fbpx

What Is The OSI Model?

Cyber security + Network Security + Network Basics taylor todayFebruary 19, 2021 233

Background
share close

Technology is growing at an astonishing rate, and the one reason behind this staggering growth is the presence of various systems. Since everything is connected through networks, the progress rate is higher.

How a Network Works

It is important to understand how it works before we proceed. A network links multiple devices to each other so they can communicate with ease. In a network structure, these devices are also commonly referred to as nodes, and the links are generally the means through which these nodes communicate.

Open System Interconnections Model

For it to operate efficiently, there must be a set of pre-defined rules and protocols around which it functions. This is where the Open System Interconnections model comes into play. It provides a collection of universally acknowledged protocols by different kinds of devices so they can communicate with each other inside a matrix.

ISO (International Organization for Standardization) introduced this standard system for communications and was implemented in the 1980s by major computer and telecommunication companies. It was created so that their devices could communicate with each other without having a conflict in choosing the best one for communication.

Layers of OSI Model

In the real world, we need to go through certain procedures and steps to reach our goal. In the same way, it has 7 steps for successful communication between different nodes. These steps are called layers, and the purpose of these is to handle a certain job and communicate with the next layer. The 7 of them are:

L1 – Physical Layer

The physical one transfers raw data in binary code, which is only understood by computers.

L2 – Data Link Layer

This one checks whether the data is going to the correct address, breaks them into frames, and check if there is an error in the data.

L3 – Network Layer

This layer chooses the best path for the data transfer to occur in a network and breaks frames into smaller packets.

L4 – Transport Layer

The job of this layer is to break the data into small segments and send it forward according to the speed of the receiving device.

L5 – Session Layer

This one manages the sessions during which the data is being transferred.

L6 – Presentation Layer

The presentation layer manages how the data is being presented and is responsible for its encryption.

L7 – Application Layer

This is the one on which the user interacts with the data. At this point, completion takes place, and hence this is the last one.

Bottom Line

After many advancements in the structure, in recent times, the TCP/IP has been used more than the OSI model. However, when it comes to network security, this model is way more efficient and suitable for securing a network.

When you hire NexGen Digital Solutions, we will perform a network audit, and 9/10 times we are likely to find issues and threats living comfortably in an OSI. Network auditing is easier in the OSI model because each is different from the other, therefore we can focus on one step at a time. This saves a lot of time from the steps that don’t need to be dealt with, and resources can be saved later on when diagnosing any potential issues.

Written by: taylor

Rate it
Previous post

Similar posts

Post comments (0)

Leave a reply

Your email address will not be published. Required fields are marked *


  • Locally Owned and Operated
  • Independent, Honest, Intuitive, Knowledgeable


Verticals

Follow us