- Data Comm & Networks Home
- DCN - Overview
- DCN - What is Computer Network
- DCN - Uses of Computer Network
- DCN - Computer Network Types
- DCN - Network LAN Technologies
- DCN - Computer Network Models
- DCN - Computer Network Security
- DCN - Components
- DCN - Connectors
- DCN - Switches
- DCN - Repeaters
- DCN - Gateways
- DCN - Bridges
- DCN - Socket
- DCN - Network Interface Card
- DCN - NIC: Pros and Cons
- DCN - Network Hardware
- DCN - Network Port
- Computer Network Topologies
- DCN - Computer Network Topologies
- DCN - Point-to-point Topology
- DCN - Bus Topology
- DCN - Star Topology
- DCN - Ring Topology
- DCN - Mesh Topology
- DCN - Tree Topology
- DCN - Hybrid Topology
- Physical Layer
- DCN - Physical Layer Introduction
- DCN - Digital Transmission
- DCN - Analog Transmission
- DCN - Transmission media
- DCN - Wireless Transmission
- DCN - Transmission Impairments
- DCN - Multiplexing
- DCN - Network Switching
- DCN - Circuit Switching
- DCN - Packet Switching
- DCN - Message Switching
- Data Link Layer
- DCN - Data Link Layer Introduction
- DCN - Data Link Control & Protocols
- DCN - RMON
- DCN - Token Ring Network
- DCN - Hamming Code
- DCN - Byte Stuffing
- DCN - Channel Allocation
- DCN - MAC Address
- DCN - Address Resolution Protocol
- DCN - Cyclic Redundancy Checks
- DCN - Error Control
- DCN - Flow Control
- DCN - Framing
- DCN - Error Detection & Correction
- DCN - Error Correcting Codes
- DCN - Parity Bits
- Network Layer
- DCN - Network Layer Introduction
- DCN - Network Addressing
- DCN - Routing
- DCN - Routing Table
- DCN - Internetworking
- DCN - Network Layer Protocols
- DCN - Routing Information Protocol
- DCN - Border Gateway Protocol
- DCN - OSPF Protocol
- DCN - Network Address Translation
- DCN - Network Address Translation Types
- Transport Layer
- DCN - Transport Layer Introduction
- DCN - Transmission Control Protocol
- DCN - User Datagram Protocol
- DCN - Congestion Control
- DCN - Open Loop Congestion Control
- DCN - Closed Loop Congestion Control
- DCN - Congestion Control Algorithms
- DCN - Token Bucket Algorithm
- DCN - TCP Tahoe Algorithm
- DCN - TCP Reno Algorithm
- DCN - TCP New Reno Algorithm
- DCN - TCP BIC Algorithm
- DCN - TCP CUBIC Algorithm
- DCN - TCP Service Model
- DCN - TLS Handshake
- DCN - TCP Vs. UDP
- Application Layer
- DCN - Session Layer
- DCN - Presentation Layer
- DCN - Application Layer Introduction
- DCN - Client-Server Model
- DCN - Application Protocols
- DCN - Network Services
- DCN - Virtual Private Network
- DCN - Load Shedding
- DCN - Optimality Principle
- DCN - Service Primitives
- DCN - Services of Network Security
- DCN - Hypertext Transfer Protocol
- DCN - File Transfer Protocol
- DCN - Secure Socket Layer
- Network Protocols
- DCN - ALOHA Protocol
- DCN - Pure ALOHA Protocol
- DCN - Sliding Window Protocol
- DCN - Stop and Wait Protocol
- DCN - Link State Routing
- DCN - Link State Routing Protocol
- Network Algorithms
- DCN - Shortest Path Algorithm
- DCN - Routing Algorithm
- DCN - Adaptive Routing Algorithms
- DCN - Non-Adaptive Routing Algorithms
- DCN - Leaky Bucket Algorithm
- Wireless Networks
- DCN - Wireless Networks
- DCN - Wireless LANs
- DCN - Wireless LAN & IEEE 802.11
- DCN - IEEE 802.11 Wireless LAN Standards
- DCN - IEEE 802.11 Networks
- Multiplexing
- DCN - Multiplexing & Its Types
- DCN - Time Division Multiplexing
- DCN - Synchronous TDM
- DCN - Asynchronous TDM
- DCN - Synchronous Vs. Asynchronous TDM
- DCN - Frequency Division Multiplexing
- DCN - TDM Vs. FDM
- DCN - Code Division Multiplexing
- DCN - Wavelength Division Multiplexing
- Miscellaneous
- DCN - Shortest Path Routing
- DCN - B-ISDN Reference Model
- DCN - Design Issues For Layers
- DCN - Selective-repeat ARQ
- DCN - Flooding
- DCN - E-Mail Format
- DCN - Cryptography
- DCN - Unicast, Broadcast, & Multicast
- DCN - Network Virtualization
- DCN - Flow Vs. Congestion Control
- DCN - Asynchronous Transfer Mode
- DCN - ATM Networks
- DCN - Synchronous Vs. Asynchronous Transmission
- DCN - Network Attacks
- DCN - WiMax
- DCN - Buffering
- DCN - Authentication
- DCN Useful Resources
- DCN - Quick Guide
- DCN - Useful Resources
- DCN - Discussion
OSI Model (Open Systems Interconnection Model)
What is OSI Model?
