You are on page 1of 3

Webopedia.com Click Here!

Sign Up |

Sign In

Term of the Day Recent Terms Did You Know? Quick Reference All Categories Resources WeboBlog About Us Home > Quick Reference > The 7 Layers of the OSI Model The 7 Layers of the OSI Model Tweet E-mail this Article

Related Terms The OSI Reference Model - Understanding Layers OSI - Open System Interconnection MAC Layer Logical Link Control layer Understanding The Data Link Layer routing switch dual layer Modbus protocol layer X.400 EV SSL layered defense modeling PDU By: Last Updated: 05-14-2013 , Posted: 09-24-2010 The OSI, or Open System Interconnection, model defines a networking framework to implement protocols in seven layers. This article explains the 7 Layers of the OSI Model. The OSI, or Open System Interconnection, model defines a networking framework to implement protocols in seven layers. Control is passed from one layer to the ne xt, starting at the application layer in one station, and proceeding to the bott om layer, over the channel to the next station and back up the hierarchy. Application (Layer 7) This layer supports application and end-user processes. Communication partners a re identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything a t this layer is application-specific. This layer provides application services f or file transfers, e-mail, and other network software services. Telnet and FTP a re applications that exist entirely in the application level. Tiered application architectures are part of this layer.

Presentation (Layer 6) Sponsored 10 Data Center Server Hardware Must-Haves. Find out which 10 hardware additions will help you maintain excellent service and outstanding security for you and y our customers. This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. T he presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a netw ork, providing freedom from compatibility problems. It is sometimes called the s yntax layer. Session (Layer 5) This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges , and dialogues between the applications at each end. It deals with session and connection coordination. Transport (Layer 4) This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures co mplete data transfer. Network (Layer 3) This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing. Data Link (Layer 2) At this layer, data packets are encoded and decoded into bits. It furnishes tran smission protocol knowledge and management and handles errors in the physical la yer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Contr ol (LLC) layer. The MAC sub layer controls how a computer on the network gains a ccess to the data and permission to transmit it. The LLC layer controls frame sy nchronization, flow control and error checking. Physical (Layer 1) This layer conveys the bit stream - electrical impulse, light or radio signal -through the network at the electrical and mechanical level. It provides the har dware means of sending and receiving data on a carrier, including defining cable s, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components. Sponsored 10 Data Center Server Hardware Must-Haves. Find out which 10 hardware additions will help you maintain excellent service and outstanding security for you and y our customers. Related Links The Abdus Salam International Centre for Theoretical Physics ServerWatch: The OSI Model - Part 2 ServerWatch: The OSI Model - Part 1 Did You Know...? Understanding The Data Link Layer The OSI Reference Model Understanding Layers

Click Here! Webopedia Weekly We Recommend Sponsored Take an interactive tour: The IBM SmartCloud gives your business the IT resources it needs. New Terms. Our database of Internet and computer technology terms is growing every day: New Terms page lists the most recent 100 terms we have added. Want to move some applications to the cloud? Learn the five best migration strategies and find out which may be best for your business by reading 5 Ways to Migrate... Read More... Quick Reference Check out the WeboBlog Check out the WeboBlog: The best destination for up-to-date blog article s about our audience's technology needs. Read More... Technology Hashtags: Webopedia's Twitter Guide to Technology Topics This Webopedia.com guide to Twitter hashtags for technology topics provi des descriptions of the most popular tech-related hashtags used in Twitter.. Read More Android Apps to Secure Your Device Data Do you need to secure your Android device? From password managers to fin ding a lost or stolen device, here are three Android security apps worth c.. Read More The Top Private Cloud Project Mistakes You Need to Avoid When it comes to your private cloud project it's easy to make mistakes t hat in hindsight look obvious, but can be hard to predict if you lack expe.. Read More BYOD Security White Papers and Resources for Businesses Effective BYOD (bring your own device) management starts with knowing th e benefits of having employees use consumer technologies at work, then lea.. Read More Quick Reference Archive

You might also like