Skip to main content

What is the OSI Model, and how does it work?

 

What is the OSI Model, and how does it work?

OSI - Open Systems Interconnection

               1. The Open Systems Interconnection (OSI) model is a virtual model for describing the internal structure and technologies of a computer system.

               2. Network communication is divided into seven tiers according to the OSI Model. These layers are helpful in detecting network problems.

               3. A lot of unneeded work can be avoided if the problem can be focused down to one specific layer of the model.


Seven layers of the OSI Model

7. Application layer

               1. In the OSI model, the Application Layer is the layer closest to the end user.

               2. It receives data directly from users and shows the information to them.

               3. Web browsers and email clients, for example, rely on the application layer to establish communications.

               4. Client software programmes, on the other hand, should not be considered part of the application layer.

               5. The protocol and data processing that the software relies on to display relevant data to the user are handled by the application layer.

               6. HTTP and SMTP are examples of application layer protocols.

[HTTP - HyperText Transfer Protocol, SMTP - Simple Mail Transfer Protocol
]

6. Presentation layer



               1. The presentation layer is in charge of data compression, encryption, and translation.

               2. In general, it refers to the process of preparing or translating application format to network format, or network formatting to application format.

               3. Layer 6 is responsible for applying encryption on the sender's end and decoding encryption on the receiver's end so that it can offer the application layer with unencrypted, readable data if the devices are interacting via an encrypted connection.

               4. By reducing the amount of data exchanged, this aids in improving communication speed and efficiency.


5. Session layer

               1. A session is generated at the Session Layer when two computers or other networked devices need to communicate with one another.

               2. This layer is in charge of establishing and maintaining communication between the two devices.

               3. The session is the period of time between when a communication is initiated and when it is ended.

               4. Data transport is also synchronised with checkpoints by the session layer.

               5. For instance, if a 100 megabyte file is being transferred, the session layer could set a checkpoint every 5 megabytes.

               6. If a disconnect or crash occurs after 52 megabytes have been transferred, the session can be continued from the previous checkpoint, requiring only 50 megabytes of data to be transferred.

               7. The entire transfer would have to be restarted from the beginning if the checkpoints were not present.

4. Transport layer


               1. The end-to-end communication between the two devices is handled by 4th Layer.

               2. Before transferring data to layer 3, data from the session layer is broken up into segments and sent to layer 3.

               3. The receiving device's transport layer is in charge of reassembling the segments into data that the session layer may use.

               4. Flow control and error control are also handled by the transport layer.

               5. On the receiving end, the transport layer performs error control by confirming that the data received is full and, if it isn't, requesting a retransmission.

3. Network layer


               1. The network layer is in charge of making data transit between two networks easier.

               2. If the two communicating devices are on the same network, the network layer isn't required.

               3. On the sender's device, the network layer breaks up segments from the transport layer into smaller pieces called packets, which it then reassembles on the receiving device.

               4. Routing is a function of the network layer that determines the optimum physical path for data to take to reach its destination.

2. Data link layer


               1. The data connection layer is similar to the network layer in that it allows data to be sent between two devices on the same network.

               2. The data link layer decomposes packets from the network layer into smaller units known as frames.

               3. In intra-network communication, the data link layer, like the network layer, is responsible for flow control and error control.

1. Physical layer


               1. The physical equipment used in data transfer, such as cables and switches, are included in this layer.

               2. This layer is also where data is turned into a bit stream, which is a string of 1s and 0s.

               3. Both devices' physical layers must agree on a signal protocol so that the 1s and 0s can be identified on both devices.

OSI Model's Data flow

               1. The OSI model has been chastised for its inherent implementation complexity, which makes networking operations inefficient and time-consuming.

               2. The scholarly approach to building the OSI protocol suite was to replace current protocols with improved ones at all communication tiers.

               3. This strategy failed to gain popularity in the market since companies had already spent large resources in TCP/IP products and had to handle interoperability with the OSI model's vast array of protocols and specifications.

               4. Likewise, academia saw the OSI model as a politically motivated invention by European telecommunications and US government officials.
In real-world network situations, the previous TCP/IP architecture model has already established itself.

               5. It provided a stable foundation for the Internet, addressing all security, privacy, and performance concerns.

              6. The OSI model's continued study and development, investments, and industry-wide adoption could have made today's cyber world a different (and perhaps better) place, but the TCP/IP model's pragmatism delivered us the internet we have today.














Comments

Popular posts from this blog

How to Check Hardware Details on Linux:

  Whether you're troubleshooting hardware issues, planning an upgrade, or just curious about your system’s specifications, Linux provides a variety of commands to gather comprehensive hardware information. Here are some essential commands: 1.  Use lscpu to get detailed information about the CPU, including architecture, cores, threads, and CPU speeds. # lscpu                                                 2. The lshw command provides a complete overview of hardware configuration, including CPU, memory, storage, and network. You’ll likely need superuser privileges to run it. # sudo lshw                                                                               ...

testing

09052025 T-1 { "volume_groups" : { "vgroot" : { "vgsize" : "304G" , "fs_type" : "xfs" } } , "logical_volumes" : { "root" : { "lvroot" : { "vgname" : "vgroot" , "lvname" : "lvroot" , "lvsize" : "12G" , "mountpoint" : "/" , "purpose" : "root filesystem" , "disk" : 1 , "partition" : 2 } } , "swap" : { "lvswap" : { "vgname" : "vgroot" , "lvname" : "lvswap" , "lvsize" : "4G" , "mountpoint" : "NA" , "purpose" : "swap" , "disk" : 1 , "partit...

How Virtual Machines are Created in OpenStack: A Complete Backend Workflow:

When creating a Virtual Machine (VM) in OpenStack, several components work together in the backend to provision the instance. Here's a step-by-step explanation of how the process flows: 1. User Request Interface Used : The user initiates the VM creation through the Horizon Dashboard (web UI), the OpenStack CLI ( openstack server create ), or the OpenStack API. Request Information : The request includes parameters such as: VM name. Image (the operating system or custom image to boot from). Flavor (the compute, memory, and storage specifications). Network (which network the VM will be connected to). Security Groups (firewall rules). Key Pair (for SSH access). 2. API (Nova API) Component : Nova (Compute service). Process : The request is received by the Nova API , which validates the request (checks if the requested resources like the image, flavor, and network exist). If valid, the API creates an entry in the database for the new instance. Nova's Role : Nova is the core service r...