IT Operations Blog

OSI Model: The 7 Layers of Network Architecture

The 7 layers of network architecture
6 minute read
Muhammad Raza

The OSI (Open Systems Interconnection) Model describes how networked systems communicate. It is a theoretical framework for mapping how applications and devices link and send data over a web of connections.

The OSI Model is called a “reference model” because it is rarely used in practical applications. Instead, it is most helpful in describing network protocols and services. The OSI Model is most often used to understand the theories behind networked communication concepts and elements. Some use it to troubleshoot problems, narrowing a potential issue to a specific layer of the model.

OSI layers are, indeed, fundamental to the OSI Model. The framework is a stack of seven layers, each performing a specific function, yet working together to transmit data from one networked device to another. The 7 layers of OSI model ensure the interoperability of different devices and technologies from various vendors.

The 7 OSI layers

The OSI 7 layer model illustrates how information moves from a sender to a receiver and back again. This image illustrates the 7 layers of OSI model architecture. Below, we’ll briefly describe each layer, from bottom to top.

OSI Model 7 Layers

1. Physical

The first OSI model layer describes the physical connections between devices in a network. Electrical, optic, or electromagnetic signal data moves from device to device through the physical infrastructure defined by this layer.

Elements of the OSI layer model’s physical layer include:

  • Electrical, mechanical, and physical systems, parts, and devices
  • Specifications such as cable size, signal frequency, voltages, etc.
  • How a network is configured, such as a bus, with devices arranged in a line with many stops, a star, with a central device surrounded by an array of devices, a ring with devices in a connected circle, a mesh of woven interconnections, and more
  • Communication modes such as one-way simplex, two-way full duplex, or half duplex, with messages going back and forth, but only one direction at a time
  • Data transmission performance, such as bit rate, referring to how much data is moving through a connection at a given time, and bit synchronization to align the clocks of each device for accurate data transmission
  • Modulation, switching, and interfacing with the physical transmission medium
  • Common protocols for connections, including Wi-Fi, Ethernet, and others

2. The Data Link Layer

The second OSI model layer describes data transmission between network devices. Data is sent in packets within a frame of special bit patterns or codes that indicate the beginning and end of each packet. These packets move through switches that route information through the physical layer from one physical location to another.

The OSI data link layer has two sublayers:

  • The Logical Link Control (LLC) sublayer manages flow and error controls to ensure accurate data transmission between the network devices.
  • The Media Access Control (MAC) sublayer manages access and permissions for transmitting data between devices. The function of this sublayer is to manage which device controls a channel, moment to moment.

3. The Network Layer

The third of the OSI layers organizes and transmits data between multiple networks. Network layer hardware includes routes, bridge routers, 3-layer switches, and protocols such as Internet (IPv4) Protocol version 4 and Internet Protocol version 6 (IPv6).

This layer routes data via the shortest or fastest physical path, working around traffic controls, congestion, broken links, service priority, and more. It handles addressing logic to distinguish between the source and destination networks. It divides data into packets to send and then reassembles them at their destination.

4. The Transport Layer

This layer deals with sending and delivering of complete and reliable data from one device to another through a network or between networks. Common transport layer protocols include the Transmission Control Protocol (TCP) for connection-oriented data transmission and the User Datagram Protocol (UDP) for connectionless data transmission.

Some of the essential functions in this layer include:

  • Error control, flow control, and congestion control are ways to keep track of data packets, check for errors and duplication, and then to resend if there is an error or failure.
  • Service-point addressing ensures that data is delivered to the correct protocol, identified by a port number.
  • Packet segmentation and reassembly are processes for dividing data and sending it sequentially, then rechecking it at its destination for integrity and accuracy.

5. The Session Layer

This OSI Model layer concerns itself with managing session links between network devices with a specific beginning and end. The essential functions include establishing a link to start the session, authenticating senders and receivers, authorizing communications between devices and apps, maintaining the session, and terminating the connection, which are the key functions.

A common session type is when an internet user visits and browses a website for a specific period.

An essential concept in this layer is synchronization, in which checkpoints during the session ensure a coordinated data flow that is free of unplanned breaks or data loss.

