Pick a color scheme
ad placeholder image ad placeholder image

OSI Model: The Seven-Layer Network Reference Model

The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a communication system into seven distinct layers. While the TCP/IP model is more commonly used in practice, understanding the OSI model is essential for network professionals, troubleshooting, and understanding network architecture. This comprehensive guide explains the OSI model and its seven layers.

What is the OSI Model?

The OSI model is a reference model developed by the International Organization for Standardization (ISO) in 1984. It describes how data moves from an application on one computer through a network to an application on another computer.

Purpose and History

Development:

Created: 1984
Organization: ISO (International Organization for Standardization)
Purpose: Standardize network communication
Goal: Vendor-neutral framework

Why it matters:

Universal reference model
Educational framework
Troubleshooting guide
Protocol classification
Vendor communication

OSI vs TCP/IP:

OSI: 7 layers (theoretical reference)
TCP/IP: 4 layers (practical implementation)
OSI: More granular
TCP/IP: Internet standard
Both: Complementary understanding

Learn more about the TCP/IP model and networking basics.

The Seven Layers

Layer Overview

7. Application Layer    ← User interface
6. Presentation Layer   ← Data formatting
5. Session Layer        ← Session management
4. Transport Layer      ← End-to-end delivery
3. Network Layer        ← Routing
2. Data Link Layer      ← Node-to-node delivery
1. Physical Layer       ← Physical transmission

Mnemonic (bottom to top):

Please Do Not Throw Sausage Pizza Away
Physical, Data Link, Network, Transport, Session, Presentation, Application

Mnemonic (top to bottom):

All People Seem To Need Data Processing
Application, Presentation, Session, Transport, Network, Data Link, Physical

Layer 1: Physical Layer

Purpose

Transmits raw bits over a physical medium.

Responsibilities:

Bit transmission
Physical topology
Hardware specifications
Signal encoding
Transmission mode (simplex, duplex)
Physical medium characteristics

Components and Technologies

Hardware:

Cables (copper, fiber)
Network interface cards (NICs)
Hubs
Repeaters
Modems
Connectors (RJ45, fiber connectors)

Transmission media:

Twisted pair (Cat5e, Cat6, Cat7)
Coaxial cable
Fiber optic (single-mode, multi-mode)
Wireless (radio frequencies)

Specifications:

Voltage levels
Cable standards (TIA/EIA-568)
Pin configurations
Signal timing
Bandwidth
Distance limitations

Physical Topologies

Bus:

All devices on single cable
Terminated at both ends
Collision domain
Legacy technology

Star:

Central hub/switch
Each device separate connection
Most common today
Easy troubleshooting

Ring:

Circular connection
Token passing
FDDI, Token Ring
Less common now

Mesh:

Multiple interconnections
Redundancy
High availability
Complex, expensive

Encoding and Signaling

Digital encoding:

NRZ (Non-Return to Zero)
Manchester encoding
4B/5B encoding
8B/10B encoding

Signal types:

Electrical (copper)
Light (fiber optic)
Radio waves (wireless)

Layer 2: Data Link Layer

Purpose

Provides node-to-node data transfer and error detection.

Responsibilities:

Physical addressing (MAC)
Frame formatting
Error detection
Flow control
Media access control

Sublayers

MAC (Media Access Control):

Physical addressing
Media access methods
Frame transmission
Collision handling

LLC (Logical Link Control):

Flow control
Error control
Multiplexing
Interface to Network layer

MAC Addresses

Format:

48 bits (6 bytes)
Hexadecimal notation
Example: 00:1A:2B:3C:4D:5E
OUI (first 24 bits): Manufacturer
Device ID (last 24 bits): Unique identifier

Types:

Unicast: Single destination
Multicast: Group of devices
Broadcast: All devices (FF:FF:FF:FF:FF:FF)

Frame Structure

Ethernet frame:

┌──────────┬──────────┬────────┬──────┬─────┬─────┐
│ Preamble │ Dest MAC │Src MAC │ Type │ Data│ FCS │
│ (8 bytes)│ (6 bytes)│(6 bytes)│(2 B) │     │(4 B)│
└──────────┴──────────┴────────┴──────┴─────┴─────┘

Components:

Preamble: Synchronization
Destination MAC: Recipient address
Source MAC: Sender address
Type/Length: Protocol identifier
Data: Payload (46-1500 bytes)
FCS: Frame Check Sequence (CRC)

Protocols and Devices

Protocols:

Ethernet (IEEE 802.3)
WiFi (IEEE 802.11)
PPP (Point-to-Point Protocol)
HDLC (High-Level Data Link Control)
Frame Relay
ATM

Devices:

Switches (Layer 2)
Bridges
Network interface cards
Wireless access points

Error Detection

CRC (Cyclic Redundancy Check):

Mathematical calculation
Detects transmission errors
Appended to frame (FCS)
Receiver recalculates and compares

Error handling:

Detection: CRC, checksum
Correction: Retransmission (upper layers)
Notification: Error frames

Layer 3: Network Layer

Purpose

Handles logical addressing and routing between networks.

