Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Windows 10 End of Service: What Must Be Done

    19 March 2025

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Vimeo
    Let's Tech It Easy
    Subscribe Login
    • Homepage
    • About
    • Blog
      • Computers
      • Cloud
      • Gaming
      • Cyber Security
      • iPhone
      • Mac
      • Windows
      • Android
    • Contact
    • My Tickets
    • Submit Ticket
    Let's Tech It Easy
    Home»Computers»What exactly is OSI Model?
    Computers

    What exactly is OSI Model?

    Jayendra KonduruBy Jayendra Konduru18 July 2021Updated:10 August 2021No Comments9 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    What exactly is OSI Model?

    The Open Systems Interconnection Model (OSI Model) is a theoretical framework for describing the functions of a networking system. In order to facilitate interoperability between diverse devices and applications, the OSI model describes computing functions into a universal set of rules and standards. The connections between computing systems are divided into seven abstraction levels in the OSI reference model: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

    File:Osi model trad.jpg - Wikimedia Commons
    https://commons.wikimedia.org/wiki/File:Osi_model_trad.jpg

    The OSI Model can be thought of as a universal computer networking language. It’s based on the idea of breaking down a communication system into seven abstract layers that are piled on top of each other. The OSI was published in 1984 by the International Organization for Standardization at a period when network computing was still in its infancy (ISO). The OSI Model is still used to explain network architecture today, even if it does not always map exactly to real systems.

    Why OSI MODEL?

    There are many reasons to use the OSI model some of them are,

    • The OSI model is effective in helping you determine where the biggest data security threats are inside your business since it provides a framework for doing an inventory of your organization’s assets. Knowing where the majority of your company’s data is held, whether on-premises or in cloud services, will help define your information security policy. You can invest in the correct solutions that provide you data visibility within the relevant OSI levels once you have this knowledge.
    • For decades, the OSI model has been used to help IT professionals understand networking and handle problems that might occur at any point during the networking process. As a result, it’s still useful for infosec professionals conducting asset inventories today. Using the multiple levels, you may categorise your physical assets, any data you might have on your organization’s networks (and how it’s protected), and an inventory of which applications your employees use to access your data and resources. The approach can also assist you in addressing vulnerabilities and security issues according to the levels they touch.
    • Given how valuable the OSI model is for inventorying security resources and assets, it’s no surprise that using it when shifting to the cloud might be beneficial. This is because the OSI model will assist you in determining the exact types of data security concerns that cloud adoption may pose to your business. This enables you to make more informed decisions about the cloud systems you use.
    • Several experts have developed “updated” OSI models that reflect operational layers in IaaS and cloud architecture (featured as images below). While the OSI system layers can be applied in a variety of ways to cloud architecture, it’s evident that the model is conceptually flexible. With this in mind, it may be worthwhile to examine your own cloud architecture and determine whether designing a modified OSI model for your surroundings might enhance your security programme.
    • The OSI Model is still very useful for debugging network problems, even if the modern Internet does not fully follow it (it instead follows the simpler Internet protocol suite). The OSI Model can assist break down a problem and find the cause of the trouble, whether it’s one individual who can’t get their laptop online or a web site that’s down for thousands of users. A lot of unneeded work can be avoided if the problem can be focused down to one specific layer of the model.

    OSI LAYERS:

    Let’s take a look at the OSI layers from the application layer, which serves the end user directly, all the way down to the physical layer.

    https://en.wikipedia.org/wiki/File:Osi-model.png

    7. Application layer: This is the sole layer that interacts directly with user data. Web browsers and email clients, for example, rely on the application layer to establish communications. Client software programmes, on the other hand, are not part of the application layer; rather, the application layer is in charge of the protocols and data manipulation that the software uses to provide meaningful data to the user. HTTP and SMTP are examples of application layer protocols (Simple Mail Transfer Protocol is one of the protocols that enables email communications).

    6. Presentation layer: Layer 6 is primarily responsible for preparing data for use by the application layer; in other words, layer 6 makes data presentable for application consumption. Data translation, encryption, and compression are all handled by the presentation layer. Two gadgets that communicate Because different encoding methods are used while communicating, layer 6 is in charge of converting incoming data into a syntax that the receiving device’s application layer can understand.

    5. Session layer: This layer is in charge of establishing and maintaining communication between the two devices. The session is the period of time between when a communication is initiated and when it is ended. The session layer guarantees that the session remains open for as long as necessary to send all of the data being exchanged, and then swiftly ends it to avoid wasting resources. Data transport is also synchronised with checkpoints by the session layer.

    4. Transport layer: The end-to-end communication between the two devices is handled by Layer 4. Before transferring data to layer 3, data from the session layer is broken up into segments and sent to layer 3. The receiving device’s transport layer is in charge of reassembling the segments into data that the session layer can ingest. Flow control and error control are also handled by the transport layer. Flow control establishes the best transmission speed to prevent a sender with a fast connection from overwhelming a receiver with a sluggish connection. On the receiving end, the transport layer conducts error control by checking that the data received is complete and requesting a retransmission.

    3. Network layer: The network layer is in charge of making data transit between two networks easier. If the two communicating devices are on the same network, the network layer isn’t required. On the sender’s device, the network layer breaks up segments from the transport layer into smaller pieces called packets, which it then reassembles on the receiving device. Routing is a function of the network layer that determines the optimum physical path for data to take to reach its destination.

    2. Data link layer: The data connection layer is similar to the network layer in that it allows data to be sent between two devices on the same network. The data link layer decomposes packets from the network layer into smaller units known as frames. In intra-network communication, the data link layer, like the network layer, is responsible for flow control and error control (The transport layer only does flow control and error control for inter-network communications).

