Communication between computers is streamlined, quick, and efficient today, and this has opened a world of applications for our ease of living. One of the aspects that have made it possible is the Open Systems Interconnection (OSI) model. In this article, let’s explore what is OSI and how it is beneficial for IT pros, both beginners and experienced, as a tool for network troubleshooting.
The OSI model is a conceptual framework consisting of seven layers that allow computers to communicate with each other. This standardized model was adopted by all major technology companies in the early 1980s to create an ecosystem that allowed computers to send and receive messages quickly and reliably.
The journey of every invention or development starts with a problem and knowing this helps to better understand its use and relevance. So, let’s step back a bit to understand the evolution of the OSI model.
It all began in the late 1970s when two groups started working independently to define a common standard that would lay the foundation for the architecture of networking systems. The first group was a part of the International Standards Organization (ISO) while the second was a part of the International Telegraph and Telephone Consultative Committee (CCITT). Both these groups developed and presented two networking models, one apiece each respectively.
In 1983, it was decided to merge the two models to form the Open Systems Interconnection or the OSI model. Though it went through many changes over the years, it continues to be relevant even today, as the de-facto framework for networking.
Next, we will take a look into the working of the OSI model.
This model consists of seven layers, in this order:
Let’s now take a detailed look at each of these layers.
This is the first and the lowest layer and consists of the electronic circuit transmission technologies. Essentially what this means is that the physical layer is responsible for transmitting individual bits from one node to another. It is also responsible for establishing, maintaining, and severing the physical connections.
It also represents the electrical and physical aspects of the system and includes the layout of pins, voltages, cables used, and more. This is why professionals dive into the physical layer to check if the cables are connected and the power is plugged on.
The data link layer is the second layer that is responsible for the transmission of data frames from one node to the other. Besides simply sending and receiving data frames, it also establishes a unique identification number for every device on the network, defines the data format, and also handles error correction.
Since it handles a ton of work such as physical addressing, flow control, and error control, it is divided into two logical sublayers, and they are:
This is the third layer and is responsible for tracking the location of devices on the network. This layer determines the best routing path for a packet based on the network conditions, priority, and other factors.
As you may have guessed, this is where the routers are specified, and they route your data efficiently to computers located in any part of the world.
Thus, these three lower layers are closely tied to the underlying network, and they deal primarily with data transmission. Also, these layers are implemented with both hardware and software.
The transport layer is the fourth layer, and it ensures that messages are transmitted in the order received, without any data duplication. This layer receives data from the upper layers and segments them into small units for easy transmission.
Notably, this layer creates a point-to-point connection between the source and the destination computers to deliver the data efficiently. This layer splits data into small packets, transmits, and reassembles them at the destination using a set of protocols or rules.
Broadly speaking, there are two protocols used for data transmission, and they are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).
The session layer, as the name suggests, is responsible for managing a session between processes. Typically, a session is required for two devices to talk to each other, and this layer is responsible for creating and managing these sessions. Its activities include setting up the session, managing it, and ending it between applications.
In the process, it handles data control and synchronization between devices.
Also known as the syntax layer, this presentation layer is responsible for preparing and translating the application format to network format, and vice-versa. A good example is the encryption and decryption of data handled by this layer.
It handles data compression as well and is often a part of the operating system.
This is the top-most layer of the OSI model and it acts as a window for a user to access the network service for data transmission. It handles a wide range of functions including resource allocation, File Transfer, Access, and Management (FTAM), directory services, and mail services.
Some examples of applications that work in this layer include web browsers, email clients, messaging clients, and any other device that interacts with the underlying network for data transmission and receipt.
The upper four layers (4 to 7) handle application-related issues and are implemented in software only.
To get a better understanding of how these layers come together, let us take the example of an email.
Thus, this is how the data is transmitted through the OSI model.
This distinct separation of work across different layers helps with debugging and network troubleshooting and acts as a guide to develop any network model. It supports both connection and connectionless services as well. The OSI model helps administrators to determine the right hardware and software and helps device manufacturers to create devices that can communicate through this model.
For end-users, it helps to quickly and efficiently debug problems as you can work at the right layers instead of sifting through the entire network.
Finally, it is a fairly secure model for data transmission.
Thus, these are the different layers of the OSI model, and due to the many advantages mentioned above, this model has become the de-facto one for data communication.
Featured image: Shutterstock
The trend to contactless payments has accelerated as retailers and consumers adjust to COVID-19 realities.…
The U.S. Department of Homeland Security is warning that online holiday shopping scams may be…
This in-depth tutorial shows you how to use features available in Azure DevOps to boost…
Two apps from Chinese tech giant Baidu that had been available in the Google Play…
Employees who don’t have the tools to get their jobs done sometimes turn to the…
Many Exchange Server troubleshooting tools don’t work with Microsoft 365. Fortunately, Microsoft has a bunch…