OSI Layers Model

Introduction

During the early years of our modern computer era, very few standards and protocols existed between various manufacturers. However, as time went on and computer technology continued to improve and become more widespread, it became apparent that standards would be necessary to ensure compatibility. This was especially true with regard to networks, and networking technology. Since the main purpose of a network is to share information, a standard that governs how this information is formatted, transmitted, received and verified would make it possible for information to be shared openly, even when dealing with dissimilar networks.

This need for a standard means of implementing open communications led the ISO and ANSI to develop the seven-layer network communications model known as Open Systems Interconnect. By providing guidelines regarding the way network equipment should be manufactured and how network operating systems communicate on a network, the OSI model became the common link that allows data to be transmitted and exchanged reliably. Although it does not actually perform any functions or do any of the actual work, the OSI model defines the way things should be done by the software and hardware on a network so that communications can take place between two computers or nodes.

In this way, the OSI model provides a universal set of rules that make it possible for various manufacturers and developers to create software and hardware that is compatible with each other. This makes for organized communications. As I thought about this, I related it to the freeways that connect the various states of the mainland U.S. Because all of these freeways were constructed with the same set of standards regarding the width of each lane, the proper side that a person should drive on, the speed at which they should travel, and so on, people can comfortably drive across the country in an organized and efficient manner and car manufacturers are able to design cars within these guidelines as well.

On the other hand, if each state had devised its own set of rules, each differing from the other, not only would there be a lot more chaos on the roads, but also car manufacturers would have a hard time designing vehicles that would be compatible with each state's roads. To me, this illustrates the importance of the OSI model with respect to network communications. Not only is it the foundation for all network communications today, but also because it is such a fundamental part of these communications, it becomes very apparent to me that it is very important for a network technician to understand the OSI model in full detail.

The OSI model is made up of the following layers: the physical, data link, network, transport, session, presentation and application. Together, these seven layers are collectively referred to as a stack. As a node receives data, each layer starting with the physical layer extracts the various portions of the packet and this process works its way up to the application layer. When data is sent, it begins at the application layer and travels down to the physical layer. The information is pushed to the next layer of the stack by means of commands called primitives. Each layer uses a peer protocol to encode the information, which ensures that the same layer on the receiving node will be able to understand the information.

Physical Layer

Beginning at the bottom, the first layer is the physical layer. It governs the actual voltages, type of electrical signals, mechanical connections and other items relating to the actual data transmission medium. This includes cabling types, distances and connectors, as well as protocols like CSMA/CD.

Data Link Layer

The next layer is the data link layer. This is the layer that actually constructs the frames, and it also performs error checking using CRC. It ensures that the frames are sent up to the next layer in the same order that they were received, providing an error free virtual path to the network layer. The data link layer consists of two sub layers; the logical link control (LLC) and the media access control (MAC), which provide reliable communications by ensuring the data link is not broken and also by examining packet address information. A bridge is an example of a device that works at this layer. A bridge learns, forwards and filters traffic by examining the layer 2 MAC address. This helps segment network traffic. More recently, bridges have been replaced by switches, which performs the same functions as a bridge, but can do so on each port. To find out more about switches, visit the Products link on the left.

Network Layer

Moving up to the next layer in the stack we come to the network layer. This layer actually routes packets of data, finding a path (both physical and logical) to the receiving or destination computer. It provides a unique address for each node through address resolution. One of the most common protocols for routing information at this layer is the Internet Protocol (IP). An example of hardware that can operate at this layer is a router. Although routers are often used to allow a LAN to access a WAN, layer 3 switches can also provide routing capabilities, but often at full wire-speed.

Transport Layer

The transport layer makes sure that the data arrives without errors, in the proper sequence and in a reliable condition. It uses flow control to make sure that information is sent at the proper speed for the receiving device to be able to handle it, and it repackages large data into smaller messages and then back again at the receiving node. An example protocol at this layer is the Transmission Control Protocol (TCP). Layer 4 switches can use the port information found in the TCP header to provide QoS (Quality of Service) and load balancing. To learn more about multi-layer switches, visit the Products link.