    1. Physical layer: The physical equipment used in data transfer, such as cables and switches, are included in this layer. This layer is also where data is turned into a bit stream, which is a string of 1s and 0s. Both devices’ physical layers must agree on a signal protocol so that the 1s and 0s can be identified on both devices.

    You can easily get “Computer Repair Onsite (CROS)” support by clicking here if you want to know more about or help your organisation’s use of this process.

    Advantages of OSI Model:

    • It is a generic model that may be used to guide the development of any network model.
    • It employs the divide-and-conquer strategy. All of the services are separated into tiers. As a result, administration and maintenance of this OSI model architecture are simple and basic.
    • The abstraction principle is followed in this tiered architecture. Changes in one layer have little effect on the other levels.
    • Having all services packed in a single layer is less secure and versatile.
    • It’s a multi-levelled model. Changes to one layer have little effect on the other levels if the interfaces between them do not alter dramatically.
    • It clearly distinguishes between services, interfaces, and protocols. As a result, it is adaptable. Depending on the nature of the network, each layer’s protocols can be easily modified.
    • Both connection-oriented and connectionless services are supported.

    Disadvantages of OSI Model:

    • It’s merely a theoretical model that ignores the availability of suitable technologies. This makes it difficult to put into practise.
    • It doesn’t specify any specific protocol.
    • It may be challenging to incorporate a new protocol within this model at times. This is due to the fact that this model was designed before any of these protocols were invented.
    • The session layer is used to manage sessions. User interaction is handled by the presentation layer. They are useful, although not as much as the OSI model’s other levels.
    • At several stages, there is some service duplication. Error control mechanisms exist in both the transport and data connection layers, for example.
    • Interdependence exists between the layers as well. These layers are unable to work in tandem. They have to be in wait to receive data from its predecessor.
    • The launch of this model occurred at an inopportune time. TCP/IP protocols were already in place before OSI was introduced. As a result, businesses were hesitant to employ it at first.
    • The OSI model is extremely complicated. The initial implementation was inefficient, slow, and expensive.

    Conclusion:

    The primary idea behind OSI is that the process of communication between two endpoints in a telecommunication network may be separated into seven discrete sets of related functions, or layers, with layer one at the bottom and layer seven at the top of the layer stack. The protocol stack receives data from software at layer 7, which is the application layer. A service data unit is assigned to the information received (SDU). Each layer adds a header to the SDU that is specific to that layer. As each tier adds its header, a payload data unit is created (PDU). The PDU is subsequently transmitted to the layer below, where it becomes the layer’s SDU. The data is transferred via the network media after the physical layer, layer 1, gets the PDU from the data link layer, layer 2. We can learn more about all the data related topica like data security, data storage and many more with the team of experts “BENCHMARK IT SERVICES”. You can access the website here

    OSI OSIMODELS
    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous ArticleKnow about The Cluster Analysis
    Next Article Ever heard about Chatbot?
    Jayendra Konduru
    • Website

    Related Posts

    Windows 10 End of Service: What Must Be Done

    19 March 2025

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025

    Accessing a Windows External Hard Drive on Mac

    26 February 2025
    Leave A Reply Cancel Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Demo
    Our Picks
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Business

    Windows 10 End of Service: What Must Be Done

    By Uneeb19 March 20250

    On October 14, 2025, Microsoft will officially end support for Windows 10, signalling a major shift…

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025

    Accessing a Windows External Hard Drive on Mac

    26 February 2025

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    You too can join us

    If you also think about technology and want to contribute either as a mentor or even from a learner’s perspective, look no further and join us. Write us at [email protected] and share your opinion. Our team will get back by sending you an invite to join the platform as a contributor. Empower others, empower yourself so each one of us can play with the technology safely one day without being scared.

    Subscribe Here
    Loading
    For Partnership Worldwide

    Contact:

    [email protected]

     

    About Us
    About Us

    “Let’s Tech It Easy” or popularly known as “LTIE” is the blogging platform for everyone who wants to share and learn about technology. It is an initiative by the serial techpreneur Vish when he realized the wide gap between the pace at which the technology is evolving and at which it is getting adopted by a wider audience.

    Email Us: [email protected]

    Latest Posts

    Upgrading RAM

    10 March 2023

    Desktop Vs Laptop

    10 March 2023

    Data Recovery

    3 March 2023

    MacOS on Windows Virtual Box

    10 February 2023

    macOS Monterey and what’s new in it?

    12 April 2022
    New Comments
    • How to Troubleshoot Sound and Mic on Windows 10 - Let's Tech It Easy on How to Access Troubleshooters on Windows 10
    • How to Stay Safe While Using Public Wi-Fi Networks - Let's Tech It Easy on Internet Security for Home Users – VPN 101
    • How to Set up Oracle VirtualBox on a Mac - Let's Tech It Easy on How to Install Windows 10 on a Mac Using Boot Camp Assistant
    • DoS Attack Implementation and Prevention in Ubuntu – Let's Tech It Easy on Top Kali Linux Commands
    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About
    • Blog
    • Contact
    • Computers
    • Cloud
    • Gaming
    • Cyber Security
    • iPhone
    • Mac
    • Windows
    • My Tickets
    • Submit Ticket
    © 2025 LetsTechitEasy. Designed by Sukrit Infotech.

    Type above and press Enter to search. Press Esc to cancel.

    Sign In or Register

    Welcome Back!

    Login below or Register Now.

    Lost password?

    Register Now!

    Already registered? Login.

    A password will be e-mailed to you.