Responsibilities:

Logical addressing (IP)
Routing
Packet forwarding
Fragmentation and reassembly
Path determination

IP Addressing

IPv4:

32-bit addresses
Dotted decimal: 192.168.1.1
Network and host portions
Subnetting

IPv6:

128-bit addresses
Hexadecimal: 2001:db8::1
Hierarchical structure
Simplified header

Routing

Routing table:

Destination network
Next hop gateway
Interface
Metric (cost)

Routing protocols:

RIP (Routing Information Protocol)
OSPF (Open Shortest Path First)
EIGRP (Enhanced Interior Gateway Routing Protocol)
BGP (Border Gateway Protocol)
IS-IS (Intermediate System to Intermediate System)

Routing types:

Static: Manually configured
Dynamic: Automatically learned
Default: Catch-all route

Protocols

IP (Internet Protocol):

IPv4: Most widely deployed
IPv6: Next generation
Connectionless
Best-effort delivery

ICMP (Internet Control Message Protocol):

Error reporting
Diagnostic messages
Ping (echo request/reply)
Traceroute (time exceeded)

ARP (Address Resolution Protocol):

Maps IP to MAC addresses
Broadcast request
Cached responses
Local network only

IPSec:

Security protocol suite
Authentication
Encryption
VPN technology

Devices

Routers:

Layer 3 devices
Route between networks
Maintain routing tables
Packet forwarding decisions

Layer 3 switches:

Routing + switching
Inter-VLAN routing
Wire-speed routing

Layer 4: Transport Layer

Purpose

Provides end-to-end communication and reliability.

Responsibilities:

Segmentation and reassembly
Port addressing
Connection management
Flow control
Error recovery
Multiplexing

TCP (Transmission Control Protocol)

Characteristics:

Connection-oriented
Reliable delivery
Ordered delivery
Flow control
Congestion control
Full-duplex

Three-way handshake:

1. Client → Server: SYN
2. Server → Client: SYN-ACK
3. Client → Server: ACK
Connection established

Features:

Sequence numbers
Acknowledgments
Retransmission
Window size
Checksums

UDP (User Datagram Protocol)

Characteristics:

Connectionless
Unreliable
No ordering
No flow control
Lightweight
Low overhead

Use cases:

DNS queries
Video streaming
VoIP
Online gaming
DHCP
TFTP

Port Numbers

Ranges:

Well-known: 0-1023
Registered: 1024-49151
Dynamic/Private: 49152-65535

Common ports:

20/21: FTP
22: SSH
23: Telnet
25: SMTP
53: DNS
80: HTTP
110: POP3
143: IMAP
443: HTTPS
3389: RDP

Protocols

TCP: Reliable, connection-oriented UDP: Fast, connectionless SCTP: Stream Control Transmission Protocol DCCP: Datagram Congestion Control Protocol

Layer 5: Session Layer

Purpose

Manages sessions between applications.

Responsibilities:

Session establishment
Session maintenance
Session termination
Synchronization
Dialog control

Functions

Session management:

Create sessions
Maintain sessions
Terminate sessions
Recover from failures

Dialog control:

Half-duplex
Full-duplex
Simplex
Turn management

Synchronization:

Checkpoints
Recovery points
Resume after interruption

Protocols

NetBIOS:

Network Basic Input/Output System
Session management
Name resolution
Legacy Windows networking

PPTP (Point-to-Point Tunneling Protocol):

VPN protocol
Session establishment
Tunnel management

RPC (Remote Procedure Call):

Inter-process communication
Session management
Distributed computing

SIP (Session Initiation Protocol):

VoIP signaling
Session establishment
Multimedia sessions

Real-World Examples

Video conference:

Establish session
Maintain audio/video streams
Handle interruptions
Synchronize participants
Terminate session

Database connection:

Open connection
Maintain transaction state
Handle timeouts
Close connection

Layer 6: Presentation Layer

Purpose

Translates data between application and network formats.

Responsibilities:

Data translation
Encryption/decryption
Compression/decompression
Character encoding
Data formatting

Data Translation

Character encoding:

ASCII
Unicode (UTF-8, UTF-16)
EBCDIC
Code page conversions

Data formats:

JPEG, GIF, PNG (images)
MPEG, AVI (video)
MP3, WAV (audio)
PDF, DOC (documents)

Encryption

SSL/TLS:

Secure communication
Certificate-based
Encryption negotiation
Data encryption

Encryption types:

Symmetric (AES, DES)
Asymmetric (RSA, ECC)
Hashing (SHA, MD5)

Compression

Methods:

Lossless (ZIP, GZIP)
Lossy (JPEG, MP3)
Reduces bandwidth
Improves performance

Protocols

SSL/TLS:

Secure Sockets Layer
Transport Layer Security
HTTPS foundation

MIME:

Multipurpose Internet Mail Extensions
Email attachments
Content type specification

XDR:

External Data Representation
Data serialization
Platform-independent

Layer 7: Application Layer

Purpose

Provides network services to end-user applications.

