 00:05:13,040
the outgoing and incoming data bits must mean the exact same thing for different brands of equipment.
67
00:05:13,670 --> 00:05:21,260
So in other words, certain standards need to be established and the same protocols need to be used.
68
00:05:24,050 --> 00:05:26,300
All right, so then what's going on in layer two?
69
00:05:26,840 --> 00:05:28,430
This is the data link layer.
70
00:05:29,900 --> 00:05:38,780
So this layer enables the data sent from the source to be framed and forwarded to the destination address.
71
00:05:39,770 --> 00:05:42,680
So this layer consists of two sub layers.
72
00:05:42,950 --> 00:05:43,710
Wait for it.
73
00:05:44,210 --> 00:05:50,180
Media Access Control or Mac and Logical Link Control, or LLC.
74
00:05:50,930 --> 00:05:56,930
The Mac sub layer uses the 48 bit Mac address uniquely located on each network card.
75
00:05:57,830 --> 00:06:03,020
It ensures correct communication with the source and the destination Mac addresses in the data packet.
76
00:06:04,270 --> 00:06:12,160
Now, the LLC sub layer acts as a transition to a parent layer, so it provides a communication between
77
00:06:12,160 --> 00:06:20,350
the two layers by creating logical ports or snaps, which are service access points, error and conflict
78
00:06:20,350 --> 00:06:21,850
control of the Senate data.
79
00:06:22,090 --> 00:06:30,070
Is this done with the CRC error checking protocol, as well as the CSM CD conflict protocol used in
80
00:06:30,070 --> 00:06:30,610
this where?
81
00:06:32,030 --> 00:06:34,200
So don't get too bogged down with that.
82
00:06:34,220 --> 00:06:35,540
Let's move on to layer three.
83
00:06:35,570 --> 00:06:44,090
This is a network layer, so this layer network address IP address allows the data to reach the destination
84
00:06:44,090 --> 00:06:45,290
from the source.
85
00:06:45,920 --> 00:06:52,400
So this layer of data with the source and destination IP addresses, it's called a packet.
86
00:06:53,370 --> 00:07:01,770
So the IP packet contains information such as the total size, the total, the service type version,
87
00:07:02,100 --> 00:07:09,180
error checking, along with the addresses, so it's the routers and the routing algorithms that direct
88
00:07:09,180 --> 00:07:13,410
data in the network environment, and they work all in this layer.
89
00:07:15,160 --> 00:07:16,530
So then what's in level four?
90
00:07:17,680 --> 00:07:24,280
It's a transmission layer, so this layer divides the data sent by the source into parts or segments
91
00:07:24,790 --> 00:07:27,640
and transmits all of them to the destination.
92
00:07:28,600 --> 00:07:33,070
There is something called flow control between the source and the destination that's all done here in
93
00:07:33,070 --> 00:07:33,670
this layer.
94
00:07:34,970 --> 00:07:40,910
Now, the two important protocols of this layer, you might have heard of TCP, which is transmission
95
00:07:40,910 --> 00:07:49,190
control protocol and UDP, which is user data grand protocol, and both have different uses and purposes.
96
00:07:50,390 --> 00:07:56,120
But you'll find port addresses, which are defined differently for each application, are one of the
97
00:07:56,120 --> 00:07:58,370
most important components of this layer.
98
00:08:00,010 --> 00:08:01,480
So what about layer five?
99
00:08:02,110 --> 00:08:08,830
Well, this is your session layer, so it's this layer that initiates, manages and terminates communication
100
00:08:08,830 --> 00:08:10,960
between the source and the destination.
101
00:08:11,860 --> 00:08:17,560
So each network connection used in the client, for example, an email or web browser, whatever it
102
00:08:17,560 --> 00:08:25,480
is, each application, such as FTP, will open a separate session to prevent data mixing in with each
103
00:08:25,480 --> 00:08:27,580
other because you never want to do that.
104
00:08:29,350 --> 00:08:35,770
OK, so layer six is the presentation layer, so it's all thanks to this layer, the data shared between
105
00:08:35,770 --> 00:08:38,470
PC is in a network environment is meaningful.
106
00:08:39,970 --> 00:08:46,300
And by that, I mean, the shared information to be read by pieces, the data must be converted into
107
00:08:46,300 --> 00:08:47,500
a common format.
108
00:08:48,640 --> 00:08:54,040
So the importance of this function is understandable when you consider that the computers that share
109
00:08:54,790 --> 00:08:58,390
the SharePoint are managed with different software.
110
00:08:58,450 --> 00:08:58,770
Yeah.
111
00:08:59,590 --> 00:09:03,280
So it's possible for different programs to use each other's data.
112
00:09:04,890 --> 00:09:10,020
One of the most important tasks of the presentation layer is the encrypted transmission of shared data
113
00:09:10,020 --> 00:09:11,040
to the other computer.
114
00:09:11,990 --> 00:09:17,060
Now, actually, the presentation layer is not necessarily network related.
115
00:09:17,420 --> 00:09:25,520
Right, it's basically software related, so operating systems today cannot read many created formats.
116
00:09:26,030 --> 00:09:30,680
In other words, if our operating system does not support a data format, it comes to us from another
117
00:09:30,680 --> 00:09:31,100
user.
118
00:09:32,260 --> 00:09:34,360
That information basically means nothing to us.
119
00:09:34,900 --> 00:09:42,010
For example, in order to watch videos in a Devex format shared on the internet today, it's necessary
120
00:09:42,010 --> 00:09:48,100
to have the supporting codec programs on your computer right when one computer opens a Devex file on
121
00:09:48,100 --> 00:09:48,580
another.
