www.networkworld.com Open in urlscan Pro
151.101.130.165  Public Scan

URL: https://www.networkworld.com/article/3239677/the-osi-model-explained-and-how-to-easily-remember-its-7-layers.html
Submission: On January 31 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false" placeholder="Start Searching"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Close Ad


network world
UNITED STATES
 * United States
 * Asia
 * United Kingdom

 * Glossary
 * Data Center
 * SD-WAN
 * Linux
 * Events
 * White Papers/Webcasts
 * Newsletters

×

search
 

5G
Cloud
 * Hybrid Cloud
 * Private Cloud

Data Centers
Internet of Things
Linux
Networking
 * SD-WAN
 * VPNs
 * Wi-Fi

Storage
Virtualization
Windows Server
Newsletters
Events
In-Depth
 * Features
 * How-To
 * News
 * Opinion
 * Reviews

Blogs
Video
 * 2-Minute Linux Tips
 * IDG TECH(talk) Channel

White Papers/Webcasts
From Our Partners
   
   
 * The Latest Content from Our Sponsors

More from the Foundry Network
The voice of IT leadership
Analytics Careers CIO Role Digital Transformation Leadership Project Management
Security at the speed of business
Application Security Cloud Security Identity Management Information Security
Network Security Risk Management Security Software
Making technology work for business
Blockchain Collaboration Mobile Office Software Security Systems Management
Windows
Building the next-gen enterprise
Analytics Cloud Computing Databases Devops Machine Learning Open Source Software
Development
 * About Us |
 * Contact |
 * Republication Permissions |
 * Privacy Policy |
 * Cookie Policy |
 * European Privacy Settings |
 * Member Preferences |
 * Advertising |
 * Foundry Careers |
 * Ad Choices |
 * E-commerce Links |
 * California: Do Not Sell My Personal Info |

 * Follow Us
 * 
 * 
 * 


×

Close
 * Part I of Cisco Networking Simplified
 * RELATED STORIES
 * Chapter 1: Network Overview
 * SPONSORED BY Advertiser Name Here Sponsored item title goes here as designed
 * What is MPLS, and why isn't it dead yet?

 * Home
 * Networking




THE OSI MODEL EXPLAINED AND HOW TO EASILY REMEMBER ITS 7 LAYERS


A TUTORIAL ON THE OPEN SYSTEMS INTERCONNECTION NETWORKING REFERENCE MODEL AND
TIPS ON AND HOW TO MEMORIZE THE SEVEN LAYERS

 * 
 * 
 * 
 * 
 * 
 * 
 * 

By Keith Shaw

Contributing Writer, Network World | Mar 14, 2022 2:00 am PDT


Thinkstock



The Open Systems Interconnect (OSI) model is a conceptual framework that
describes networking or telecommunications systems as seven layers, each with
its own function.

The layers help network pros visualize what is going on within their networks
and can help network managers narrow down problems (is it a physical issue or
something with the application?), as well as computer programmers (when
developing an application, which other layers does it need to work with?). Tech
vendors selling new products will often refer to the OSI model to help customers
understand which layer their products work with or whether it works “across the
stack”.

[ Related: What is IPv6, and why aren’t we there yet? ]


THE 7 LAYERS OF THE OSI MODEL

The layers are: Layer 1—Physical; Layer 2—Data Link; Layer 3—Network; Layer
4—Transport; Layer 5—Session; Layer 6—Presentation; Layer 7—Application.

It wasn’t always this way. Conceived in the 1970s when computer networking was
taking off, two separate models were merged in 1983 and published in 1984 to
create the OSI model that most people are familiar with today. Most descriptions
of the OSI model go from top to bottom, with the numbers going from Layer 7 down
to Layer 1. The layers, and what they represent, are as follows:




LAYER 7 - APPLICATION

The Application Layer in the OSI model is the layer that is the “closest to the
end user”. It receives information directly from users and displays incoming
data to the user. Oddly enough, applications themselves do not reside at the
application layer. Instead the layer facilitates communication through lower
layers in order to establish connections with applications at the other end. Web
browsers (Google Chrome, Firefox, Safari, etc.) TelNet, and FTP, are examples of
communications  that rely  on Layer 7.


LAYER 6 - PRESENTATION

The Presentation Layer represents the area that is independent of data
representation at the application layer. In general, it represents the
preparation or translation of application format to network format, or from
network formatting to application format. In other words, the layer “presents”
data for the application or the network. A good example of this is encryption
and decryption of data for secure transmission; this happens at Layer 6.




LAYER 5 - SESSION

When two computers or other networked devices need to speak with one another, a
session needs to be created, and this is done at the Session Layer. Functions at
this layer involve setup, coordination (how long should a system wait for a
response, for example) and termination between the applications at each end of
the session.

[ ‘IT has a new ‘It Crowd’: Join the CIO Tech Talk Community ]


LAYER 4 – TRANSPORT

The Transport Layer deals with the coordination of the data transfer between end
systems and hosts. How much data to send, at what rate, where it goes, etc. The
best known example of the Transport Layer is the Transmission Control Protocol
(TCP), which is built on top of the Internet Protocol (IP), commonly known as
TCP/IP. TCP and UDP port numbers work at Layer 4, while IP addresses work at
Layer 3, the Network Layer.

How-To's & Tips
What is the OSI model? Memorize each of its seven layers   (3:13)



LAYER 3 - NETWORK

Here at the Network Layer is where you’ll find most of the router functionality
that most networking professionals care about and love. In its most basic sense,
this layer is responsible for packet forwarding, including routing through
different routers. You might know that your Boston computer wants to connect to
a server in California, but there are millions of different paths to take.
Routers at this layer help do this efficiently.


