{"id":67652,"date":"2022-10-04T09:02:41","date_gmt":"2022-10-04T09:02:41","guid":{"rendered":"https:\/\/www.cryptocabaret.com\/?p=67652"},"modified":"2022-10-04T09:02:41","modified_gmt":"2022-10-04T09:02:41","slug":"learn-the-osi-model-in-5-minutes","status":"publish","type":"post","link":"https:\/\/www.cryptocabaret.com\/?p=67652","title":{"rendered":"Learn the OSI model in 5 minutes"},"content":{"rendered":"<p><span class=\"field field--name-title field--type-string field--label-hidden\">Learn the OSI model in 5 minutes<\/span><br \/>\n<span class=\"field field--name-uid field--type-entity-reference field--label-hidden\"><a title=\"View user profile.\" href=\"https:\/\/opensource.com\/users\/anamika\" class=\"username\">Anamika<\/a><\/span><br \/>\n<span class=\"field field--name-created field--type-created field--label-hidden\">Tue, 10\/04\/2022 &#8211; 03:00<\/span><\/p>\n<div class=\"clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item\">\n<p>The Open Systems Interconnection (OSI) model is a standard for how computers, servers, and people communicate within a system. It was the first standard model for network communications and was adopted in the early 1980s by all major computer and telecommunications companies.<\/p>\n<p>The OSI model provides a universal language for describing networks and thinking about them in discrete chunks, or layers.<\/p>\n<h2>Layers of the OSI model<\/h2>\n<p>The model describes the seven layers through which computer systems communicate over a network.<\/p>\n<ol>\n<li><a href=\"https:\/\/opensource.com\/article\/22\/10\/osi-model-network-communications#application-layer\">Application layer<\/a><\/li>\n<li><a href=\"https:\/\/opensource.com\/article\/22\/10\/osi-model-network-communications#presentation-layer\">Presentation layer<\/a><\/li>\n<li><a href=\"https:\/\/opensource.com\/article\/22\/10\/osi-model-network-communications#session-layer\">Session layer<\/a><\/li>\n<li><a href=\"https:\/\/opensource.com\/article\/22\/10\/osi-model-network-communications#transport-layer\">Transport layer<\/a><\/li>\n<li><a href=\"https:\/\/opensource.com\/article\/22\/10\/osi-model-network-communications#network-layer\">Network layer<\/a><\/li>\n<li><a href=\"https:\/\/opensource.com\/article\/22\/10\/osi-model-network-communications#data-link-layer\">Data link layer<\/a><\/li>\n<li><a href=\"https:\/\/opensource.com\/article\/22\/10\/osi-model-network-communications#physical-layer\">Physical layer<\/a><\/li>\n<\/ol>\n<p>Each of these layers has its own way of working, with its own set of protocols that distinguish it from the others. This article provides a breakdown of the layers one by one.<\/p>\n<h2><a name=\"application-layer\">Application layer<\/a><\/h2>\n<p>The application layer is implemented in software. It is the layer used to interact with applications.<\/p>\n<p>Consider the example of sending a message. The sender will interact with the application layer and send the message. The application layer sends the message to the next layer in the OSI Model, the presentation layer.<\/p>\n<h2><a name=\"presentation-layer\">Presentation layer<\/a><\/h2>\n<p>The data from the application layer is forwarded to the presentation layer. The presentation layer receives the data in the form of words, characters, letters, numbers, and so on, and converts them into machine representable binary format. This process is known as <i>translation<\/i>.<\/p>\n<p>At this stage, ASCII characters (American Standard Code for Information Interchange) are converted into Extended Binary Coded Decimal Interchange Code (EBCDIC). Before the converted data goes further, it also undergoes <i>encoding<\/i> and <i>encryption<\/i> processes, using the SSL protocol for encryption and decryption.<\/p>\n<p>The presentation layer provides <i>abstraction<\/i> and assumes that the layers following it will take care of the data forwarded to them from this layer. It also plays a role in <i>compression<\/i> of the data. The compression can be lossy or lossless, depending on various factors beyond this article&#8217;s scope.<\/p>\n<h2><a name=\"session-layer\">Session layer<\/a><\/h2>\n<p>The session layer helps in setting up and managing connections. The main work of this layer is to establish a session. For example, on an online shopping site, a session is created between your computer and the site&#8217;s server.<\/p>\n<p>The session layer enables the sending and receiving of data, followed by the termination of connected sessions. <i>Authentication<\/i> is done before a session is established, followed by <i>authorization<\/i>. Like the previous layers, the session layer also assumes that, after its work is done, the data will be correctly handled by the subsequent layers.<\/p>\n<\/p>\n<div class=\"embedded-resource-list callout-float-right\">\n<div class=\"field field--name-title field--type-string field--label-hidden field__item\">More on edge computing<\/div>\n<div class=\"field field--name-links field--type-link field--label-hidden field__items\">\n<div class=\"field__item\"><a href=\"https:\/\/www.redhat.com\/en\/topics\/edge-computing?intcmp=7016000000127cYAAQ\">Understanding edge computing<\/a><\/div>\n<div class=\"field__item\"><a href=\"https:\/\/opensource.com\/article\/21\/2\/linux-edge-computing?intcmp=7016000000127cYAAQ\">Why Linux is critical to edge computing<\/a><\/div>\n<div class=\"field__item\"><a href=\"https:\/\/opensource.com\/downloads\/kubernetes-raspberry-pi?intcmp=7016000000127cYAAQ\">eBook: Running Kubernetes on your Raspberry Pi<\/a><\/div>\n<div class=\"field__item\"><a href=\"https:\/\/www.redhat.com\/en\/engage\/automated-enterprise-ebook-20171115?intcmp=701f2000000h4RcAAI\">Download now: The automated enterprise eBook<\/a><\/div>\n<div class=\"field__item\"><a href=\"https:\/\/opensource.com\/downloads\/home-automation-ebook?intcmp=701f2000000h4RcAAI\">eBook: A practical guide to home automation using open source tools<\/a><\/div>\n<div class=\"field__item\"><a href=\"https:\/\/www.redhat.com\/en\/engage\/automation-at-edge-20220727?intcmp=701f2000000h4RcAAI\">eBook: 7 examples of automation on the edge<\/a><\/div>\n<div class=\"field__item\"><a href=\"https:\/\/opensource.com\/tags\/edge-computing?intcmp=701f2000000h4RcAAI\">The latest on edge<\/a><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h2><a name=\"transport-layer\">Transport layer<\/a><\/h2>\n<p>The transport layer manages data transportation and\u00a0its own set of protocols for how data will be transferred. The data received here from the session layer is divided into smaller data units called <i>segments<\/i>. This process is known as <i>segmentation<\/i>. Every segment contains the source&#8217;s and destination&#8217;s port numbers and a sequence number. Port numbers identify the application on which the data needs to be sent. Note that the data is transferred in chunks. The sequence numbers are used to reassemble the segments in the correct order.<\/p>\n<p>The transport layer takes care of the <i>flow control<\/i>, or the amount of data transferred at a given time. It also accounts for <i>error control<\/i>, such as data loss, data corruption, and so on. It makes use of an error-detecting value known as <i>a checksum<\/i>. The transport layer adds a checksum to every data segment to check whether the sent data is received correctly. Data is then transferred to the network layer.<\/p>\n<h2><a name=\"network-layer\">Network layer<\/a><\/h2>\n<p>The network layer helps communicate with other networks. It works to transmit received data segments from one computer to another located in a different network. The router lives in the network layer.<\/p>\n<p>The function of the network layer is <i>logical addressing<\/i> (IP Addressing). It assigns the sender&#8217;s and receiver&#8217;s IP addresses to each data packet to ensure it is received at the correct destination. The network layer then routes the data packets.\u00a0<i>Load balancing<\/i>\u00a0also happens in the network layer to make sure that no overloading takes place. Next, the data is transported to the data link layer.<\/p>\n<h2><a name=\"data-link-layer\">Data link layer<\/a><\/h2>\n<p>The data link layer allows direct communication with other devices, such as computers and hosts.<\/p>\n<p>It receives data packets containing the IP addresses of the sender and receiver from the network layer and does the <i>physical addressing,<\/i> assigning the media access control (MAC) addresses of the sender and receiver to a data packet to form a <i>frame<\/i>.<\/p>\n<h2><a name=\"physical-layer\">Physical layer<\/a><\/h2>\n<p>This layer consists of all the hardware and mechanical elements of a system, including the configuration of wires, pins, adapters, and so forth. The data received here by the preceding layers is in the form of 0s and 1s. The physical layer converts this data and transports it to local media via various means, including wires, electrical signals, light signals (as in optical fiber cables), and radio signals (as in WiFi).<\/p>\n<p>Note that the physical layer works at the receiver&#8217;s end and transports the received signal to the data link as a frame (by converting it back to bits). The frame is moved to the higher layers, and ultimately the required data is received at the application layer, which is the software.<\/p>\n<h2>Conclusion<\/h2>\n<p>The OSI model is helpful when you need to describe network architecture or troubleshoot network problems. I hope this article gave you a clearer understanding of the elements this model.