122
00:09:49,210 --> 00:09:56,110
The presentation layer doesn't do anything, so it means using software in programs that can decode
123
00:09:56,350 --> 00:09:57,460
the same format.
124
00:09:59,970 --> 00:10:03,540
So then we get to layer number seven lucky layers.
125
00:10:04,080 --> 00:10:04,350
Right?
126
00:10:04,590 --> 00:10:10,230
It's the application layer, so this layer provides tools for users and programs to use a network.
127
00:10:11,380 --> 00:10:11,790
All right.
128
00:10:12,150 --> 00:10:18,750
Since the application layer is this last layer, well, it doesn't provide any service to the other
129
00:10:18,750 --> 00:10:19,230
layers.
130
00:10:20,570 --> 00:10:24,020
It creates network services for running applications.
131
00:10:24,870 --> 00:10:27,750
So Microsoft appears they'll work in this layer.
132
00:10:28,640 --> 00:10:35,840
A programmer who makes a program using Microsoft APIs, for example, takes the ready tool in the API
133
00:10:35,840 --> 00:10:40,370
and uses it in their own program when they need to access a network drive.
134
00:10:41,320 --> 00:10:46,900
It doesn't have to deal with any of the dozens of different processes that take place in the lower layers.
135
00:10:48,780 --> 00:10:57,870
So, yeah, another example is HTP, HTP is not a program, but a protocol with a string of rules and
136
00:10:57,870 --> 00:11:04,140
Internet Explorer that functions according to this protocol connects to other web servers that use the
137
00:11:04,140 --> 00:11:05,160
same protocol.
138
00:11:06,060 --> 00:11:12,480
So in addition, this layer detects whether the computer with which it will communicate is ready for
139
00:11:12,630 --> 00:11:13,590
communication.
140
00:11:13,680 --> 00:11:13,980
Right?
141
00:11:14,160 --> 00:11:16,320
And then it synchronizes that communication.
142
00:11:18,040 --> 00:11:22,570
So let's take a look at the example and will define the task of each layer.
143
00:11:23,540 --> 00:11:29,000
So here you see user wants to FTP a file to a server B.
144
00:11:30,000 --> 00:11:35,460
User A's point of contact with a computer is the FTP program in the application layer.
145
00:11:36,660 --> 00:11:39,900
And the file is transmitted from this layer to the computer.
146
00:11:41,170 --> 00:11:47,500
The file to be sent is packaged in the format or shape of the FTP protocol.
147
00:11:48,310 --> 00:11:51,550
And that's the request in the presentation layer.
148
00:11:52,600 --> 00:11:57,310
So this session later initiates a session for this communication.
149
00:11:58,610 --> 00:12:06,230
Then the transmission layer divides the file to be sent into segments and adds a PDA or protocol data
150
00:12:06,230 --> 00:12:09,170
unit into which it adds the relevant data.
151
00:12:09,650 --> 00:12:12,410
That's the port number, control variables, etc..
152
00:12:13,280 --> 00:12:19,340
So in other words, each segment of the email, which is divided into parts, is transmitted separately
153
00:12:19,340 --> 00:12:21,110
to the lower layer, the network layer.
154
00:12:22,060 --> 00:12:29,170
The network layer adds its own PD for each segment with source and destination IP addresses and other
155
00:12:29,170 --> 00:12:30,400
control variables.
156
00:12:31,260 --> 00:12:37,290
The data link layer adds its own Purdue, which contains the source and the destination Mac address
157
00:12:37,290 --> 00:12:42,360
information and the other control parameters to the packet sent to it.
158
00:12:43,250 --> 00:12:45,230
And sent it to the physical layer.
159
00:12:46,130 --> 00:12:52,130
The physical layer sends the entire packet sent to it as an information string consisting of ones and
160
00:12:52,130 --> 00:12:58,220
zeros to the communication medium it is connected to as electricity radio signals or light.
161
00:12:58,700 --> 00:12:59,000
Right.
162
00:12:59,690 --> 00:13:05,600
So after the switching and routing operations, the information string consisting ones and zeros reaching
163
00:13:05,600 --> 00:13:14,630
the destination is recorded by the application layer FTP program by doing the reverse of all those operations
164
00:13:14,630 --> 00:13:16,400
on the source side.
165
00:13:17,420 --> 00:13:18,620
All right.
166
00:13:19,010 --> 00:13:20,990
I know it's crazy, huh?
167
00:13:21,830 --> 00:13:26,210
But but the visual here is, is is, is really great.
168
00:13:27,590 --> 00:13:28,220
Very helpful.
169
00:13:28,250 --> 00:13:34,790
OK, now another model used other than the U.S. reference model quickly is the TCP IP model.
170
00:13:35,450 --> 00:13:39,620
So this model is just basically a simplified version of the U.S. reference model.
171
00:13:40,010 --> 00:13:45,290
It just consists of four layers as a result of combining some of the layers of the U.S. reference model.
172
00:13:45,830 --> 00:13:47,510
So that might be helpful as well.
173
00:13:48,820 --> 00:13:49,900
All right, so there we go.
174
00:13:50,950 --> 00:13:55,540
You now know about the U.S. model, all of its layers and what they do.
175
00:13:55,960 --> 00:13:57,040
Fantastic.
176
00:13:57,070 --> 00:13:57,880
That's really good.
177
00:13:58,480 --> 00:14:00,760
So if you're not asleep?
178
00:14:01,720 --> 00:14:02,950
I want to see in the next lesson.
17950
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.