How Communication happens using OSI model Last Updated : 16 Mar, 2021 Comments Improve Suggest changes Like Article Like Report The Open System Interconnection (OSI) model is a standard “reference model” created by an International Organization for Standardization (ISO) to describe how software and hardware components involved in network communication divide efforts and interact with each other. The OSI model defines a seven-layer set of functional elements, from physical interrelations at level 1 (physical layer) up to layer 7 (application layer). Transmission Control Protocol (TCP) and Internet Protocol (IP) are two network standards that define the Internet. IP defines how computers can receive data from each other on a mutually connected set of networks. TCP defines how such networks can have more reliable channels of communication. Need of layers in the OSI model : The approach of establishing a link between two devices for communicating and sharing information is complex. Generating profitable communication takes many tasks. A network architecture needs to be developed to perform all these functions.In network architecture, various tasks and functions are classified into related and manageable sets called LAYERS. Network architecture can be defined as a set of protocols that describe how each layer functions. Protocols are hidden in the OSI model and are easily changed as technology changes.Intermediate systems require only a few layers and not all layers. Protocol layering enables us to design the system or device to which the consecutive layers are placed. It also allows services to be distinct from implementation.A 7 Layer OSI/ISO reference Model The reasons and advantages of using network architecture are as follows : The layered architecture provides variability to renovate and expand network services.Management of new services and network infrastructure has become easier. It removes complications from the design process because the functions and their negotiation of each layer are distinguishable.The number of layers, the names, and functions of the layers assigned to them can change from network to network. But for all networks, always the lower layer provides something Services of its upper layer.The concept of layered architecture is a new way of looking at networks.Logical segmentation allows parallel work on different tasks by different teams simultaneously.Due to segmentation (layered structure), it is possible to break complex problems into simple and more feasible tasks. The communication process in the OSI/ISO model : An exchange using ISO/OSI Model In higher layers, each layer of the sender adds its information to the message received from above that layer and moves the entire package just below the layer as shown in the figure.Each layer added its information in the form of headers. Headers are added at the level of the messages (6, 5, 4, 3, and 2). A header is added at the Data Link layer (layer 2).At the physical layer, communication is direct i.e. the sender sends a stream of bits to the receiver. At the physical layer (layer 1) the entire package is converted into a form that can be transferred to the receiver. On the receiver side, each process is accompanied layer-by-layer to receive and delete message data.Always the upper OSI layers are implemented in the software (Transport layer, Session layer, Presentation layer, Application layer (4, 5,) and the lower layers are a combination of hardware and software (layer 2, 3), except for the physical layer which is mostly hardware. Layer 1, 2, and 3 (ie physical layer, data link layer, and network layer) are network support layers. They deal with physical aspects of moving data such as electrical specifications, physical connections, physical address, and transport time and reliability from one device to another. Layer 4, Transport layer end to end ensures reliable data transmission.Not all applications need to use seven layers. The lower three layers are sufficient for most applications. Each layer is made up of electronic circuits and/or software and has a separate existence from the rest of the layers.Each layer is assumed to handle messages or data from the layers that are above or below it. This is done by following protocol rules.Thus, each layer takes data from the adjacent layer, Handles it according to these rules, and then sends the processed data to the next layer on the other side. Comment More infoAdvertise with us Next Article Types of Network Topology tanushree_dev Follow Improve Article Tags : Technical Scripter Computer Networks GATE CS Technical Scripter 2020 Similar Reads What is OSI Model? - Layers of OSI Model The OSI (Open Systems Interconnection) Model is a set of rules that explains how different computer systems communicate over a network. OSI Model was developed by the International Organization for Standardization (ISO). The OSI Model consists of 7 layers and each layer has specific functions and re 13 min read OSI Model BasicsOSI Model Full Form - Open System InterconnectionThe OSI stands for Open System Interconnection. OSI model is a conceptual framework that defines how computers communicate with each other over a network. It consists of seven layers, each with its own specific function and set of protocols. In this article, we are going to discuss OSI model, its se 9 min read OSI Full FormOSI stands for Open Systems Interconnection. It is a model used in computer networking to explain how data moves from one device to