Session Layer

The session layer establishes the link between two nodes and ensures that the link is maintained and then disconnected. This is referred to as the session. It also makes sure the session is orderly, establishing which node transmits first, how long it can transmit, and what to do in case of an error. It also handles the security of the session.

Presentation Layer

The presentation layer deals with the actual formatting of the data. It handles compression, encryption, as well as translation to make sure differences in formatting can be read by the receiving node. For example, data might be converted from EBCDIC to ASCII formatting so that the receiving node can understand it.

Application Layer

This brings us to the seventh and final layer, the application layer. It allows applications access to network services, such as file and printer sharing, as well as file transfer and management services. This would be the layer that a programmer uses to allow his application to access a network service, such as linking into a database.

Although this explains the flow of data and what processes are performed by each layer starting with the physical layer and working to the top, or application, layer, the process would be the same, only reversed, for data flowing from the application layer and down to the bottom, or the physical layer.

Conclusion

By adhering to this standard model of communications, modern networks, including the Internet, have come into existence. For anyone interested in implementing and supporting today's modern networks, an understanding of the OSI model and its various layers is crucial. Indeed, this standard of communications lays the foundation for all of todays modern network hardware and software.

Kashif Raza http://www.networkingtutorials.net

family-safe home cleaners Lincolnshire ..
In The News:

Chrome faces its sixth zero-day attack in 2025 as Google patches critical V8 engine flaw CVE-2025-10585 discovered by Threat Analysis Group.
The Hypershell X Ultra exoskeleton features 12 terrain modes and carbon fiber construction to enhance hiking, cycling and outdoor adventures.
Personal data from public records and data brokers helps scammers create tailored scam stories, making their calls and emails more believable to potential victims.
Uber Eats partners with drone delivery startup Flytrex to test autonomous food delivery services in U.S. markets, marking the company's first investment in drone technology.
OpenAI announces 120-day plan to strengthen ChatGPT safeguards for teens, including parental controls and expert council on AI wellbeing.
Spam emails can help improve security — if reported correctly. Learn how to report spam across major email services and get key tips to protect your inbox and personal data.
Harvard researcher Avi Loeb says comet 3I/ATLAS weighs 33 billion tons and spans 3.1 miles, making it far larger than previous interstellar visitors.
The Glassboro Public School District in New Jersey has partnered with ZeroEyes and InformaCast to detect visible firearms and alert staff and law enforcement within seconds.
Hackers use fake Google search results to trick users into downloading lookalike apps laced with malware that have been pushed to the top.
Generative A.I. has lowered barriers for sophisticated cyberattacks as hackers exploit ChatGPT and other tools to forge documents and identities.
IOS 26's new features include bigger lock screen clocks, dirty lens alerts, and improved spam detection for iPhones.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Sophisticated phishing scams now exploit Apple's iCloud Calendar invite system to bypass spam filters and trick users into calling fake support numbers.
Complete guide to medication tracking apps for iPhone and Android users, featuring built-in Health apps, MediSafe, MyTherapy, and smart pill dispensers.
Alef Aeronautics plans to begin production of its electric flying car Model A by late 2025, following FAA approval for limited testing at five airport locations.
Five common overpayment scams use fake checks and third-party payment requests to steal money from unsuspecting victims across various scenarios.
The Robeta Ananya luxury camper van features a full living room, ceiling bed, washer-dryer, and complete kitchen starting at $295,000 for the limited Founders' Edition.
Scammers exploit retirees' trust and assets through fake debt collection calls, but proper verification methods and reporting can stop these fraudulent schemes.
Social media scams are rising as fraudsters create fake accounts and buy verification badges to deceive users, but these simple safety steps can protect you.
The new groundbreaking Paris Solar-Battery Park in Wisconsin provides renewable energy day and night by capturing excess energy from its solar panels.
Travelers face increased risks from fake Wi-Fi networks at airports and on flights as attackers exploit growing reliance on in-flight internet for entertainment and services.
Older Android phones, tablets and car systems will lose access to new Waze features as the app drops support for Android versions below 10.
Research shows iPhone owners' overconfidence in Apple security makes them easier targets for cybercriminals compared to Android users who take more precautions.
Five key tech terms reshaping online shopping from mobile payments and instant delivery to social media commerce and inventory-free retail models.
AI browsers from Microsoft, OpenAI and Perplexity can fall for scams faster than humans, completing fraudulent purchases and clicking malicious links without verification.