LAYER 2 – DATA LINK

The Data Link Layer provides node-to-node data transfer (between two directly
connected nodes), and also handles error correction from the physical layer. Two
sublayers exist here as well--the Media Access Control (MAC) layer and the
Logical Link Control (LLC) layer. In the networking world, most switches operate
at Layer 2. But it’s not that simple. Some switches also operate at Layer 3 in
order to support virtual LANs that may span more than one switch subnet, which
requires routing capabilities.


LAYER 1 - PHYSICAL

At the bottom of our OSI model we have the Physical Layer, which represents the
electrical and physical representation of the system. This can include
everything from the cable type, radio frequency link (as in a Wi-Fi network), as
well as the layout of pins, voltages, and other physical requirements. When a
networking problem occurs, many networking pros go right to the physical layer
to check that all of the cables are properly connected and that the power plug
hasn’t been pulled from the router, switch or computer, for example.


WHY YOU NEED TO KNOW THE 7 OSI LAYERS

Most people in IT will likely need to know about the different layers when
they’re going for their certifications, much like a civics student needs to
learn about the three branches of the US government. After that, you hear about
the OSI model when vendors are making pitches about which layers their products
work with.



In a Quora post asking about the purpose of the OSI model, Vikram Kumar answered
this way:

“The purpose of the OSI reference model is to guide vendors and developers so
the digital communication products and software programs they create will
interoperate, and to facilitate clear comparisons among communications tools.”

While some people may argue that the OSI model is obsolete (due to its
conceptual nature) and less important than the four layers of the TCP/IP model,
Kumar says that “it is difficult to read about networking technology today
without seeing references to the OSI model and its layers, because the model’s
structure helps to frame discussions of protocols and contrast various
technologies.”

If you can understand the OSI model and its layers, you can also then understand
which protocols and devices can interoperate with each other when new
technologies are developed and explained.




THE OSI MODEL REMAINS RELEVANT

In a post on GeeksforGeeks, contributor Vabhav Bilotia argues several reasons
why the OSI model remains relevant, especially when it comes to security and
determining where technical risks and vulnerabilities may exist.

For example, by understanding the different layers, enterprise security teams
can identify and classify physical access, where the data is sitting, and
provide an inventory of the applications that employees use to access data and
resources.

“Knowing where the majority of your company’s data is held, whether on-premises
or in cloud services, will help define your information security policy,” writes
Bilotia. “You can invest in the correct solutions that provide you data
visibility within the proper OSI layers once you have this knowledge.”

In addition, the OSI model can be used to understand cloud infrastructure
migrations, particularly when it comes to securing data within the cloud.

And because the model has been around for so long and understood by so many, the
uniform vocabulary and terms helps networking professionals understand quickly
about the components of the networking system “While this paradigm is not
directly implemented in today’s TCP/IP networks, it is a useful conceptual model
for relating multiple technologies to one another and implementing the
appropriate technology in the appropriate way,” Bilotia writes. We couldn’t
agree more.


HOW TO REMEMBER THE OSI MODEL 7 LAYERS – 8 MNEMONIC TRICKS

If you need to memorize the layers for a college or certification test, here are
a few sentences to help remember them in order. The first letter of each word is
the same as the first letter an OSI layer.

From Application to Physical (Layer 7 to Layer 1): 

All People Seem To Need Data Processing

All Pros Search Top Notch Donut Places

A Penguin Said That Nobody Drinks Pepsi

A Priest Saw Two Nuns Doing Pushups

From Physical to Application (Layer 1 to Layer 7):

Please Do Not Throw Sausage Pizza Away

Pew! Dead Ninja Turtles Smell Particularly Awful

People Don’t Need To See Paula Abdul

Pete Doesn’t Need To Sell Pickles Anymore

Keith Shaw was a Network World editor and the writer of the Cool Tools column.
He is now a freelance writer and editor from Worcester, Mass.

Next read this:

 * 9 career-boosting Wi-Fi certifications
 * What is MPLS, and why isn't it dead yet?
 * 11 ways to list and sort files on Linux
 * 5 free network-vulnerability scanners
 * How-to measure enterprise Wi-Fi speeds



Related:
 * Networking

Keith Shaw is a digital journalist and content creator with more than 20 years
covering technology issues. He is currently host of Foundry's "Today in Tech"
show.

Follow
 * 
 * 
 * 

Copyright © 2022 IDG Communications, Inc.

The 10 most powerful companies in enterprise networking 2022



SPONSORED LINKS

 * dtSearch® - INSTANTLY SEARCH TERABYTES of files, emails, databases, web data.
   25+ search types; Win/Lin/Mac SDK; hundreds of reviews; full evaluations

Network World Follow us
 * 
 * 
 * 
   


 * About Us
 * Contact
 * Republication Permissions
 * Privacy Policy
 * Cookie Policy
 * European Privacy Settings
 * Member Preferences
 * Advertising
 * Foundry Careers
 * Ad Choices
 * E-commerce Links
 * California: Do Not Sell My Personal Info

Copyright © 2023 IDG Communications, Inc.

Explore the Foundry Network descend
 * CIO
 * Computerworld
 * CSO Online
 * InfoWorld
 * Network World














NETWORK WORLD WANTS TO SHOW YOU NOTIFICATIONS

--------------------------------------------------------------------------------

YOU CAN TURN OFF NOTIFICATIONS AT ANY TIME FROM YOUR BROWSER

Accept Do not accept

POWERED BY SUBSCRIBERS