Knowledge

OSI Model: What is it? And 7 network layers explained

Networking is a vast topic. The OSI model helps us better understand it. In this article, we will cover the OSI model. The Open Systems Interconnection (OSI) model is a conceptual framework that describes the functions of a networking or telecommunication system in seven layers. The OSI model describes how a network functions and standardizes the way that systems send information to one another.

What is the OSI Model? 

OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network. This model focuses on providing a visual design of how each communications layer is built on top of the other, starting with the physical cabling, all the way to the application that’s trying to communicate with other devices on a network.

A reference model is a conceptual framework for understanding relationships. The purpose of the OSI reference model is to guide technology vendors and developers so the digital communications products and software programs they create can interoperate and to promote a clear framework that describes the functions of a networking or telecommunications system that’s in use.

Most vendors involved in telecommunications try to describe their products and services through the OSI model. This helps them differentiate among the various transport protocols, addressing schemes, and communications packaging methods. And, although it’s useful for guiding discussion and evaluation, the OSI model is theoretical and should be used only as a general guide. That’s because few network products or standard tools keep related functions together in well-defined layers, as is the case in the OSI model. The Transmission Control Protocol/Internet Protocol (TCP/IP) suite, for example, is the most widely used network protocol, but even it doesn’t map cleanly to the OSI model.

 

osi model

Why does the OSI model matter?

Although the modern Internet doesn’t strictly follow the OSI Model (it more closely follows the simpler Internet protocol suite), the OSI Model is still very useful for troubleshooting network problems. Whether it’s one person who can’t get their laptop on the Internet, or a website being down for thousands of users, the OSI Model can help to break down the problem and isolate the source of the trouble. If the problem can be narrowed down to one specific layer of the model, a lot of unnecessary work can be avoided.

The 7 Layers of the OSI Model

OSI is broken down into layers. Each layer has a specific function and communicates and works with the layer below and above it. The OSI Model is conceptual, but its design enables both physical and virtual communication across a network. We’ll start with layer 7, which is the uppermost layer on the stack.

Layer 7: The application layer

This is the only layer that directly interacts with data from the user. Software applications like web browsers and email clients rely on the application layer to initiate communications. However, it should be made clear that client software applications are not part of the application layer; rather the application layer is responsible for the protocols and data manipulation that the software relies on to present meaningful data to the user. Application layer protocols include HTTP as well as SMTP (Simple Mail Transfer Protocol is one of the protocols that enables email communications).

Layer 6 of the OSI Model: The presentation layer

The presentation layer translates or formats data for the application layer based on the semantics or syntax the application accepts. This layer also handles the encryption and decryption that the application layer requires.

Layer 5: The session layer

The session layer handles opening and closing network communications between two interacting devices. The “session” refers to the time between the opening and closing of the interaction. The session layer makes sure the session is open for a long enough period for all the necessary data to be sent through. The session layer then closes the session to prevent expending unnecessary resources.

Also, it synchronizes the data transfer. If a large amount of data is being sent, the session layer can set up checkpoints. If the transmission gets interrupted before all the data is downloaded, the checkpoints allow the transmission to be resumed without it starting all over again.

 

osi model

Layer 4 of the OSI Model: The transport layer

The transport layer takes data transferred in the session layer and breaks it into “segments” on the transmitting end. It is responsible for reassembling the segments on the receiving end, and turning them back into data that can be used by the session layer. The transport layer carries out flow control, sending data at a rate that matches the connection speed of the receiving device, and error control, checking if data was received incorrectly and if not, requesting it again.

Layer 3: The network layer

The network layer is responsible for facilitating data transfer between two different networks. If the two devices communicating are on the same network, then the network layer is unnecessary. The network layer breaks up segments from the transport layer into smaller units, called packets, on the sender’s device, and reassembles these packets on the receiving device. The network layer also finds the best physical path for the data to reach its destination; this is known as routing.

Layer 2 of the OSI Model: The data link layer

The data link layer establishes and terminates a connection between two physically connected nodes on a network. It breaks up packets into frames and sends them from source to destination. This layer is composed of two parts – Logical Link Control (LLC), which identifies network protocols, performs error checking, and synchronizes frames, and Media Access Control (MAC) which uses MAC addresses to connect devices and define permissions to transmit and receive data.

Layer 1: The physical layer

The lowest layer of the OSI Model is concerned with electrically or optically transmitting raw unstructured data bits across the network from the physical layer of the sending device to the physical layer of the receiving device. It can include specifications such as voltages, pin layout, cabling, and radio frequencies. At the physical layer, one might find “physical” resources such as network hubs, cabling, repeaters, network adapters, or modems.

osi model

How data flow through the OSI model

Data flows from layer 7 down to layer 1 from the sender and then flows from layer 1 to layer 7 on the recipient device. The simplest example of communication flows through the OSI Model is an email application.

When a sender clicks “Send” on an email application, the message is sent to the presentation layer using a defined protocol (SMTP for outgoing email). The presentation layer compresses the data and sends the message to the session layer, which opens a session for communication between the sender’s device and the outgoing server.

The message is sent to the transport layer where data is segmented, and then the network layer breaks the segments into packets. Then, the packets are sent from the network layer to the data link layer, where packets are further broken down into frames. The frames are sent to the physical layer where data is converted to bitstreams of ones and zeros and transferred across a medium such as wireless connections or cables.

When the message reaches the recipient, the process is reversed. Data is sent from the physical layer to the application layer, where data is converted from the bitstream ones and zeros to the message available in the recipient’s email client. When a message is sent back to the sender, the process is repeated, and communication flows down to layer 1 from layer 7 and backs up the OSI Model when it reaches the recipient’s device.

Summary

The most identified benefit of the OSI model is that it organizes thinking about networks and gives novices, journeymen, and masters a common, computer networking language. Human communication, discussions, and collaboration can use this language to remove ambiguity and clarify intent.

Knowledge

Other Articles

Data Packet: The Building Blocks of Digital Communication

In today’s digital era, seamless data transmission... Feb 7, 2025

IP Packet: The Building Block of Internet Communication

In the world of networking and internet... Feb 6, 2025

What is a Network Access Point (NAP)?

What is a Network Access Point (NAP)?... Feb 4, 2025

What is a Network Access Server (NAS)?

What is a Network Access Server (NAS)?... Feb 3, 2025

Electronic Data Processing: Revolutionizing Data Management

In today’s fast-paced digital world, managing vast... Feb 2, 2025

Mass Data Fragmentation: Challenges and Solutions

In the age of digital transformation, organizations... Feb 1, 2025

What is Nested Virtualization?

What is Nested Virtualization? Nested virtualization refers... Jan 31, 2025

Related posts

Data Packet: The Building Blocks of Digital Communication

In today’s digital era, seamless data transmission is crucial for internet connectivity, online transactions, and...

IP Packet: The Building Block of Internet Communication

In the world of networking and internet communication, IP packets play a crucial role in...

Network Sniffer: Understanding the Tool, Use Cases, and Security Implications

What is a Network Sniffer? A network sniffer, also known as a packet analyzer or...