pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

OSI Model

The Open Systems Interconnection (OSI) reference model describes how information from a software application in one computer moves through a network medium to a software application in another computer. The OSI reference model is a conceptual model composed of seven layers, each specifying particular network functions. The model was developed by the International Organisation for Standardisation (ISO) in 1984, and it is now considered the primary architectural model for intercomputer communications. The OSI model divides the tasks involved with moving information between networked computers into seven smaller, more manageable task groups. A task or group of tasks is then assigned to each of the seven OSI layers. Each layer is reasonably self-contained, so that the tasks assigned to each layer can be implemented independently. This enables the solutions offered by one layer to be updated without adversely affecting the other layers.

The seven layers of the OSI reference model can be divided into two categories: upper layers and lower layers. The upper layers of the OSI model deal with application issues and generally are implemented only in software. The highest layer, application, is closest to the end user. Both users and application-layer processes interact with software applications that contain a communications component. The term upper layer is sometimes used to refer to any layer above another layer in the OSI model. The lower layers of the OSI model handle data transport issues. The physical layer and data link layer are implemented in hardware and software. The other lower layers generally are implemented only in software. The lowest layer, the physical layer, is closest to the physical network medium (the network cabling, for example) , and is responsible for actually placing information on the medium.

Reference Layer Function
7 Application Layer Application programs that use the network
6 Presentation Layer Standardises data presented to the applications
5 Session Layer Manages sessions between applications
4 Transport Layer Provides error detection and correction
3 Network Layer Manages network connections
2 Data Link Layer Provides data delivery across the physical connection
1 Physical Layer Defines the physical network media
  • OSI Model
  • Network Topologies
  • FDDI Networking
  • Token Ring Networks
  • Ethernet
  • Fast Ethernet
  • Gigabit Ethernet
  • Peer to Peer Network Architecture
  • Client/Server Architecture
  • P2P Networking
  • Network Hardware
  • NIC Cards
  • Hubs and Repeaters
  • Bridges
  • Routers
  • Network Switches
  • Network Transceivers
  • Cabling
  • Home Networking
  • Ethernet Networks
  • Phone-line Networks
  • Power-line Networks
  • IEEE 802.11
  • Wireless Networks
  • Technology Comparison

Filed Under: Networking Tagged With: OSI, OSI layers, OSI Model, what are the OSI layers

Latest Articles

Bit-Depth Printers

When a scanner converts something into digital form, it looks at the image pixel by pixel and records what it sees. That part of the process is simple enough, but different scanners record different amounts of information about each pixel. How much … [Read More...]

Battery technology for mobile computers – laptops, notebooks and webbooks

Historically, the technology of the batteries that power notebook PCs has developed at a somewhat slower rate than other aspects of mobile computing technology. Furthermore, as batteries get better the power advantage is generally negated by increased consumption from higher performance PCs, … [Read More...]

New Technology Trends for the New Year (Part 2)

We recently published an article on three major technology trends to expect in 2020. We wanted to share some more in this piece. Hyperautomation: the revolution of the machines We are talking about the implementation of Artificial Intelligence (AI) in automation, that is to say, that the … [Read More...]

Top Taplio Alternatives in 2025 : Why MagicPost Leads for LinkedIn Posting ?

LinkedIn has become a strong platform for professionals, creators, and businesses to establish authority, grow networks, and elicit engagement. Simple … [Read More...]

Shocking Cybercrime Statistics for 2025

People all over the world are becoming more concerned about cybercrime than ever. We have recently collected some statistics on this topic and … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Hard Disk Maintenance – Error Checking using Windows XP ScanDisk tools

Chkdsk.exe is a utility which verifies the logical integrity of a file system. In the event of the utility encountering logical inconsistencies in … [Read More...]

Typo 2 Keyboard Case for iPhone 6

Typo 2 is the new keyboard case for iPhone 5/5s and 6 produced by Typo. It deliberately provides users the benefit of using a physical keyboard that a … [Read More...]

Essential Checklist for Shopping for Antivirus Software

If you’re not using a comprehensive antivirus software solution to protect your home network and devices from hackers and malware, you’re playing with … [Read More...]

[footer_backtotop]

Copyright © 2026 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors