For working professionals
For fresh graduates
More
Learn Cyber Security Tutorial …
1. Cyber Security
2. Difference between Circuit Switching and Packet Switching
3. Difference Between Hub and Switch
4. Difference between IPv4 and IPv6
5. Distance Vector Routing (DVR) Protocol
6. Go-Back-N ARQ
7. What is Google Dorking
8. How Does The Internet Work
9. Identity And Access Management (IAM)
10. OSI Model
Now Reading
11. Selective Repeat ARQ
12. Sliding Window Protocol
13. Two Factor Authentication
14. Digital Signatures and Certificates
15. What is VPN and How It Works?
16. What is Firewall
17. What Is Network Topology
18. Subnetting in Computer Networks
19. Intrusion Prevention Systems
20. Network Segmentation
21. Endpoint Detection and Response
22. Security Information and Event Management (SIEM)
23. Data Loss Prevention (DLP)
24. Cross Site Scripting (XSS)
25. Software Bill of Materials(SBOM)
26. ESG Frameworks
As a tech expert, I have worked closely with the OSI model and layers to make it easier for individuals to transfer data and information from one computer to another. This is a seamless way of data transfer that also ensures data security. The OSI model is made up of seven layers and each of the layers has certain distinct features that help the system to perform various network functions.
I have curated this detailed tutorial for you to better understand the different layers in OSI model as well as the function of OSI model in this ever-evolving technological era.
The Open System Interconnection model, as the name suggests, is an abstract structure that makes it possible for different systems of communication to interact using common standard protocols. In simple words, the OSI paradigm offers a norm that allows various computer systems to link and share information.
Here, I am attaching a descriptive OSI model diagram that will help you to better understand what the structure is about and how it actually works. The OSI model was developed by the International Organization for Standardization in 1984 with an aim to allow a variety of communication systems to interact with each other by employing certain standard protocols, also known as OSI model layers protocols. This model consists of seven descriptive layers that together make up the means to interact across a network.
This architectural model splits the assignment into seven simpler and manageable sub-tasks. Different layers in the OSI model have a specific task entrusted to it. Since every layer is standalone, tasks allocated to each layer can be handled and accomplished on their own.
Now that you are well-versed in the concept and significance of the OSI model, let me walk you through the different OSI model layers with examples.
The application layer in OSI model allows users and software operations to access network services. In my years of experience, this layer has dealt with concerns like allocation and distribution of resources, network transparency, seamless transmission of data, and so on.
However, the software applications are not inclusive of this layer. The application layer only assists you in carrying out application layer activities. It is the final users who acquire the network amenities through this layer. Application layer protocols encompass both HTTP and SMTP signals that permit communication via email.
In my early days in the tech field, the most important function of the application layer that I experienced was its ability to allow users to access, manage, and transfer files on a remote computer. This layer also allows users to forward and store email.
The presentation layer is popularly known as the syntax layer. This layer mostly deals with the Sintic and semantic components of the data communicated between two computer systems. The OSI model security architecture greatly depends upon the presentation layer as it operates as the data interpreter of a network.
The OSI model uses the data prepared by the presentation layer. You can make the presentation layer as secure as possible by encrypting the data that you want to transmit to another device.
This is the third layer in the OSI model, which is primarily used to build, sustain, and coordinate the interaction between two or more devices. This layer is in charge of establishing and terminating communication among the devices. The session layer, as the name suggests, denotes the period of time between the start and completion of a communication to avoid the wastage of resources.
This particular layer will allow you to remain in session for a communication and it will end the communication after the transmission of data.
The OSI model, transport layer is one of the most crucial layers in the entire structure. Earlier I used to find it very difficult to understand the mechanism of this layer. Hence, I am explaining the functionalities of the transport layer in the easiest manner.
This layer guarantees that there is no redundancy of data and that the messages are dispatched and delivered in the particular sequence as they were sent. The primary responsibility of the transport layer is to ensure that the transmission of information is done properly and completely. Whenever you try to send a message, this layer breaks it into smaller segments and sends it in a sequence.
