{"id":836,"date":"2026-02-27T10:03:04","date_gmt":"2026-02-27T10:03:04","guid":{"rendered":"https:\/\/networkingnotebook.com\/?p=836"},"modified":"2026-02-27T10:05:19","modified_gmt":"2026-02-27T10:05:19","slug":"presentation-layer-osi","status":"publish","type":"post","link":"https:\/\/networkingnotebook.com\/?p=836","title":{"rendered":"Presentation Layer (OSI)"},"content":{"rendered":"\n<p>Today I am going to talk about the presentation layer. The presentation layer is the 6th layer of the OSI model and plays a crucial role in computer communication. It is capable of performing multiple functions such as translating between data formats, encryption and decryption, and compression.&nbsp;<\/p>\n\n\n\n<p><strong>How Computers Talk- <\/strong>Depending on the protocol encryption and compression are optional and are chosen when required such as applications such as SSH or HTTPS where encryption is needed. But what happens at the presentation layer when there is no need for encryption or compression? The answer is translation! Computers can communicate with each other but they don\u2019t speak human language like humans. Computers communicate using binary (sequences of 0s and 1s) because computers are built from billions of tiny switches called transistors. Transistors only have two states and those states can either be \u201c0\u201d for off aka low voltage or \u201c1\u201d for on aka high voltage.<br><br><strong>Data Translation-<\/strong> The main responsibility of the presentation layer is to take the text and photos from the application being used such as HTTPS, SSH, SMTP, POP3, DNS and so on and translating it to a language that computers can read. So when I go to a website like a blog or wikipedia thats text based coming from a web server, the presentation has taken those words from the web server translating it to a stream of binary bits, then it gets sent over the network and translated back into human words so I can view it in a language that I can read and understand. There are two encoding standards that are commonly used to translate human words to streams of binary bits and they are called \u201cASCII\u201d and \u201cUTF-8.\u201d ASCII uses 7 bits per character, while UTF-8 varies.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"978\" height=\"1024\" src=\"https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/02\/image-61-978x1024.png\" alt=\"\" class=\"wp-image-838\" srcset=\"https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/02\/image-61-978x1024.png 978w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/02\/image-61-286x300.png 286w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/02\/image-61-768x804.png 768w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/02\/image-61-1467x1536.png 1467w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/02\/image-61.png 1944w\" sizes=\"auto, (max-width: 978px) 100vw, 978px\" \/><\/figure>\n\n\n\n<p><strong>Compression- <\/strong>Besides the main responsibility of translation between data formats, the presentation layer is also responsible for compression. This means taking data and reducing the size of it. It can be done in many ways, one way of compressing data can be identifying patterns and repeated information in data then representing it in a shorter form called \u201clossless compression.\u201d Compression is not only used for text based content but also videos and music. In video and music streaming, compressing can reduce the file size by removing data humans are unlikely to notice, this is called \u201clossy compression.\u201d Lossless compression reduces size without losing any data, but lossy compression sacrifices some data to get smaller file sizes. The main reason for compression is to optimize bandwidth being used and to provide fast transmission of data delivery. For example a 1080p video could require gigabits per second but if it is compressed it can be shortened up to 5 &#8211; 8 Mbps, which is part of the reason how we can watch Netflix, Youtube with relatively no to low buffering or lag.\u00a0<\/p>\n\n\n\n<p><strong>Encryption-<\/strong> According to the OSI model (<strong>NOT TCP\/IP<\/strong>), the presentation layer is also responsible for encrypting and decrypting traffic. It is important to note that for theoretical purposes, I am strictly talking about the OSI model. When applications such as HTTPS and SSH require encryption, the presentation layer is responsible for turning plain-text into ciphertext, transmitted across the network to its destination, and the presentation at the receiving device will turn the cipher-text back into plain-text readable for the human once again.\u00a0<\/p>\n\n\n\n<p>As you can see there are a lot of things that are done in the presentation layer but to sum it up, it is the layer responsible for translating between data formats (ASCII, UTF-8), compressing data, and encrypting\/decrypting data.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today I am going to talk about the presentation layer. The presentation layer is the 6th layer of the OSI model and plays a crucial role in computer communication. It is capable of performing multiple functions such as translating between data formats, encryption and decryption, and compression.&nbsp; How Computers Talk- Depending on the protocol encryption&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-836","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=\/wp\/v2\/posts\/836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=836"}],"version-history":[{"count":2,"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=\/wp\/v2\/posts\/836\/revisions"}],"predecessor-version":[{"id":839,"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=\/wp\/v2\/posts\/836\/revisions\/839"}],"wp:attachment":[{"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}