{"id":1774,"date":"2020-11-16T09:58:00","date_gmt":"2020-11-16T09:58:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=1774"},"modified":"2020-11-13T23:59:39","modified_gmt":"2020-11-13T23:59:39","slug":"how-osi-model-network-communication-layers-work","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/how-osi-model-network-communication-layers-work\/","title":{"rendered":"How the OSI Model &#038; Network Communication Layers Work"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>The internet isn\u2019t an abstract idea but has real physical existence. Let\u2019s explore how computers and other devices communicate via networks\u2026<\/strong><\/h2>\n\n\n\n<p>Not so long ago, sending messages to someone living on a different continent required significantly more effort than rolling out of bed and hitting send on your email client. Today, it\u2019s possible to communicate almost instantaneously with our coworkers and buddies. But how exactly does data travel from your colleague\u2019s laptop or your friend\u2019s phone to your device? This is where the OSI model comes into play.<\/p>\n\n\n\n<p>The OSI model and network communications are all about the layers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is the OSI Model?<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.iso.org\/ics\/35.100\/x\/\">The Open Systems Interconnection Model<\/a> (or OSI model) is a framework given to us by the International Organization for Standardization (ISO). Its purpose? To standardize communication protocols and agree on network standards for multi-vendor interoperability. In other words, it enables various devices manufactured by different vendors to communicate in a uniform way. It also serves as a way for people to break down different parts of network systems based on their functions for network communications.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Network Layers: OSI Model vs TCP\/IP<\/h3>\n\n\n\n<p>Besides the OSI model, the TCP\/IP reference model with its four layers is also used as an industry standard. Now, you may be wondering, isn\u2019t the OSI model the same thing as the TCP\/IP model? Yes and no. They\u2019re related but still separate.<\/p>\n\n\n\n<p>TCP\/IP, which stands for transmission control protocol\/internet protocol, is a protocol suite that traditionally consists of four layers \u2014 application, transport, internet, and link. Layers 5, 6, and 7 of the OSI model are mapped to the TCP\/IP model&#8217;s application layer. The OSI network layer is referred to as the internet layer in the TCP\/IP model. Layer 4 of the OSI model is mapped to the corresponding transport layer, while layers 1 and 2 are clubbed into the TCP\/IP model&#8217;s network access layer. This suite was created almost a decade before the OSI model came into existence.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.dummies.com\/programming\/networking\/layers-in-the-osi-model-of-a-computer-network\/\">Dummies.com<\/a> really clarifies the difference between the two nicely:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cThe OSI Model isn\u2019t itself a networking standard in the same sense that Ethernet and TCP\/IP are. Rather, the OSI Model is a framework into which the various networking standards can fit. The OSI Model specifies what aspects of a network\u2019s operation can be addressed by various network standards. So, in a sense, the OSI Model is sort of a standard\u2019s standard.\u201d<\/em><\/p><\/blockquote>\n\n\n\n<p>Familiarizing yourself with the OSI model network layers helps you understand how telecommunication systems work in a granular sense. This can help you identify or resolve issues facing your network. It also helps you see the bigger picture of how data flows between interconnected devices over a network.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"871\" height=\"424\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/tcp-ip-vs-osi.png\" alt=\"osi model vs tcp\/ip breakdown\" class=\"wp-image-1776\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/tcp-ip-vs-osi.png 871w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/tcp-ip-vs-osi-300x146.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/tcp-ip-vs-osi-560x273.png 560w\" sizes=\"auto, (max-width: 871px) 100vw, 871px\" \/><figcaption>A visual breakdown of the four- and five-layer TCP\/IP models in relation to the OSI model layers.<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Breaking Down Network Layers: A Look at the 7 OSI Model Layers<\/strong><\/h2>\n\n\n\n<p>The OSI model is more of an interoperability guideline for manufacturers and developers than a strict representation of how the network looks. Instead, it gives an overview of how the data flows across the network. There are seven layers in this model, each with its own set of functionalities and protocol suite. The layers are typically listed in descending order \u2014 starting with layer seven and making their way down to layer one.<\/p>\n\n\n\n<p>Let\u2019s consider how this would work in a two-party connection \u2014 say, between your computer and a friend\u2019s computer. The seven layers exist on both host devices, and each layer exchanges data with its corresponding counterpart independently of the other layers below. This means that if you send data from your computer to your friend, data on your device\u2019s OSI layer 2 would exchange directly with your friend\u2019s layer 2. Your layer 3 would exchange data with their layer 3, etc.<\/p>\n\n\n\n<p>However, there\u2019s one key bit of info we need to touch on. As the data travels down from the application layer of your computer, additional information gets added to the data before it is passed on to the layers below. This process is called <strong>data encapsulation<\/strong> because it involves adding protocol information to the beginning (header) and\/or end (trailer) of the data. <\/p>\n\n\n\n<p>At the recipient\u2019s end, data decapsulation takes place where the incoming data is unpacked as it moves up the layer till finally, at the application layer, all the additional headers and\/or trailers added are stripped off.