\u00a0<\/p>\n<\/div>\n<div class=\"clearfix text-formatted field field--name-field-article-subhead field--type-text-long field--label-hidden field__item\">\n<p>Get the basics of the Open Systems Interconnection (OSI) framework for conceptualizing communication within a computer system.<\/p>\n<\/div>\n<div class=\"field field--name-field-lead-image field--type-entity-reference field--label-hidden field__item\">\n<article class=\"media media--type-image media--view-mode-caption\">\n<div class=\"field field--name-field-media-image field--type-image field--label-hidden field__item\">  <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.cryptocabaret.com\/wp-content\/uploads\/2022\/10\/code_computer_development_programming.png\" width=\"520\" height=\"292\" alt=\"An introduction to GNU Screen\" title=\"An introduction to GNU Screen\"><\/div>\n<div class=\"field field--name-field-caption field--type-text-long field--label-hidden caption field__item\"><span class=\"caption__byline\">Image by: <\/span><\/p>\n<p>Opensource.com<\/p>\n<\/div>\n<\/article>\n<\/div>\n<div class=\"field field--name-field-tags field--type-entity-reference field--label-hidden field__items\">\n<div class=\"field__item\"><a href=\"https:\/\/opensource.com\/tags\/sysadmin\" hreflang=\"en\">Sysadmin<\/a><\/div>\n<div class=\"field__item\"><a href=\"https:\/\/opensource.com\/tags\/networking\" hreflang=\"en\">Networking<\/a><\/div>\n<div class=\"field__item\"><a href=\"https:\/\/opensource.com\/tags\/edge-computing\" hreflang=\"en\">Edge computing<\/a><\/div>\n<\/p><\/div>\n<div class=\"field field--name-field-listicle-title field--type-string field--label-hidden field__item\">What to read next<\/div>\n<div class=\"field field--name-field-listicles field--type-entity-reference field--label-hidden field__items\">\n<div class=\"field__item\"><a href=\"https:\/\/opensource.com\/article\/19\/9\/linux-mainframes-part-1\" hreflang=\"und\">How Linux came to the mainframe<\/a><\/div>\n<\/p><\/div>\n<div class=\"field field--name-field-default-license field--type-list-string field--label-hidden field__item\"><a rel=\"license\" href=\"http:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\"><br \/>\n        <img decoding=\"async\" alt=\"Creative Commons License\" src=\"https:\/\/www.cryptocabaret.com\/wp-content\/uploads\/2022\/10\/cc-by-sa-4-3.png\" title=\"This work is licensed under a Creative Commons Attribution-Share Alike 4.0 International License.\"><\/a>This work is licensed under a Creative Commons Attribution-Share Alike 4.0 International License.<\/div>\n<section class=\"field field--name-field-comments field--type-comment field--label-hidden comment-wrapper\">\n<div class=\"comments__count\">\n<div class=\"login\"><a href=\"https:\/\/opensource.com\/user\/register?absolute=1\">Register<\/a> or <a href=\"https:\/\/opensource.com\/user\/login?current=\/rss.xml&amp;absolute=1\">Login<\/a> to post a comment.<\/div>\n<\/p><\/div>\n<\/section>\n<p class=\"wpematico_credit\"><small>Powered by <a href=\"http:\/\/www.wpematico.com\" target=\"_blank\" rel=\"noopener\">WPeMatico<\/a><\/small><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn the OSI model in 5 minutes Anamika Tue, 10\/04\/2022 &#8211; 03:00 The Open Systems Interconnection (OSI) model is a standard for how computers, servers, and people communicate within a system. It was the first standard model for network communications and was adopted in the early 1980s by all major computer and telecommunications companies. The [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":67653,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[307],"tags":[],"class_list":["post-67652","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-open-source"],"_links":{"self":[{"href":"https:\/\/www.cryptocabaret.com\/index.php?rest_route=\/wp\/v2\/posts\/67652","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cryptocabaret.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cryptocabaret.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cryptocabaret.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cryptocabaret.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=67652"}],"version-history":[{"count":0,"href":"https:\/\/www.cryptocabaret.com\/index.php?rest_route=\/wp\/v2\/posts\/67652\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cryptocabaret.com\/index.php?rest_route=\/wp\/v2\/media\/67653"}],"wp:attachment":[{"href":"https:\/\/www.cryptocabaret.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=67652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cryptocabaret.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=67652"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cryptocabaret.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=67652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}