Physical Layer

The physical layer is responsible for the transmission and reception of unstructured raw data between a device—such as a network interface controller, Ethernet hub, or network switch—and a physical transmission medium. It converts digital bits into electrical, radio, or optical signals (analog signals).

Layer specifications define characteristics such as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, modulation schemes, channel access methods, and physical connectors. This includes the layout of pins, voltages, line impedance, cable specifications, signal timing, and frequency for wireless devices.

Bit rate control is handled at the physical layer and may define transmission modes such as simplex, half duplex, and full duplex. The components of a physical layer can be described in terms of the network topology. Physical layer specifications are included in standards like Bluetooth, Ethernet, and USB. A lesser-known example is the CAN standard.

The physical layer also specifies how encoding occurs over a physical signal, such as electrical voltage or a light pulse. For example, a 1 bit might be represented on a copper wire by a transition from 0 volts to 5 volts, while a 0 bit might be represented by the reverse. Common issues at this layer include incorrect media termination, electromagnetic interference (EMI), noise scrambling, and misconfigured or faulty NICs and hubs.

Data Link Layer

The data link layer provides node-to-node data transfer—a link between two directly connected nodes. It detects and may correct errors that occur in the physical layer. This layer defines protocols to establish and terminate connections between physically connected devices, as well as manage flow control between them.

IEEE 802 divides the data link layer into two sublayers:

The MAC and LLC layers are used in IEEE 802 networks such as 802.3 Ethernet, 802.11 Wi-Fi, and 802.15.4 Zigbee.

The Point-to-Point Protocol (PPP) is a data link layer protocol that operates over various physical layers, including synchronous and asynchronous serial lines.

The ITU-T G.hn standard, which enables high-speed local area networking over existing wiring (power lines, phone lines, and coaxial cables), includes a complete data link layer with error correction and flow control via a selective-repeat sliding-window protocol.

Security at this layer, including authenticated encryption, can be implemented using MACsec.

Network Layer

The network layer provides the functional and procedural means of transferring packets from one node to another across different networks. A network is a medium to which many nodes can be connected, where each node has an address and can transfer messages to other nodes simply by specifying the message content and destination address. The network determines the route, possibly through intermediate nodes.

If a message is too large to be transmitted directly over the data link layer, the network layer may fragment the message at the source node, transmit the fragments independently, and reassemble them at the destination. It may report delivery errors, but is not required to do so.

Message delivery at the network layer is not inherently reliable. While some network layer protocols offer reliable delivery, it is not a mandatory feature of the layer.

Several layer-management protocols defined in ISO 7498/4 belong to the network layer. These include routing protocols, multicast group management, network-layer information and error handling, and address assignment. It is the function of the payload—not the transport protocol—that determines their classification at this layer.

Security at the network layer, including authenticated encryption, can be implemented using IPsec.

Transport Layer

The transport layer provides the functional and procedural means of transferring variable-length data sequences from a source to a destination host, while maintaining quality of service. It controls the reliability of a link through flow control, segmentation and reassembly, and error control.

Some transport layer protocols offer connection-oriented communication with reliable delivery, while others provide connectionless service without delivery guarantees. This layer also enables multiplexing of data from multiple applications on the same host.

The transport layer receives data from the session layer and segments it into smaller units if necessary. Each segment is assigned a transport header containing control information such as source and destination port numbers, sequence numbers, and error-checking data. These segments are then passed to the network layer for transmission.

On the receiving end, the transport layer reassembles the segments into the original data stream and forwards it to the session layer. It also manages flow control and error recovery to ensure accurate and ordered delivery.

Common protocols at this layer include Transmission Control Protocol (TCP), User Datagram Protocol (UDP), and Stream Control Transmission Protocol (SCTP).

Session Layer

The session layer controls the dialogues (connections) between computers. It establishes, manages, and terminates connections between local and remote applications. This layer supports full-duplex, half-duplex, and simplex communication modes, and handles procedures such as checkpointing, adjournment, termination, and restart. It is commonly used in remote procedure calls.

The session layer offers three modes of communication:

This layer is responsible for managing and controlling the dialog between devices. It establishes, maintains, and terminates connections between applications. It also synchronizes data exchange by inserting checkpoints into the data stream, allowing recovery if a connection is lost or interrupted.

Protocols that operate at the session layer include NetBIOS, SAP, PPTP, and RPC.

Presentation Layer

The presentation layer is responsible for the delivery and formatting of information to the application layer for further processing or display. Often referred to as the syntax layer, it ensures that data is in a usable format and handles data encryption. This layer may include compression, decompression, encryption, and decryption algorithms.

It translates data between the application layer and the network format. This includes converting character encoding (e.g., ASCII to EBCDIC), serializing complex data structures into byte streams, and compressing data to reduce transmission size.

Common protocols and formats that operate at the presentation layer include:

Application Layer

The application layer is the topmost layer of the OSI model and serves as the interface between the user and the network. It provides network services directly to end-user applications and is responsible for identifying communication partners, determining resource availability, and synchronizing communication.

This layer encompasses a variety of protocols that facilitate different types of network communication. Common application layer protocols include:

The application layer also provides services such as file transfers, email, and network resource sharing. It enables users to interact with software applications that utilize network resources, making it an essential component of modern networking.

Citations and Credits

Information about the OSI Model layers was sourced from the following websites:

Images were sourced from the following websites:

Contact Me