another across a network. The OSI model has 7 layers, and each layer has a specific function, from sending raw data to delivering it to the right application. It helps 5 min read Working of ISO-OSI ModelThe ISO-OSI (International organization of Standardization - Open System Interconnection) says to group together the functions which are related to each other. The Functions in OSI Model that are needed for proper communication can be divided into 2 types :- 1. Mandatory Functions: Here the implemen 7 min read Critique of OSI Model and ProtocolsOpen System Interconnection (OSI) model is reference model that is used to describe and explain how does information from software application in one of computers moves freely through physical medium to software application on another computer. This model consists of total of seven layers and each o 4 min read OSI Model and TCP/IP ModelSimilarities Between OSI Model and TCP/IP ModelOSI Model or Open Systems Interconnection is an architecture of 7 layers in which each layer has its work to perform. In contrast, TCP/IP is a concise version of the OSI Model. The TCP/IP Model consists of 4 layers rather than the 7 layers of the OSI Model. In this article, we will look into the sim 6 min read This is exactly why we still use the OSI model when we have TCP/IP ModelWhat is the OSI Model?OSI is an acronym for Open Systems Interconnection. The International Organization for Standardization (ISO) created the OSI model (ISO). It's a model for how applications communicate over the internet. In order to facilitate interoperability between diverse devices and applica 10 min read How Communication happens using OSI model The Open System Interconnection (OSI) model is a standard âreference modelâ created by an International Organization for Standardization (ISO) to describe how software and hardware components involved in network communication divide efforts and interact with each other. The OSI model defines a seven 4 min read Physical LayerTypes of Network TopologyNetwork topology refers to the arrangement of different elements like nodes, links, or devices in a computer network. Common types of network topology include bus, star, ring, mesh, and tree topologies, each with its advantages and disadvantages. In this article, we will discuss different types of n 12 min read Transmission Modes in Computer Networks (Simplex, Half-Duplex and Full-Duplex)Transmission modes also known as communication modes, are methods of transferring data between devices on buses and networks designed to facilitate communication. They are classified into three types: Simplex Mode, Half-Duplex Mode, and Full-Duplex Mode. In this article, we will discuss Transmission 6 min read Data Link LayerLogical Link Control (LLC) Protocol Data UnitLogical Link Control (LLC) is a sublayer that generally provides the logic for the data link as it controls the synchronization, multiplexing, flow control, and even error-checking functions of DLL (Data Link Layer). DLL is divided into two sublayers i.e. LLC sublayer and MAC (Medium Access Control) 3 min read Framing in Data Link LayerFrames are the units of digital transmission, particularly in computer networks and telecommunications. Frames are comparable to the packets of energy called photons in the case of light energy. Frame is continuously used in Time Division Multiplexing process. Framing is a point-to-point connection 6 min read Error Control in Data Link LayerData-link layer uses the techniques of error control simply to ensure and confirm that all the data frames or packets, i.e. bit streams of data, are transmitted or transferred from sender to receiver with certain accuracy. Using or providing error control at this data link layer is an optimization, 4 min read Flow Control in Data Link LayerFlow control is design issue at Data Link Layer. It is a technique that generally observes the proper flow of data from sender to receiver. It is very essential because it is possible for sender to transmit data or information at very fast rate and hence receiver can receive this information and pro 4 min read Access Control in Computer NetworkAccess control is a security strategy that controls who or what can view or utilize resources in a computer system. It is a fundamental security concept that reduces risk to the company or organization. In this article, we are going to discuss every point about access control. In this article, we wi 7 min read Examples of Data Link Layer ProtocolsData Link Layer protocols are generally responsible for ensuring and confirming that the bits and bytes received are identical to the bits and bytes being transferred. It is a set of specifications that are used for the implementation of the data link layer just above the physical layer of the Open 5 min read Network LayerNetwork Layer ServicesThe network layer is a part of the communication process in computer networks. Its main job is to move data packets between different networks. It helps route these packets from the sender to the receiver across multiple paths and networks. Network-to-network connections enable the Internet to funct 6 min read Network ProtocolsNetwork Protocols are a set of guidelines governing the exchange of information in a simple, dependable and secure way. Network protocols are formal standards and policies comprised of rules, methodology, and configurations that define communication between two or more devices over a network. To eff 3 min read What is an IP Address?Imagine every