Sitemap

The OSI Model: A Layered Approach to Networking

2 min readDec 19, 2024

--

The OSI Model (Imperva)

The OSI Model (Open Systems Interconnection) divides networking into seven different layers, with each having their own specific function. It simplifies communication and makes troubleshooting easy by separating issues.

1. Application Layer

  • What it does: The user interacts with an application to access network services.(email, web browsing)
  • Example: Browser Interface, Applications

2. Presentation Layer

  • What it does: Formats the data from application format to network format, or it is where the data encryption and decryption happens.
  • Example: SSL/TLS encrypts data for secure communication.

3. Session Layer

  • What it does: Where the sessions are handled, maintaining and terminating connections between devices.
  • Example: A video call session.

4. Transport Layer

  • What it does: Data breaks into small chunks (packets) to ensure smooth data delivery.
  • Example: TCP, UDP handles data delivery.

5. Network Layer

  • What it does: Handles routing and finding the best path for the data packets.
  • Example: IP addresses are assigned, and routers forward packets.

6. Data Link Layer

  • What it does: Prepares data for transmission over the physical medium and adds hardware (MAC) addresses.
  • Example: Switches operate here to direct data within a LAN.

7. Physical Layer

  • What it does: Transmits the raw bits (1 and 0) through cables, Wi-Fi, or any other physical medium.
  • Example: Ethernet cables or Wi-Fi signals.

How It Aids Troubleshooting

By breaking down the data communication process into seven different layers, it makes troubleshooting easy. It allows pinpointing the source of problems.

  • Application Layer Issue: A website not loading might indicate a server problem.
  • Network Layer Issue: Incorrect IP configuration or routing problems.
  • Physical Layer Issue: Caused by damaged cables, disrupted Wi-Fi signals.

The OSI Model simplifies diagnosing and fixing network problems, making it a critical tool for network management.

--

--

Emrul Hossain
Emrul Hossain

Written by Emrul Hossain

"Tech enthusiast passionate about cybersecurity, exploring secure systems, innovative technologies, and the future of digital protection."

No responses yet