Common OSI session layer protocols include:

  • Remote procedure call protocol (RPC)
  • Point-to-Point Tunneling Protocol (PPTP)
  • Session Control Protocol (SCP)
  • Session Description Protocol (SDP)

6. The Presentation Layer

Data flows as packets of code, often encrypted, through networks. Presenting it in a useful format is the focus of the sixth OSI model layer. The presentation layer deals with:

  • Data conversion
  • Character code translation
  • Data compression
  • Encryption and decryption

To send text across a network, the characters of the alphabet convert via a character coding system, such as the American Standard Code for Information Interchange (ASCII) or Extended Binary Coded Decimal Interchange Code (EBCDIC) that is then encrypted and compressed and sent over the network. On the receiving end, the process reverses. Different kinds of data get translated into different format codes.

7. The Application Layer

The top layer of the OSI 7 layer model is the application layer. It is how a user application, such as a website, browser, email, instant messaging, file transfers, or voice-over IP, interfaces with the network. Think of it as the window for accessing the network to send or display data, which can be anything from a picture of your pet cat to a database of statistics to a voice message.

It facilitates networking requests, determines resource availability, synchronizes communication, and manages application-specific networking requirements. The application layer also identifies constraints at the application level, such as those associated with authentication, privacy, quality of service, networking devices, and data syntax.

Common OSI application layer protocols include:

  • File Transfer Protocol (FTP)
  • Simple Mail Transfer Protocol (SMTP)
  • Domain Name System (DNS)

The internet didn’t welcome OSI

The OSI model is not widely used because of its complexity. Every OSI layer has rules and operations, which make implementation time-consuming and inefficient. The simple TCP/IP model offered advantages that the OSI Model could not match. TCP/IP was already widely used when the International Organization for Standardization (ISO) launched the OSI 7 layer model in 1984.

OSI Model Network Architecture

OSI vs. TCP/IP

The OSI vs. TCP/IP debate never really gained traction in the industry. Vendors had already invested significant resources in TCP/IP products in the ten-plus years before the launch of the OSI. They had no incentive to manage the interoperability issues with the vast choices of protocols and specifications offered by the OSI model. Additionally, the creation of the OSI Model was driven by European political and economic interests that didn’t want to be dependent on technologies and equipment developed by American companies. Hence, a non-governmental organization, the International Organization for Standardization, designed the rather ponderous new model by committee.

Advantages of TCP/IP

In the OSI vs. TCP/IP debate, the original technology claimed advantages over the 7 layers of OSI model approach. Since its development in the 1970s, TCP/IP has become the proven standard that is widely used for most internet communication. Among its advantages are:

  • Simplicity: With four simple and easy-to-understand layers, it is straightforward to implement and maintain, unlike the 7 OSI layer model.
  • Practicality: Because it was developed by the internet architects, TCP/IP closely aligns with how the Internet is structured.
  • Scalability: The client-server architecture makes it easy to adapt and expand.
  • Ubiquity: Because it has been widely used for decades, it supports many devices and protocols. Finding well-trained and experienced experts is easy.
  • Lightweight: It has a relatively small memory footprint and uses little CPU, generally consuming minimal system resources.
  • Inexpensive: Because it is so much easier to implement and talent is readily available, it costs less to use.

The OSI Model and internet of today

The TCP/IP architecture model has a long record of success in real-world network environments. It has served as a solid and versatile foundation for the internet, successfully addressing security, privacy, and performance-related challenges.

Continued research and development, investments, and industry-wide adoption of the OSI model could have made today’s cyber world a different ( perhaps better) place. Still, the pragmatism of the TCP/IP model has prevailed. Given its wide use and the challenges inherent in the OSI model, the ascendancy of the TCP/IP model is likely to remain for the foreseeable future.

New strategies for modern service assurance

86% of global IT leaders in a recent IDG survey find it very, or extremely, challenging to optimize their IT resources to meet changing business demands.


These postings are my own and do not necessarily represent BMC's position, strategies, or opinion.

See an error or have a suggestion? Please let us know by emailing blogs@bmc.com.

Business, Faster than Humanly Possible

BMC empowers 86% of the Forbes Global 50 to accelerate business value faster than humanly possible. Our industry-leading portfolio unlocks human and machine potential to drive business growth, innovation, and sustainable success. BMC does this in a simple and optimized way by connecting people, systems, and data that power the world’s largest organizations so they can seize a competitive advantage.
Learn more about BMC ›

About the author

Muhammad Raza

Muhammad Raza is a Stockholm-based technology consultant working with leading startups and Fortune 500 firms on thought leadership branding projects across DevOps, Cloud, Security and IoT.