How to Tell You Have Spyware, Ad-ware or Viruses

Usually, the easiest way to tell you have spyware is... Read More

International Support - Microsoft Great Plains VAR/Partner Selection ? Overview for V.P. IT

Looks like Microsoft Great Plains becomes more and more popular,... Read More

Microsoft Great Plains Customization and Development ? Overview for Programmer

When Great Plains Software was designing and developing Great Plains... Read More

Microsoft CRM or Siebel

Siebel is traditional CRM market leader, however and mostly due... Read More

Microsoft CRM Customization: Integration with Third Party SQL Application/Database

Microsoft CRM ? Client Relationship Management package from Microsoft Business... Read More

What is Groupware?

Vince Lombardi once said that, "The achievements of an organization... Read More

Microsoft Great Plains Accounting/ERP Implementation ? Finance Industry Customization Example

Microsoft Business Solutions Great Plains is very generic accounting application... Read More

CROOK: A Methodology for the Refinement of Forward-Error Correction

Table of Contents1) Introduction 2) Related Work 3) Framework 4)... Read More

The Tools and Features of Adobe Photoshop

Adobe Photoshop is one of the world's leading graphics editing... Read More

Microsoft Great Plains on Ctree or Pervasive SQL ? What to Do ? Tips for IT Manager

As you probably know, when Microsoft purchased Great Plains Software... Read More

Who?s Watching What You Type?

If someone entered your home, uninvited and installed numerous cameras... Read More

Microsoft Great Plains Implementation ? Overview for IT Director/Controller

What is installation in the language of technology? Installation... Read More

Think Of This

Think of this, first we had the HAM Radio, then... Read More

Importance of Coding Standards

Programming Help for BeginnersWe write programs to instruct computers. When... Read More

Microsoft Great Plains Chemicals & Paint Industry Implementation & Customization Notes

Microsoft Great Plains fits to majority of industries, in the... Read More

Exactly What Does FTP Stand for and What Can it do for Me?

FTP stands for "file transfer protocol". FTP is basically a... Read More

Microsoft Great Plains: Annual Enhancement Program ? How To Be Re-Enrolled

Microsoft Business Solutions Great Plains is mid and even corporate... Read More

Microsoft CRM Customization Secrets ? Second Edition

This article is for advanced Microsoft CRM SDK C# developers.... Read More

Free Software - Powerful Alternatives to Budget-Busting Software

When you buy a computer, it most likely comes with... Read More

An Easy Way to Deal with Email Viruses and Worms

If you feel intimidated when someone tries to teach you... Read More

History of Java

The java programming language is becoming more and more popular... Read More

Crystal Reports for Microsoft Great Plains ? Overview for Developer

Microsoft Great Plains is main accounting / ERP application... Read More

Can Group Collaboration Software Meet Business Needs?

According to a survey conducted by InfoTrends/CAP Ventures entitled "Content-Centric... Read More

Not All Project Management Software is Created Equal

The purpose of Project Management Software is to provide an... Read More

Computer Phones ? Facts and Fallacies

The stakes are high when considering security, privacy, and savings,... Read More

after renovation cleaning Bannockburn ..