31 hours 29 minutes

Video Description

OSI Model Layer 6 Presentation This lesson focuses on Layer 6 of the OSI Model, which is the presentation layer. This layer translates applications into data so it can be understood and displayed by the application layer. This layer also formats the data for sending (encryption) so it can be decrypted once it is received.

Video Transcription

Now we have our layer six. Our presentation layer are Layer six is going to take the data. It's going to take the packages of data that we have, and it's going to translate them into a form where our application layer can understand them and can display them for us now are layer six. Our presentation layer isn't
necessarily where we're going to be seeing the data yet,
but it's going to be the layer that's going to take the raw data. Take the packages and it's going to format them in a way that our next layer up our applications or software can understand. Now this gives us independence from differences and data representation. So if our different computers have
slight differences in the way that they form at their data the way that they form out their files,
our presentation layer is going to help prevent that from becoming an issue. With our computers, there are
exclusions. We can't completely can't take a text document and then send it through our network and then have our presentation layer transform it into a dot D O. C. That's that's an entirely different concept altogether. That's changing our file formats but our training. But our presentation layer
is going to do things such as formatting our data like encryptions
and decryption.
Our presentation layer is going to be if we're sending an encrypted document and we need to have it decrypted on the other end so that our applications can actually use it. That's going to be what's occurring at our presentation layer. Our applications can't take this encrypted this encrypted file
and just you use this encrypted file as is
Ah, lot of times our networks will have some sort of way of sending data through and through a network while it's encrypted. So when we're sending data over the network, the data is encrypted. Well, there needs to be a point in our in our president, our
assigned model. There needs to be a point in our network connection
that actually decrypt and in Crips are in crypts and then decrypt that data, and that's going to be at our layer six. That's where we form at the data for sending. When our applications are getting the data ready, they form at them in the correct way for sending. And then that's when on the other end
when we're receiving the data. That's the way that we
unformed at this a way that we decrypt it so
we can think of it as our
as our method. When our factory say we're sending a box and it has some sort of special head has a special
lock on the box. I'm not sure what you're receiving, but maybe you have a giant locked safe that you're receiving and you have your specialty item inside that you're receiving and their formatting that data, they're getting it ready to send, and they're encrypting that data they're performing. Layer six function on it,
and then when you receive it and you're decrypting it and you're hoping it opening back up,
you're also performing layer six. You're using that presentation layer in order to decrypt that data

Up Next

CompTIA Network+

This CompTIA Network+ certification training provides you with the knowledge to begin a career in network administration. This online course teaches the skills needed to create, configure, manage, and troubleshoot wireless and wired networks.

Instructed By

Instructor Profile Image
Anthony Harris
Senior Systems Engineer at ZenPoint Solutions