OSI network models

15 February 2024 8 minutes Author: Lady Liberty

In this article, you will learn about the OSI network model, which is the foundation for understanding the structure and operation of computer networks. We will take a detailed look at each of the seven layers of the OSI model, explain their functions and role in the data transfer process. You will gain an understanding of how different network devices and protocols interact within this model, ensuring reliable and efficient communication between computer systems.

OSI reference network model

OSI stands for Open System Interconnection. In Ukrainian it sounds like this: Network model of interaction of open systems (reference model). This model can be called a standard. It is this model that manufacturers of network devices follow when developing new products. The OSI network model consists of 7 levels, and it is customary to start counting from the bottom.

Let’s list them:

 

  • Application layer (application layer)

  • Presentation layer or presentation layer

  • Session layer (session layer)

  • Transport layer (transport layer)

  • Network layer (network layer)

  • Channel layer (data link layer)

  • Physical layer (physical layer)

As mentioned above, the network model is a model of the interaction of network protocols (standards), each level has its own protocols. Enumerating them is a boring process (and there is no point in it), so it is better to analyze everything with an example, because the assimilation of the material is much higher with examples;)

Application level

The application layer is the highest level of the model. It connects user applications with the network. We are all familiar with these programs: browsing the web (HTTP), sending and receiving mail (SMTP, POP3), receiving and receiving files (FTP, TFTP), remote access (Telnet), etc.

Representative level

Presentation layer – it converts data into the appropriate format. For example, the image you see on your screen (all images) is sent as small pieces (bits) of 1’s and 0’s when you send a file. So if you send a photo to a friend by email, the SMTP application layer protocol sends the photo to a lower layer – presentation level.

There, the photo is converted into a data format convenient for the lower level, for example, into bits (1s and 0s). That way, when your friend starts receiving your photo, it’s sent to them in the same format of 1s and 0s. It is the representation layer that transforms the bits into a full-fledged photo, for example, a JPEG. This layer works in this way with such protocols (standards) as images (JPEG, GIF, PNG, TIFF), encoding (ASCII, EBDIC), music and video (MPEG).

Session level

Session layer or session layer – as the name suggests, it organizes a communication session between computers. A good example would be audio and video conferencing, at this level it is established which codec will encode the signal, and this codec must be present on both machines. Another example is the SMPP protocol (Short message peer-to-peer protocol), which is used to send well-known SMS and USSD requests. And one last example: PAP (Password Authentication Protocol) is an old protocol for sending a username and password to a server without encryption.

Transport level

Transport layer (transport layer) – this layer ensures the reliability of transmission from the sender to the recipient. In fact, everything is very simple, for example, you communicate using a webcam with your friend or teacher. Is there a need for reliable delivery of every bit of the transmitted image? Of course not, if a few bits are lost from the streaming video, you won’t even notice it, even the picture won’t change (for example, the color of one pixel out of 900,000 pixels will change, flashing at 24 frames per second).

Now let’s give an example: a friend sends you (for example, by mail) important information or a program in the archive. You download this archive to your computer. This is where 100% reliability is necessary, because if a couple of bits are lost when uploading the archive, you can unarchive it, i.e. extract the necessary data. Or imagine sending a password to a server, and one bit is lost on the way – the password will already lose its appearance and the value will change.

Thus, when we watch videos on the Internet, sometimes we see some artifacts, delays, noises, etc. And when we read text from a web page, the loss (or distortion) of letters is not acceptable, and when we download programs, everything also goes without errors.

At this level, we distinguish two protocols: UDP and TCP. The UDP protocol (User Datagram Protocol) transmits data without establishing a connection, does not confirm the delivery of data and repeats. The TCP protocol (Transmission Control Protocol), which establishes a connection before transmission, confirms the delivery of data, repeats it if necessary, guarantees the integrity and correct sequence of the data being downloaded.

So, for music, videos, video conferences and calls, we use UDP (transmit data without verification and without delays), and for text, programs, passwords, archives, etc. – TCP (acknowledgment data transfer, takes longer).

Network layer

Network layer (network layer) – this layer determines the path by which data will be transmitted. And, by the way, this is the third level of the OSI Network Model, and there are such devices that are called third-level devices – routers. We’ve all heard of an IP address, that’s what the IP (Internet Protocol) does.

An IP address is a logical address on a network. There are quite a lot of protocols at this level, and we will discuss all these protocols in more detail later, in separate articles and examples. Now I will list only a few popular ones. Just as everyone has heard of the IP address and the ping command, the ICMP protocol works. The same routers (with which we will work in the future) use protocols of this level for routing packets (RIP, EIGRP, OSPF).

Channel level

Channel layer (data link layer) – it is necessary for the physical interaction of networks. Probably, everyone has heard about the MAC address, here it is a physical address.
Channel level devices – switches, hubs, etc.
  • The IEEE (Institute of Electrical and Electronics Engineers) defines the channel layer as two sublayers: LLC and MAC.

  • LLC – logical link control (Logical Link Control), created for interaction with the upper layer.

  • MAC – media access control (Media Access Control), designed to interact with the lower layer.

Let’s explain with an example: your computer (laptop, communicator) has a network card (or some other adapter), so there is a driver for interaction with it (with the card). A driver is some program – the upper sub-level of the channel level, through which you can communicate with the lower levels, more precisely with the microprocessor (iron) – the lower sub-level of the channel level.
There are many typical representatives of this level. PPP (Point-to-Point) is a protocol for direct communication between two computers. FDDI (Fiber Distributed Data Interface) – the standard transmits data over a distance of up to 200 km. CDP (Cisco Discovery Protocol) is a proprietary (proprietary) protocol owned by Cisco Systems that allows you to discover nearby devices and obtain information about these devices.

Physical level

Physical layer (physical layer) is the lowest level that directly transmits the data stream. We all know the protocols well: Bluetooth, IRDA (Infrared communication), copper wires (twisted pair, telephone line), Wi-Fi, etc.

TCP/IP network model

The TCP/IP model is commonly referred to as the DOD (Department of Defense) model.

The DOD (or TCP/IP) model differs from the OSI network model in the number of layers.

  • Application level

  • Transport level (Transport)

  • Network layer (Internet)

  • Network access level (Network Access)

Surprisingly, the four DOD layers are enough to cover the seven layers of the OSI model. Although there are certain differences. In general, if we do not go into details, the application layer of the DOD model corresponds to the three upper layers of the OSI model (application, presentation, session), the transport layer corresponds to the transport layer, and the network layer to the network, respectively, and the network access layer corresponds to the two lower layers of the OSI model ( data link, physical).

And if we go into details, we need to start with the fact that the TCP/IP network model was developed much earlier than the OSI model. The TCP/IP model was already formed on the basis of existing protocols, but OSI, on the contrary, first created a model, and then protocols for it, each of which has its own pros and cons. OSI is a more modern model, so it is discussed more often on the Internet, but the protocols used are the TCP/IP stack (groups, stacks (one on top of another)) based on the DOD model.

The article is made for informational purposes

Other related articles
Found an error?
If you find an error, take a screenshot and send it to the bot.