This layer is popularly known as end to end layer because it builds a dependable point-to-point connection between the place of origin, origin, and destination in order to transmit the data.
The network layer in OSI model keeps track of the location of various devices on a particular network. This is done so that your system can find the best path through which it can move the data packets from one system to another.
It helps decide the path via which the data will travel from the source to the destination. This layer also converts the information into small data packets which makes it easier to travel through the route channels.
The data link layer in OSI model has the duty to monitor and ensure error-free transmission of data. This layer builds trust and reliability in the communication channel between two or more computer systems.
This data layer in OSI model helps uniquely identify and locate every device existing on the given local network. This layer defines the hardware destination and the address of the originator.
The physical layer, also layer 1 of the OSI model transmits small bits from one node to another. This is regarded as the lowest layer in the OSI model that sets up, promotes, and terminates the physical connection.
It specifies the necessities associated with the procedural and mechanical network connections. Throughout these years, the physical layer has mostly assisted me in deciding the kind of signal that I should use while transferring data.
We know the TCP/IP model as a new-age model which handles communication over the Internet. However, the OSI model is quite different from the TCI model.
Let me illustrate the differences between the OSI model and TCP/IP model:
OSI model | TCP/IP model |
It consists of seven layers | The TCP/IP model has a four-layer structure |
It follows a horizontal strategy | It implements a vertical methodology |
The OSI model is considered a reference model, which implements protocol-independent standards | The TCP/IP model is regarded as a foundation upon which the Internet has been established |
Protocols in the OSI model can get easily affected because of changes and technology as they remain hidden | On the other hand, changing or replacing the protocols is not so easy in the TCP/IP model |
The OSI model was developed even before the protocols were established | In the TCP/IP model, the protocols were developed first and then the model came into existence |
The OSI model is an ideal paradigm and is considered to be an abstract concept | The TCP/IP model has a true existence and is used in real-time. |
This model is not compatible with internet technology. | The TCP/IP model is designed in a way that it aligns with the Internet standard. |
Having worked so many years in the tech industry, I can say that the OSI model has genuinely helped me to work around network communication. Although it is incompatible with the Internet, it still has helped me a lot in understanding how communication within a network should be conducted.
Considering this context, you may check out the authentic and reputable certification programs offered by upGrad if you want to further develop your expertise. These courses will not only give you additional expertise but also a greater chance at a higher employment position because they are affiliated with prestigious universities and have curriculums designed by industry professionals.
The TCP/IP model serves as the foundation of Internet programs as opposed to the OSI model. However, the OSI model is still used for facilitating communication and visualization of network processes.
The OSI structure has several drawbacks such as it is incompatible with the Internet, it does not back Internet-based protocols and applications such as HTTP, TCP, IP, UDP, etc.
The OSI model serves as a handbook and a universal language to define computer networking. It offers a foundation for various computer systems to be able to interact with each other.
The major used protocols at the network layer are IP and ICMP. Apart from these two, there are certain other protocols such as address resolution protocol, domain name system, border Gateway protocol, etc.
To explain the OSI model, it is important to know its capability of handling data transmission errors. The transport layer uses an error detection approach and correction methodology to make sure that the data is safe and secure during transmission.
There are a total of seven layers in the OSI structure that provide a detailed approach to networking and communication.
The OSI model combines computing operations into an integrated set of rules and standards in order to encourage portability and connectivity throughout different software and hardware components.
The are numerous network protocols, but the seven most common ones include, Hypertext Transfer Protocol (HTTP), Internet Protocol (IP), File Transfer Protocol (FTP), User Datagram Protocol (UDP), Simple Network Management Protocol (SNMP), Internet Control Message Protocol (ICMP) and Post Office Protocol (POP).
Author
Talk to our experts. We are available 7 days a week, 9 AM to 12 AM (midnight)
Indian Nationals
1800 210 2020
Foreign Nationals
+918045604032
1.The above statistics depend on various factors and individual results may vary. Past performance is no guarantee of future results.
2.The student assumes full responsibility for all expenses associated with visas, travel, & related costs. upGrad does not provide any a.