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"955\" height=\"581\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/osi-model-data-encapsulation-decapsulation2.png\" alt=\"a visual breakdown of the osi model data encapsulation and data decapsulation processes\" class=\"wp-image-1779\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/osi-model-data-encapsulation-decapsulation2.png 955w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/osi-model-data-encapsulation-decapsulation2-300x183.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/osi-model-data-encapsulation-decapsulation2-560x341.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/osi-model-data-encapsulation-decapsulation2-940x572.png 940w\" sizes=\"auto, (max-width: 955px) 100vw, 955px\" \/><figcaption>The OSI Model Layers: Data Encapsulation &amp; Decapsulation<\/figcaption><\/figure>\n\n\n\n<p>Since data moves from the top down when leaving the sender to transmit to the recipient, it seems fitting that we start with seventh layer of the OSI model and work our way down. Let\u2019s explore the OSI model layers!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>OSI Layer 7: Application Layer<\/strong><\/h3>\n\n\n\n<p>The seventh layer of the OSI model is called the application layer. As the name suggests, it deals with software and applications that run on our computers, such as the web browser you\u2019re using to read this web page. Basically, this layer interacts with end-users through those apps and provides an interface between them and the underlying network connections. Some of the primary protocols used at the application layer are HTTP, DNS, FTP, SMTP, etc.<\/p>\n\n\n\n<p>The application layer forms the human-computer interaction interface that focuses on end-user services. We rely on the application layer whenever we:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Access or transfer files on a remote machine,<\/li><li>Store and forward emails,<\/li><li>Use a virtual terminal, or<\/li><li>Access directory services.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>OSI Layer 6: Presentation Layer<\/strong><\/h3>\n\n\n\n<p>Layer 6 of the OSI model has three primary responsibilities:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Encoding (for example, ASCII encoding),<\/li><li>Encryption (like when applying SSL\/TLS), and<\/li><li>Compression (such as by using gzip).<\/li><\/ol>\n\n\n\n<p>When sending, the data travels from the application to the presentation layer and in the reverse order while receiving.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>OSI Layer 5: Session Layer<\/strong><\/h3>\n\n\n\n<p>Session layer, or layer five of the OSI model, deals with session management. Basically, the focus of this layer is on opening, closing, and managing the dialogue that takes place between two parties or endpoints.<\/p>\n\n\n\n<p>Consider the number of applications that a user might have open simultaneously \u2014 an email client, a web browser, a text editor, etc. \u2014 and how each of those applications may have multiple connections running within them. For example, the web browser could have one tab opened for video, one for email, another for online shopping, and so on. The session layer is tasked with keeping all those connections alive, managing them, and terminating them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>OSI Layer 4: Transport Layer<\/strong><\/h3>\n\n\n\n<p>OSI layer four, known as the transport layer, is responsible for transporting the segments (we\u2019ll look at what segments are in a moment) to the right application or service. Consider an Apache server running in the background listening at port 80 or <a href=\"https:\/\/sectigostore.com\/blog\/port-443-everything-you-need-to-know-about-https-443\/\">port 443<\/a> for incoming connections. If an incoming message has a destination port as 80, the transport layer will deliver the message to the corresponding service.<\/p>\n\n\n\n<p>The protocol data unit (PDU) at this layer is a segment. The original data is broken up into chunks called segments and sent over multiple pathways to gain some efficiency (by avoiding congestion). It also incorporates security since the segments are scattered and makes it harder for an attacker to read the entire message.<\/p>\n\n\n\n<p>On the receiving device, the transport layer is responsible for reassembling these segments in the correct order before sending it over to the session layer. Each segment contains header information such as source port, assigned based on availability by the client (sender\u2019s) operating system, destination port, sequence and acknowledgment numbers that communicate which segment was delivered and what it expects to receive next. The delivery can either be reliable or unreliable and based on that, the protocols used are <a href=\"https:\/\/sectigostore.com\/blog\/tcp-vs-udp-whats-the-difference\/\">TCP or UDP<\/a>.<\/p>\n\n\n\n<p>In case of a reliable connection (TCP), error control checks are in place that the determine if the message received is complete. If not, it asks the message to be resent. Transmission failures due to differences in connection speeds might occur. Flow control is used so that a sender with a faster connection doesn\u2019t end up overwhelming a receiver with a slow connection. The transport layer also includes <a href=\"https:\/\/medium.com\/coderscorner\/transport-layer-multiplexing-and-demultiplexing-670e16b6bfc\">multiplexing and demultiplexing<\/a> to enable clients to communicate with different application processes in one session.<\/p>\n\n\n\n<p>So, what happens in UDP? Let\u2019s take a trip down memory lane and go back to your eighth-grade math class (or any lecture that you can recall). That\u2019s an example of unreliable delivery. Since the teacher delivering the lecture (i.e., the data transmitted) didn\u2019t wait for an acknowledgment from students confirming that the message was delivered in its entirety, it\u2019s a UDP transmission. UDP is used when the size of the file is massive, like in audio or video transmissions, and it is time sensitive. For instance, you wouldn\u2019t want a time lag after every frame in a video.