The OSI reference model was developed by International Standards Organization (ISO), which allows different communication systems to communicate via standard protocols. It gives a layered networking framework that conceptualizes how communications should take place among heterogeneous systems. In simple terms, the OSI establishes a standard for computer systems to communicate with one another.
Due to the layered approach, network engineers and students can study, design, and troubleshoot networks more efficiently. Instead of analyzing the whole network at once, they can focus on a specific layer where the problem exists. Although modern networks mostly follow the TCP/IP model in practice, the OSI model remains the backbone for learning, teaching, and conceptual understanding of networking.
Why Do We Need the OSI Model in Networking?
In the early days of networking, communication between computers was very limited. Computers were large, costly, and usually worked independently without much interaction. As networking expanded, companies began developing their own proprietary communication methods. These methods worked only within the same brand or environment.
For example, a computer manufactured by one company could not easily communicate with a system made by another company. There was no common structure, no common rules, and no shared language. It caused serious compatibility issues, especially when organizations tried to build large networks using systems from multiple vendors.
Solves the Compatibility Issues
The lack of standardization became a serious problem; it made data exchange difficult and expensive. Different networks followed different rules, protocols, and data formats, making communication complex and unreliable. The OSI model helped in solving the compatibility issues by dividing the entire communication process into logical layers.
Each layer performs a specific role and communicates only with its adjacent layers. This makes the overall system easier to understand, manage, and control.
Creates a Universal Framework
The main purpose of the OSI model was to create a universal framework that any vendor or organization could follow. The OSI model introduced the concept of interoperability which made it possible to have different heterogeneous systems communicate seamlessly, even if they were built on different technologies.
Each Layer Can Be Studied Independently
Another important purpose of the OSI model is to simplify learning. Networking involves hardware, software, signals, protocols, and applications working together. Studying everything at once can be confusing for beginners. By dividing the communication process into layers, the OSI model allows students to understand one concept at a time. Each layer can be studied independently, which makes learning more systematic and logical.
Useful in Troubleshooting
The OSI model is also extremely useful in troubleshooting. When a network problem occurs, engineers often say things like "this is a layer 1 issue" or "the problem is at layer 7." This line of thinking comes directly from the OSI model.
Why the Layered Architecture?
Layered architecture is the core idea behind the OSI model. Instead of building one large and complicated communication system, the model breaks it into smaller, manageable layers. Each layer has a specific responsibility and a clear boundary. A layer does not interfere with the internal working of other layers. It only provides services to the layer above it and uses services from the layer below it.
The layered architecture offers several benefits −
- Modularity − If a change is required in one layer, other layers do not need to be modified. For example, if new transmission media like fiber optics is introduced, only the physical layer is affected. Upper layers like session, presentation, or application remain unchanged.
- Fault isolation − If data is not reaching its destination, engineers can check each layer step by step. It helps in locating the exact source of the problem and saves time and effort.
Due to the layered architecture, network protocols can be developed independently and still work together smoothly.
The Seven Layers of the OSI Model
The OSI model consists of seven layers, arranged from bottom to top based on their functionality. Each layer performs a specific task in the communication process.