device on the internet as a house. For you to send a letter to a friend living in one of these houses, you need their home address. In the digital world, this home address is what we call an IP (Internet Protocol) Address. It's a unique string of numbers separated by periods (IPv4) or 14 min read ARP, Reverse ARP(RARP), Inverse ARP (InARP), Proxy ARP and Gratuitous ARPPrerequisite IP Addressing, Introduction of MAC Addresses, Basics of Address Resolution Protocol (ARP) In this article, we will discuss about whole ARP-family, which are ARP, RARP, InARP, Proxy ARP and Gratuitous ARP. Let's try to understand each one by one.1. Address Resolution Protocol (ARP) -Addr 6 min read Internet Control Message Protocol (ICMP)Internet Control Message Protocol is known as ICMP. The protocol is at the network layer. It is mostly utilized on network equipment like routers and is utilized for error handling at the network layer. Since there are various kinds of network layer faults, ICMP can be utilized to report and trouble 11 min read What is IGMP(Internet Group Management Protocol)?IGMP is an acronym for Internet Group Management Protocol. IGMP is a communication protocol used by hosts and adjacent routers for multicasting communication with IP networks and uses the resources efficiently to transmit the message/data packets. Multicast communication can have single or multiple 9 min read Transport LayerTransport Layer responsibilitiesThe transport Layer is the second layer in the TCP/IP model and the fourth layer in the OSI model. It is an end-to-end layer used to deliver messages to a host. It is termed an end-to-end layer because it provides a point-to-point connection rather than hop-to-hop, between the source host and destin 5 min read Error Control in TCPPrerequisite - TCP/IP Model TCP protocol has methods for finding out corrupted segments, missing segments, out-of-order segments and duplicated segments. Error control in TCP is mainly done through the use of three simple techniques : Checksum - Every segment contains a checksum field which is used 2 min read What is TCP (Transmission Control Protocol)?Transmission Control Protocol (TCP) is a connection-oriented protocol for communications that helps in the exchange of messages between different devices over a network. It is one of the main protocols of the TCP/IP suite. In OSI model, it operates at the transport layer(Layer 4). It lies between th 5 min read User Datagram Protocol (UDP)User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of the Internet Protocol suite, referred to as UDP/IP suite. Unlike TCP, it is an unreliable and connectionless protocol. So, there is no need to establish a connection before data transfer. The UDP helps to establish low-late 10 min read SCTP Full FormSCTP stands for Stream Control Transmission Protocol. It is a connection- oriented protocol in computer networks which provides a full-duplex association i.e., transmitting multiple streams of data between two end points at the same time that have established a connection in network. It is sometimes 3 min read Presentation LayerWhat is Data Encryption?Data encryption is the process of converting readable information (plaintext) into an unreadable format (ciphertext) to protect it from unauthorized access. It is a method of preserving data confidentiality by transforming it into ciphertext, which can only be decoded using a unique decryption key p 10 min read Introduction to Data CompressionIn this article, we will discuss the overview of Data Compression and will discuss its method illustration, and also will cover the overview part entropy. Let's discuss it one by one. Overview :One important area of research is data compression. It deals with the art and science of storing informati 2 min read Application LayerProtocols in Application LayerThe Application Layer is the topmost layer in the Open System Interconnection (OSI) model. This layer provides several ways for manipulating the data which enables any type of user to access the network with ease. The Application Layer interface directly interacts with the application and provides c 7 min read File Transfer Protocol (FTP)File transfer protocol (FTP) is an Internet tool provided by TCP/IP. The first feature of FTP was developed by Abhay Bhushan in 1971. It helps to transfer files from one computer to another by providing access to directories or folders on remote computers and allows software, data, and text files to 8 min read HTTP Full Form - Hypertext Transfer ProtocolHTTP stands for Hypertext Transfer Protocol, and itâs the system that allows communication between web browsers (like Google Chrome or Firefox) and websites. When you visit a website, your browser uses HTTP to send a request to the server hosting that site, and the server sends back the data needed 7 min read Simple Mail Transfer Protocol (SMTP)Simple Mail Transfer Protocol (SMTP) is an application layer protocol used for exchanging email messages between servers. It is essential in the email communication process and operates at the application layer of the TCP/IP stack.To send an email, the client opens a TCP connection to the SMTP serve 9 min read Introduction to TELNETTELNET stands for Teletype Network. It is a client/server application protocol that provides access to virtual terminals of remote systems on local area networks or the Internet. The local computer uses a telnet client program and the remote computers use a telnet server program. In this article, we 7 min read Like