OSI Model Layers

The Layers of the OSI Model

The OSI (Open Systems Interconnection) Model is a conceptual framework used to describe the functions of a networking system. It breaks down complex network communication into seven manageable layers, making it easier for IT and cybersecurity professionals to understand how data travels from one computer to another.

Mnemonic Trick to Remember: Please Do Not Throw Sausage Pizza Away (Bottom to Top).


The 7 Layers of the OSI Model

7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical Sender (Down) Receiver (Up)

Data travels down these layers when sending a message, and up these layers when receiving one.

Layer 7: Application Layer (The Interface)

This is the only layer that directly interacts with data from the user. It provides network services directly to software applications.

Layer 6: Presentation Layer (The Translator)

This layer prepares the data so the Application layer can use it. It translates, formats, and highly critically, encrypts and decrypts data.

Layer 5: Session Layer (The Manager)

Responsible for opening, maintaining, and closing communication sessions between two devices.

Layer 4: Transport Layer (The Delivery Service)

Breaks data into smaller chunks (called segments) and ensures they arrive reliably and in the correct order.

Layer 3: Network Layer (The Router)

Responsible for routing data between different networks. It handles logical addressing and finds the best physical path for the data to travel.

Layer 2: Data Link Layer (The Local Switch)

Moves data across the same physical network. It handles physical addressing and basic error detection.

Layer 1: Physical Layer (The Cables)

The lowest layer. It deals purely with the physical hardware and transmission of raw data bits (0s and 1s) over physical mediums.


Deep Dive: Real-World Example of the OSI Model

Imagine you are ordering a physical product online. The OSI model works exactly like a logistics shipping company:

  1. Application (Layer 7): You use a website to click "Buy Now" on a pair of shoes.
  2. Presentation (Layer 6): The website translates your request and securely encrypts your credit card information.
  3. Session (Layer 5): The website opens a secure, active session with the banking server to process the payment, and closes it when done.
  4. Transport (Layer 4): The warehouse breaks your order down into three smaller boxes (Segments) because it won't all fit in one package. It numbers them (1 of 3, 2 of 3) so you know how to put them together.
  5. Network (Layer 3): The shipping company prints a logical address label (IP Address) on the boxes so the global postal system knows which country and city to route it to.
  6. Data Link (Layer 2): The local delivery driver looks at your specific house number (MAC Address) to drop it on your exact porch.
  7. Physical (Layer 1): The delivery truck physically drives down the road (The Cables) carrying the boxes to your house.

Security Ramifications

Because different devices operate at different layers, cybersecurity must happen at every layer. A firewall operates at Layer 3/4 to block bad IP addresses. A Web Application Firewall (WAF) operates at Layer 7 to block SQL injections. Encryption operates at Layer 6 to prevent eavesdropping. You cannot secure a network by protecting only one layer!


Knowledge Check

?

At which layer of the OSI model does data encryption (such as SSL/TLS) typically take place?