Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Windows 10 End of Service: What Must Be Done

    19 March 2025

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Vimeo
    Let's Tech It Easy
    Subscribe Login
    • Homepage
    • About
    • Blog
      • Computers
      • Cloud
      • Gaming
      • Cyber Security
      • iPhone
      • Mac
      • Windows
      • Android
    • Contact
    • My Tickets
    • Submit Ticket
    Let's Tech It Easy
    Home»Cloud»OSI MODEL.
    Cloud

    OSI MODEL.

    Gurpreet SinghBy Gurpreet Singh4 May 2021No Comments6 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The OSI model stands for Open Systems Interconnection. It breaks the different parts of a computer network into seven layers.

    It is significant that you comprehend what this model is and what network protocols run on each layer. These layers are utilized to troubleshoot network issues and to comprehend networking by and large. Each higher layer depends on services given by a lower layer.

    WHY DOES THE OSI MODEL MATTER?

    Although the advanced Internet doesn’t stringently follow the OSI model (it all the more intently follows the less difficult Internet protocol suite), the OSI model is still valuable for investigating network issues. Regardless of whether it’s one individual who can’t get their PC on the Internet, or a site being down for a large number of clients, the OSI model can assist with separating the issue and segregate the wellspring of the difficulty. On the off chance that the issue can be limited to one explicit layer of the model, a lot of unnecessary work can be kept away from.

    The First Three layers:

    They manage the mechanics of how data is sent starting with one PC to another over the network. They are known as the lower layers.

    1. Layer 1: Physical Layer

    This layer tends to the actual properties of the network to establish a connection. The Physical Layer manages bits, which are binary values of 0 and 1. It characterizes: 

    . the cable utilized 

    . the voltages on the cable

    . the timing of the electrical signs 

    . the distance that the cable can be run

    A few instances of physical layer segments would be a repeater and a hub. A hub is a multiport repeater since it is utilized to recover signals when you need to surpass the cable length. Since these gadgets don’t inspect the contents of the signs that they recover, they work at the Physical Layer and not the Data Link Layer.

    2. Layer 2: Data Link Layer

    The Data Link Layer allots importance to the bits conveyed by the physical layer. The data components in the data-link layer are called frames. It tends to every packet so that it’s conveyed to the expected recipient. This layer likewise gives fundamental error detection and adjustment to guarantee the information sent is equivalent to it was received.

    This data-link layer is partitioned into two sublayers, they are known as the logical link control (LLC) and media access control (MAC). Every gadget on the network has a MAC address. This is the equipment address that was doled out to the gadget at the manufacturer. It resembles a social security number.

    The most well-known gadget that runs at the Data Link Layer is a switch. A switch looks at the MAC address of each approaching packet to figure out which port to send the bundle to.

    3. Layer 3: Network Layer

    The network layer characterizes how information packets get starting with one point then onto the next on a network and what goes into every bundle. The network layer utilizes conventions like Internet Protocol (IP) and Internet Protocol Exchange (IPX). These packets have steering data about the source and destination.

    Routers work at this layer since they look at every bundle that goes through them. In the network layer intelligent addresses are meant MAC addresses. Since an information packet will go from the network layer down to the data-link layer, there must be an interpretation from IP (logical addressing to) to the MAC address of an network device.

    The Next Four Layers.

    4. Transport layer: The transport layer is the place where a PC interacts with another PC. In this layer the networking protocol of TCP is found. The primary reason for this layer is to guarantee that packets move over the network without errors. The transport layer does this by recognizing that a packet was gotten and re-sends the bundle in the event that it is corrupt, or it didn’t show up.

    A packet is sent in pieces and when it is gotten, the transport layer reassembles the bundle and ensures all information was gotten effectively and not distorted.

    5.Layer 5: Session Layer

    The session layer sets up virtual sessions between network devices. A session should be set up before information can be sent over the network. This remembers arrangement between the customer and host for stream control, transaction processing, transfer of client data and validation to the network.

    6. Layer 6: Presentation Layer

    The presentation layer manages data compression and decompression alongside encryption and decoding. It is liable for changing over the information sent over the network starting with one sort of representation then onto the next.

    7. Layer 7: Application Layer

    This layer controls how the working framework and its applications communicate with the network. This application doesn’t mean Word or Excel. It manages the level at which application programs communicate with the network. Regular utilized application layer protocols incorporate HTTP and TCP/IP protocols.

    Attempt to comprehend these various layers of the OSI model and you will comprehend PC networking.

    HOW DATA FLOWS THROUGH THE OSI MODEL.

    All together for human-readable data to be moved over an network starting with one gadget then onto the next, the information should go down the seven layers of the OSI model on the sending gadget and afterward travel up the seven layers on the less than desirable end.

    For instance: Mr. Harry needs to send Ms. Julie an email. Mr. Harry makes his message in an email application on his PC and afterward hits ‘send’. His email application will disregard his email message to the application layer, which will pick a protocol (SMTP) and give the information to the presentation layer. The presentation layer will at that point compress the information and afterward it will hit the session layer, which will instate the communication session.

    The information will at that point hit the sender’s transportation layer where it will be segmented, at that point those portions will be separated into packets at the network layer, which will be separated much further into outlines at the data-link layer. The data-link layer will at that point convey those frames to the physical layer, which will change over the information into a bitstream of 1s and 0s and send it through a physical medium, like a link.When Ms. Julie’s PC gets the bit stream through a physical medium (like her WIFI), the information will move through similar arrangement of layers on her gadget, however in the contrary request. First the physical layer will change over the bitstream from 1s and 0s into outlines that get passed to the data-link layer. The data-link layer will at that point reassemble the frames into parcels for the network layer. The network layer will at that point make fragments out of the packets for the transport layer, which will reassemble the portions into one piece of information.

    computer layers in cloud
    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous ArticleCCTV alternatives to dahua and Hik vision
    Next Article Internet Society for Home Users – Enabling Firewall
    Gurpreet Singh

    Related Posts

    Windows 10 End of Service: What Must Be Done

    19 March 2025

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025

    Accessing a Windows External Hard Drive on Mac

    26 February 2025
    Leave A Reply Cancel Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Demo
    Our Picks
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Business

    Windows 10 End of Service: What Must Be Done

    By Uneeb19 March 20250

    On October 14, 2025, Microsoft will officially end support for Windows 10, signalling a major shift…

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025

    Accessing a Windows External Hard Drive on Mac

    26 February 2025

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    You too can join us

    If you also think about technology and want to contribute either as a mentor or even from a learner’s perspective, look no further and join us. Write us at [email protected] and share your opinion. Our team will get back by sending you an invite to join the platform as a contributor. Empower others, empower yourself so each one of us can play with the technology safely one day without being scared.

    Subscribe Here
    Loading
    For Partnership Worldwide

    Contact:

    [email protected]

     

    About Us
    About Us

    “Let’s Tech It Easy” or popularly known as “LTIE” is the blogging platform for everyone who wants to share and learn about technology. It is an initiative by the serial techpreneur Vish when he realized the wide gap between the pace at which the technology is evolving and at which it is getting adopted by a wider audience.

    Email Us: [email protected]

    Latest Posts

    Upgrading RAM

    10 March 2023

    Desktop Vs Laptop

    10 March 2023

    Data Recovery

    3 March 2023

    MacOS on Windows Virtual Box

    10 February 2023

    macOS Monterey and what’s new in it?

    12 April 2022
    New Comments
    • How to Troubleshoot Sound and Mic on Windows 10 - Let's Tech It Easy on How to Access Troubleshooters on Windows 10
    • How to Stay Safe While Using Public Wi-Fi Networks - Let's Tech It Easy on Internet Security for Home Users – VPN 101
    • How to Set up Oracle VirtualBox on a Mac - Let's Tech It Easy on How to Install Windows 10 on a Mac Using Boot Camp Assistant
    • DoS Attack Implementation and Prevention in Ubuntu – Let's Tech It Easy on Top Kali Linux Commands
    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About
    • Blog
    • Contact
    • Computers
    • Cloud
    • Gaming
    • Cyber Security
    • iPhone
    • Mac
    • Windows
    • My Tickets
    • Submit Ticket
    © 2025 LetsTechitEasy. Designed by Sukrit Infotech.

    Type above and press Enter to search. Press Esc to cancel.

    Sign In or Register

    Welcome Back!

    Login below or Register Now.

    Lost password?

    Register Now!

    Already registered? Login.

    A password will be e-mailed to you.