Responsibilities:

Application protocols
User interface
Network service access
Resource sharing

Common Protocols

HTTP/HTTPS:

Web browsing
Port 80/443
Request-response
Stateless

FTP:

File transfer
Ports 20/21
Active/passive modes
Authentication

SMTP:

Email sending
Port 25, 587, 465
Mail relay

POP3/IMAP:

Email retrieval
POP3: Port 110/995
IMAP: Port 143/993

DNS:

Name resolution
Port 53
Hierarchical
Distributed database

DHCP:

IP address assignment
Ports 67/68
Automatic configuration

SSH:

Secure remote access
Port 22
Encrypted
Authentication

Telnet:

Remote access
Port 23
Unencrypted (insecure)
Legacy

SNMP:

Network management
Ports 161/162
Monitoring
Configuration

Application Layer Services

File services:

FTP, TFTP, NFS
File sharing
File transfer

Email services:

SMTP, POP3, IMAP
Message transfer
Message retrieval

Directory services:

LDAP, Active Directory
User authentication
Resource location

Web services:

HTTP, HTTPS
REST APIs
SOAP

Data Encapsulation in OSI Model

Encapsulation Process

Sending data:

Layer 7 (Application): Data
Layer 6 (Presentation): Data (formatted)
Layer 5 (Session): Data (session info)
Layer 4 (Transport): Segment (TCP/UDP header + data)
Layer 3 (Network): Packet (IP header + segment)
Layer 2 (Data Link): Frame (Ethernet header + packet + trailer)
Layer 1 (Physical): Bits

Protocol Data Units (PDUs)

Each layer's PDU:

Layer 7-5: Data
Layer 4: Segment (TCP) / Datagram (UDP)
Layer 3: Packet
Layer 2: Frame
Layer 1: Bits

OSI Model vs TCP/IP Model

Comparison

OSI Layer TCP/IP Layer Protocols
Application Application HTTP, FTP, SMTP, DNS
Presentation Application SSL/TLS, MIME
Session Application NetBIOS, RPC
Transport Transport TCP, UDP
Network Internet IP, ICMP, ARP
Data Link Network Access Ethernet, WiFi
Physical Network Access Cables, NICs

Key Differences

OSI:

7 layers
Theoretical reference
More granular
Developed by ISO
Educational tool

TCP/IP:

4 layers
Practical implementation
Internet standard
Developed by DARPA
Real-world usage

Troubleshooting with OSI Model

Layer-by-Layer Approach

Layer 1 (Physical):

Check: Cables, connectors, NICs
Tools: Cable tester, link lights
Issues: Bad cable, loose connection

Layer 2 (Data Link):

Check: MAC addresses, switches
Tools: arp, show mac-address-table
Issues: Duplicate MAC, VLAN mismatch

Layer 3 (Network):

Check: IP addresses, routing
Tools: ping, traceroute, route
Issues: Wrong IP, routing problems

Layer 4 (Transport):

Check: Ports, firewall
Tools: telnet, netstat, ss
Issues: Port blocked, service down

Layer 5-7 (Upper layers):

Check: Application configuration
Tools: Application logs, curl
Issues: Misconfiguration, bugs

Troubleshooting Strategy

Bottom-up:

Start at Physical layer
Work up to Application layer
Systematic approach
Eliminates lower-layer issues first

Top-down:

Start at Application layer
Work down to Physical layer
Quick for application issues

Divide and conquer:

Start at middle (Network/Transport)
Narrow down problem area
Efficient for experienced users

Practical Applications

Network Design

Layered approach:

Physical: Cabling, topology
Data Link: Switching, VLANs
Network: IP addressing, routing
Transport: Port planning
Upper layers: Application selection

Benefits:

Modular design
Clear responsibilities
Easier troubleshooting
Vendor interoperability

Security

Defense in depth:

Physical: Locked server rooms
Data Link: Port security, 802.1X
Network: Firewalls, ACLs
Transport: Port filtering
Application: Application firewalls, authentication

Documentation

Network documentation:

Layer 1: Physical topology, cable maps
Layer 2: VLAN design, switch configs
Layer 3: IP addressing, routing
Layer 4: Port assignments
Layer 7: Application inventory

Conclusion

The OSI model provides a comprehensive framework for understanding network communication. While the TCP/IP model is more commonly used in practice, the OSI model's seven layers offer a detailed reference for education, troubleshooting, and communication among network professionals.


Related Articles

Network Fundamentals

Protocols by Layer

Troubleshooting

Explore More

Key takeaways: - Seven layers: Physical, Data Link, Network, Transport, Session, Presentation, Application - Each layer has specific responsibilities - Encapsulation adds headers at each layer - Reference model (not implementation) - Excellent for troubleshooting - Educational framework - Vendor-neutral - Complements TCP/IP understanding - Layer-by-layer troubleshooting approach - Foundation for network concepts

Understanding the OSI model helps network professionals communicate effectively, troubleshoot systematically, and design networks with clear separation of concerns. While you'll primarily work with TCP/IP in practice, OSI knowledge provides valuable conceptual understanding of network architecture.

ad placeholder image ad placeholder image
Three funny piglies - an illustration ippigly.com