Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Designing For TV: Principles, Patterns And Practical Guidance (Part 2)

      September 5, 2025

      Neo4j introduces new graph architecture that allows operational and analytics workloads to be run together

      September 5, 2025

      Beyond the benchmarks: Understanding the coding personalities of different LLMs

      September 5, 2025

      Top 10 Use Cases of Vibe Coding in Large-Scale Node.js Applications

      September 3, 2025

      Building smarter interactions with MCP elicitation: From clunky tool calls to seamless user experiences

      September 4, 2025

      From Zero to MCP: Simplifying AI Integrations with xmcp

      September 4, 2025

      Distribution Release: Linux Mint 22.2

      September 4, 2025

      Coded Smorgasbord: Basically, a Smorgasbord

      September 4, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Drupal 11’s AI Features: What They Actually Mean for Your Team

      September 5, 2025
      Recent

      Drupal 11’s AI Features: What They Actually Mean for Your Team

      September 5, 2025

      Why Data Governance Matters More Than Ever in 2025?

      September 5, 2025

      Perficient Included in the IDC Market Glance for Digital Business Professional Services, 3Q25

      September 5, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      How DevOps Teams Are Redefining Reliability with NixOS and OSTree-Powered Linux

      September 5, 2025
      Recent

      How DevOps Teams Are Redefining Reliability with NixOS and OSTree-Powered Linux

      September 5, 2025

      Distribution Release: Linux Mint 22.2

      September 4, 2025

      ‘Cronos: The New Dawn’ was by far my favorite experience at Gamescom 2025 — Bloober might have cooked an Xbox / PC horror masterpiece

      September 4, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Learning Resources»Basic Networking Part 6 – What is OSI Model?

    Basic Networking Part 6 – What is OSI Model?

    June 2, 2025

    Read the All Part of Our Basic Networking Series

    1. Basic Networking Part 1
    2. Basic Networking Part 2
    3. Basic Networking Part 3
    4. Basic Networking Part 4
    5. Basic Networking Part 5
    6. Basic Networking Part 6

    What is OSI Model?

    Introduction

    The Open Systems Interconnection Model (OSI Model) is a theoretical framework for describing the functions of a networking system. In order to facilitate interoperability between diverse devices and applications, the OSI model describes computing functions into a universal set of rules and standards. The connections between computing systems are divided into seven abstraction levels in the OSI reference model: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

    what is osi model

    The OSI was published in 1984 by the International Organization for Standardization at a period when network computing was still in its infancy (ISO). The OSI Model is still used to explain network architecture today, even if it does not always map exactly to real systems.

    The 7 Layers of the OSI Model

    Physical Layer

    The OSI Model’s lowest layer is concerned with electrically or optically passing raw unstructured data bits over the network from the sending device’s physical layer to the receiving device’s physical layer. Voltages, pin arrangement, cabling, and radio frequencies are examples of specifications. Network hubs, cabling, repeaters, network adapters, and modems are examples of “physical” resources found at the physical layer.

    Data Link Layer

    Directly connected nodes are utilized at the data connection layer to perform node-to-node data transfer, in which data is bundled into frames. Errors that may have happened at the physical layer are also corrected by the data link layer.

    Network Layer

    Receiving frames from the data link layer and delivering them to their intended destinations based on the addresses contained within the frame is the responsibility of the network layer. Logic addresses, such as IP addresses, are used by the network layer to locate the destination (internet protocol). Routers are a critical component at this tier, as they literally route data where it needs to go between networks.

    Transport Layer

    The transport layer is in charge of data packet delivery and error checking. It controls the size, sequencing, and, ultimately, data transit between systems and hosts. TCP, or Transmission Control Protocol, is one of the most frequent transport layer instances.

    Session Layer

    The session layer is in charge of coordinating conversations between computers. At layer 5, a session or connection between machines is established, managed, and terminated. Authentication and re-connections are also part of the session layer services.

    Presentation Layer

    Based on the syntax or semantics that the application accepts, the presentation layer formats or converts data for the application layer. As a result, it’s sometimes referred to as the syntactic layer. This layer can also handle the application layer’s encryption and decryption needs.

    Application Layer

    Both the end user and the application layer interact with the software application directly at this tier. End-user programmers, such as a web browser or Office 365, receive network services through this layer. The application layer locates communication partners, determines resource availability, and coordinates communication.

    Conclusion

    The theoretical OSI Model is used, on a daily basis, throughout the industry as it is an essential building block for when it comes to creating and troubleshooting applications and infrastructures. Follow the data down the layer to see how it’s transported and handled by systems and networks.

    Love our articles? Make sure to follow us on Twitter and GitHub, we post article updates there. To join our KaliLinuxInfamily, join our Telegram Group and Whatsapp Channel. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the comment section. As we know our comment section is always open to everyone. We read each and every comment and we always reply.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleSublist3r — Sub-Domain Enumeration Tool
    Next Article Basic Networking Part 5 — What is Computer Networking?

    Related Posts

    Learning Resources

    How DevOps Teams Are Redefining Reliability with NixOS and OSTree-Powered Linux

    September 5, 2025
    Learning Resources

    What I learned from Inspired

    September 5, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Horabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emails

    Development

    17 Years in Motion: How We Transform, Adapt, and Stay Strong

    Web Development

    CVE-2025-48414 – Apache Web Interface Unauthenticated Script Execution Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Can you get HEVC codec for free on Windows 11?

    Operating Systems

    Highlights

    Development

    CTEM vs ASM vs Vulnerability Management: What Security Leaders Need to Know in 2025

    July 17, 2025

    The modern-day threat landscape requires enterprise security teams to think and act beyond traditional cybersecurity…

    This $4 Steam Deck game includes the most-played classics from my childhood — and it will save you paper

    May 13, 2025

    SymbolEditor is a cross stitch symbol editor

    May 13, 2025

    CVE-2025-3995 – TOTOLINK N150RT Cross-Site Scripting Vulnerability

    April 28, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.