The OSI model is divided into seven layers, as follows −
- Physical Layer − Its function is to transmit individual bits from one node to another over a physical medium.
- Data Link Layer − It is responsible for the reliable transfer of data frames from one node to another connected by the physical layer.
- Network Layer − It manages the delivery of individual data packets from source to destination through appropriate addressing and routing.
- Transport Layer − It is responsible for delivery of the entire message from the source host to destination host.
- Session Layer − It establishes sessions between users and offers services like dialog control and synchronization.
- Presentation Layer − It monitors syntax and semantics of transmitted information through translation, compression, and encryption.
- Application Layer − It provides high-level APIs (application program interface) to the users.
The layers are ordered in such a way that the lower layers deal with hardware and data transmission, while the upper layers deal with software and user interaction.
Data always moves through all seven layers. When data is sent, it moves downward from the application layer to the physical layer. When data is received, it moves upward from the physical layer to the application layer.
Network Support Layers
The bottom three layers of the OSI model are known as network support layers. These layers mainly focus on the actual transmission of data across the network.
The Physical Layer handles the transmission of raw bits from one device to another. It defines cables, connectors, voltage levels, signal types, transmission speed, and physical topology. It does not understand frames, packets, or data meaning.
The Data Link Layer ensures reliable data transfer between two directly connected devices. It converts raw bits into frames, performs error detection, and controls access to the transmission medium using MAC addresses.
The Network Layer is responsible for delivering data packets from the source to the destination across multiple networks. It uses logical addressing and routing techniques. Routers operate mainly at this layer.
These three layers together ensure that data can physically and logically travel across the network.
Transport Layer - The Connecting Bridge
The Transport Layer plays a very critical role in the OSI model. It acts as a bridge between the network support layers and the user support layers.
The Transport Layer provides end-to-end communication between the source and destination systems. It ensures that the entire message sent by the source reaches the destination correctly and in order. It divides large messages into smaller units called segments. At the receiving side, these segments are reassembled into the original message.
The Transport Layer also manages flow control so that a fast sender does not overwhelm a slow receiver. Error detection, retransmission, and congestion control are also handled at this layer. Protocols like TCP and UDP operate at the transport layer.
User Support Layers
The top three layers of the OSI model are known as user support layers.
- The Session Layer manages communication sessions between systems. It controls session establishment, maintenance, synchronization, and termination.
- The Presentation Layer deals with data representation and format. It handles translation, compression, and encryption so that data is readable and secure.
- The Application Layer provides network services directly to the user. Services like email, web browsing, file transfer, and remote login work at this layer.
These layers interact more closely with the user and application software.
Data Flow and Encapsulation in OSI Model
Data communication in the OSI model follows a structured flow. When data is generated by an application, it moves downward through all the layers. Each layer adds its own control information to the data. This process is called encapsulation.
At the receiving side, the process is reversed. Each layer removes its own header and processes the data. Finally, the original data reaches the destination application.
Pros and Cons of OSI Model
The OSI Model is regarded as a standard model in the field of computer networking. It offers several benefits, including the ones listed below −
- Both connectionless and connection-oriented services are supported by the model. When users need faster data transmissions via the Internet, they can use connectionless services; and when they need reliability, they can use the connection-oriented model.
- The OSI Model supports a wide range of protocols.
Here are some of the drawbacks of the OSI model −
- The session layer that manages sessions and the presentation layer that handles user interaction are not as useful as the OSI model's other layers.
- Some services such as transport and data-link layers are repeated at different tiers.
- Layers cannot work simultaneously; each layer must wait for data from the preceding layer to be received.
Is the OSI Model Still Relevant?
Even though modern networks mostly use TCP/IP, the OSI model remains highly relevant. It is widely used in education, certification exams, and network troubleshooting.
The OSI model provides a common language for networking discussions and documentation. It also helps engineers design and analyze network systems more effectively.
Conclusion
The OSI Model is a foundational concept in computer networking. It explains complex communication processes in a simple and organized way. By dividing the entire communication into seven logical layers, it makes learning, design, and troubleshooting easier. Even today, the OSI model continues to guide networking concepts and practices.