Friday, November 30, 2018

Word of the Day: OSI model (Open Systems Interconnection)

Word of the Day WhatIs.com
Daily updates on the latest technology terms | November 30, 2018
OSI model (Open Systems Interconnection)

OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network.

A reference model is a conceptual framework for understanding relationships. The purpose of the OSI reference model is to guide vendors and developers so the digital communication products and software programs they create can interoperate, and to facilitate a clear framework that describes the functions of a networking or telecommunication system.

Most vendors involved in telecommunications make an attempt to describe their products and services in relation to the OSI model. And although it is useful for guiding discussion and evaluation, OSI is rarely actually implemented as-is. That's because few network products or standard tools keep related functions together in well-defined layers, as is the case in the OSI model. The TCP/IP protocol suite, which defines the internet, does not map cleanly to the OSI model.

Developed by representatives of major computer and telecommunication companies beginning in 1983, OSI was originally intended to be a detailed specification of actual interfaces. Instead, the committee decided to establish a common reference model with which others could then develop detailed interfaces, which, in turn, could become standards governing the transmission of data packets. The OSI architecture was officially adopted as an international standard by the International Organization for Standardization (ISO).

OSI model layers

The main concept of OSI is that the process of communication between two endpoints in a network can be divided into seven distinct groups of related functions, or layers. Each communicating user or program is on a device that can provide those seven layers of function.

In this architecture, each layer serves the layer above it and, in turn, is served by the layer below it. So, in a given message between users, there will be a flow of data down through the layers in the source computer, across the network, and then up through the layers in the receiving computer.

The seven layers of function are provided by a combination of applications, operating systems, network card device drivers and networking hardware that enable a system to transmit a signal over a network Ethernet or fiber optic cable or through Wi-Fi or other wireless protocols.

The seven Open Systems Interconnection layers are:

Layer 7: The application layer. This is the layer at which communication partners are identified -- Is there someone to talk to? -- network capacity is assessed -- Will the network let me talk to them right now? -- and where the data or application is presented in a visual form the user can understand. This layer is not the application itself, it is the set of services an application should be able to make use of directly, although some applications may perform application-layer functions.

 

Layer 6: The presentation layer. This layer is usually part of an operating system (OS) and converts incoming and outgoing data from one presentation format to another -- for example, from clear text to encrypted text at one end and back to clear text at the other.

 

Layer 5: The session layer. This layer sets up, coordinates and terminates conversations. Its services include authentication and reconnection after an interruption. On the internet, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) provide these services for most applications.

 

Layer 4: The transport layer. This layer manages packetization of data, then the delivery of the packets, including checking for errors in the data once it arrives. On the internet, TCP and UDP provide these services for most applications as well.

 

Layer 3: The network layer. This layer handles addressing and routing the data -- sending it in the right direction to the right destination on outgoing transmissions and receiving incoming transmissions at the packet level. IP is the network layer for the internet.

 

Layer 2: The data-link layer. This layer sets up links across the physical network, putting packets into network frames. This layer has two sub-layers: the logical link control layer and the media access control layer (MAC). MAC layer types include Ethernet and 802.11 wireless specifications.

 

Layer 1: The physical layer. This layer conveys the bit stream across the network either electrically, mechanically or through radio waves. The physical layer covers a variety of devices and mediums, among them cabling, connectors, receivers, transceivers and repeaters.

Quote of the Day

 
"The Open Systems Interconnection (OSI) model describes how the different software and hardware components involved in a network communication should divide their labor and otherwise interact." - John Burke

Learning Center

 

What is the difference between TCP/IP model and OSI model?
Our expert explains the difference between the OSI model vs. the TCP/IP model, and breaks down how the layers of the models relate to each other in terms of network communications.

How security, compliance standards prevent OSI layer vulnerabilities
To establish the best network cybersecurity, organizations should focus on creating a security and compliance framework for each OSI model. Read this tip to learn more about OSI layer vulnerabilities and the strategies to mitigate them.

Guide to identifying and preventing OSI model security risks: Layers 4 to 7
Organizations establishing network cybersecurity should focus on creating a framework to offset vulnerabilities in each layer of the Open Systems Interconnection. Read part two of this tip to learn more strategies to offset OSI model security risks in layers 4 to 7.

Layer 3 switches explained
Layer 3 switches are explained in this tip, including the difference between a switch, a router and a Layer 3 switch.

A comprehensive review of network performance monitors
Network performance monitors are crucial to today's data centers. In this buyer's guide, expert Andrew Froehlich takes a look at the systems that keep modern networks going.

Quiz Yourself

 
Inefficient use of bandwidth is the _____ of the network administrator's existence.
a. bane
b. bain

Answer

Stay in Touch

 
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

Visit the Word of the Day Archives and catch up on what you've missed!

FOLLOW US

TwitterRSS
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Whatis.com, click here. Please note, this will not affect any other subscriptions you have signed up for.
TechTarget

TechTarget, Whatis, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.

No comments: