Time
31 hours 29 minutes
Difficulty
Beginner
CEU/CPE
30

Video Description

OSI Model Layer 7 Application This lesson focuses on Layer 7 of the OSI Model, which is the application layer. This is the layer which enables applications to access the network and helps to synchronize communications.

Video Transcription

00:04
now, lastly, we have our layer seven. We have our application layer. Now. Our application layer is going to be our next network access layer. It's going to be what enables our applications to access the network. It does things like identify communications Partners that identifies who were trying to connect to
00:19
it determines our resource availability, such as our network availability for these applications using the network,
00:26
and it helps to synchronize our communications. Now when we're talking about our application layer, we're talking about protocols such as SMTP for when we're sending email. We're talking about http for resolving are taking Web pages and opening up a Web pages and browsing the Internet
00:44
or FTP file transfer protocol.
00:47
So our application layer is really going to be the layer that are is working on our computer, where our applications are installed. Software operating system is determining
00:58
how it can access if these applications can access the network. In the case of http, this is where our browser is trying to determine if it can establish a network connection if it wants. If it needs to connect to this Web server where this Web server is,
01:15
and it also determines our network resource is
01:19
if we're able to connect to this or how much resource is how many? How much network usage I can put into Take opening your loading this Web page through our layers one through six. So far, we've established a physical connection. We've established a data link connection. We've, uh,
01:37
taken an I P address and we've gotten an I P. Address and we've
01:41
sent network data through our we've sent data over the network using routers, Another layer three devices. We've established our TCP or UDP for transporting our day of data on our layer four.
01:53
We have our layer five our session layer. We've established what kind of protocols were using. We've We've created a handshake with whoever we're trying to talk. Thio, layer six. Our presentation later, we've encrypted or we we've started encrypting the data that we have on our application layer is going to be what takes that data
02:13
and we're gonna really start using it with our applications. We're going to create, we're gonna take it,
02:16
and we're going to use it in a way that we can now see it on our screen. Our application layers want to take the data and put in an application or take our application and allow it to transfer data.
02:29
Now that we're the end were at our layer seven.
02:34
We can also see how are OS I model sort of goes up and down the chain.
02:38
What I mean by that is if we have
02:43
a computer here that sending to another computer
02:46
over the network,
02:49
we're really not just going down. Roos I model once, we're really going down at once and then going back the other way. So if we start on our computer A here to our computer B and we're running over, say f c p or we are a secure file transfer protocol,
03:07
and we are trying to take a file, and we're trying to send it to computer. Be
03:13
what we're now. We're starting at the application layer.
03:15
So our computer is trying to determine how much resource is it has in order to take this file and get it ready to send is trying to determine if we have network connectivity. And if we're able to access the network in order to send this file, these are gonna be our layer seven at our application layers on our first computer.
03:35
So we're getting ready. We're getting this file ready to send
03:38
on. We're trying to determine if we have that network access. Then we have a presentation later. Maybe we're taking this file and we're encrypting it. That's our layer six. So we now gone down the next layer. The Slayer's been this lady's been taken has been encrypted, and so we now have it ready to go.
03:53
Then we have our session layer. Our computer now attempts to establish some sort of handshake with the other computer it's going to manage, manage The connection is going to get the connection ready to go.
04:03
Then we have a transport layer transport layers going to decide how it's gonna transport this over TCP or UDP. Since this is an encrypted file and we want to make sure that all of our packets get there, we're gonna use TCP and we're going to have that receipt. And when the other side are computer be receives, the file is going to send us back a return return on delivery.
04:25
When we have our layer three, our network layer Both of our computers here have I P addresses we're gonna have to be sending this packet. We're gonna have to be sending this connection over the network through different routers.
04:36
Then we have our data link layer our computer. Now that has his I p address that I p addresses logically assigned to. It's, too. It's Mac address. And so that Mac address is in charge of managing that, managing where that I P address is assigned to physically
04:54
so that it can again send out that data properly.
04:57
And then, lastly, we have our physical layer. Now that we have gotten our application, our application has determined our resource is, and it's allowed our application to talk to our network. We've encrypted that file. We've started a session or we've taken the steps necessary in order to get ready to create a session
05:16
we've
05:17
gotten ready to manage TCP or UDP. We have our I p address. We have our Mac address, and now we're going. We have that data and it's down into our small bits, and it's ready to send as electrical impulses across our cable.
05:33
And then all of that occurs sending
05:38
across our network and then our computer be also performs. All of those functions, but sort of in the opposite manage manner. It receives the physical, the physical impulses to its Mac address, and it's using it, and it's using I P networking, and it has TCP or UDP, and we're messing. We're managing the session and what's going on
05:57
if we've established a connection or for terminating the session,
06:00
we were decrypting the file. We're decrypting the data, and then our application, which is receiving that file, which is receiving that FTP transfer transfer, is now receiving. The applicant is now receiving the file and is now taking it. And then using our network resource is so
06:17
we can see how, at any given point in our network connection,
06:20
we're really we're really using. All seven layers of our OS I model are different layers, maybe more prevalent at certain times, such as when we're rounding data through our through a router. When we're thinking of a router, we're thinking we were talking about a layer three object
06:40
because it's going to route data
06:42
or when we're talking about a cable on electrical signals. We're talking about layer one. We're talking about our physical layer, but we need to understand how our Os I'm model plays into all of all of our networking capabilities and how to understand Roos I model and break up these different layers
06:59
so that we can better understand what's going on when we're transferring and receiving data.

Up Next

CompTIA Network+

This CompTIA Network+ certification training provides you with the knowledge to begin a career in network administration. This online course teaches the skills needed to create, configure, manage, and troubleshoot wireless and wired networks.

Instructed By

Instructor Profile Image
Anthony Harris
Systems Analyst and Administrator at SAIC
Instructor