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>OSI Layer 3: Network Layer<\/strong><\/h3>\n\n\n\n<p>Layer 3 of the OSI model routes the data along multiple pathways. The PDU for this OSI layer is referred to as a packet. It contains information such as source and destination IP addresses to identify end devices. The most commonly used protocol at this layer is IPv4. The network layer is responsible for:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Routing packets from source to destination (host-to-host delivery) across different networks, &nbsp;<\/li><li>Translating logical addresses into physical addresses, and<\/li><li>Fragmenting packets into smaller pieces to allow it to travel across links with lower maximum transmission units (MTU).<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>OSI Layer 2: Data Link Layer<\/strong><\/h3>\n\n\n\n<p>The data link layer is layer two of the OSI model and the last layer where encapsulation (frame assembly and disassembly) occurs. It takes the data from the layers above it and links it to the last layer while sending out information. The PDU for the data link layer is called a frame, which is a packet with a header and a trailer. The header signals the beginning of the frame, and the trailer indicates the end of data transmission for a particular frame.<\/p>\n\n\n\n<p>The data link layer has two sublayers:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Logical Link Control (LLC) layer (the upper sublayer)<\/strong> \u2014 The LLC sublayer assists with <a href=\"https:\/\/www.javatpoint.com\/multiplexing-in-computer-network\">multiplexing and de-multiplexing<\/a> over the MAC layer. It takes the packet from the network layer and adds control information to deliver it to right destination (hop-to-hop flow and error control).<\/li><li><strong>Media Access Control (MAC) layer (the lower sublayer)<\/strong> \u2014 The MAC sublayer interacts directly with the physical layer and deals with framing\/de-framing, typically done by NIC cards on PCs. It is also responsible for collision resolution on shared or broadcast links where multiple end nodes connect to the same link.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>OSI Layer 1: Physical Layer<\/strong><\/h3>\n\n\n\n<p>The first and lowest layer of the OSI model is called the physical layer. It deals with how the devices are physically connected to one another using cables, switches, NICs, etc. and the raw transfer of data via them. Examples include the following to send and receive information:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Ethernet cables,<\/li><li>Fiber optic cables,<\/li><li>Radio signals used in wireless communication, etc. to send or receive information.<\/li><\/ul>\n\n\n\n<p>Physical layer responsibilities include bit-by-bit-delivery, converting signals from one form to another, line coding, carrier sensing and collision detection, bit synchronization, defining the transmission mode, etc.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"823\" height=\"344\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/tcp-ip-and-osi.png\" alt=\"tcp\/ip and osi model network layers in relation to protocols\" class=\"wp-image-1780\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/tcp-ip-and-osi.png 823w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/tcp-ip-and-osi-300x125.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/tcp-ip-and-osi-560x234.png 560w\" sizes=\"auto, (max-width: 823px) 100vw, 823px\" \/><figcaption>Network layers and their associated protocols<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How Is the World Connected?<\/strong><\/h2>\n\n\n\n<p>The short answer is via cables. It might be interesting to understand the physical communication channels through which data flows, how they are built, who owns them and gain a general overview of how these channels that connect the entire planet came into existence.&nbsp;<\/p>\n\n\n\n<p>What happens in the background when you\u2019re trying to send an image file to your friend? It gets transformed into 1s and 0s (binary) that are transported using radio waves to the router. This gets done by using frequency modulation where a certain frequency is used to represent 1s and another to signify 0s. So long as the receiver knows which frequency is used to represent the 1s and 0s, they can read the signal.<\/p>\n\n\n\n<p>The information then leaves the router via cables in the form of light or electricity, depending upon the wire\u2019s material. These cables are typically set up and owned by internet service providers (ISPs). The ISPs are responsible for determining the most efficient route that the message can take to reach its next location, an internet hub. The internet hub is where multiple ISPs, telecommunication companies, and internet operators exchange traffic.<\/p>\n\n\n\n<p>When it comes to long-distance communication, primarily, it is the submarine cable providers who step in to lay down undersea cables. Data travels across oceans and continents using these cables.&nbsp; However, not everyone has access to the internet. In sparsely populated or low-income areas, the return on investment is inadequate for providers who bear the cost of setting up the infrastructure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>In Conclusion<\/strong><\/h2>\n\n\n\n<p>The OSI layers can be mapped to the four-layered TCP\/IP model (that came before it). This tells us that rather than being a strict network implementation model, it\u2019s a framework or a guideline that gives us a clearer picture of what goes on when machines from across the world or in the same network communicate with each other.<\/p>\n\n\n\n<p>Hopefully, going over the OSI model with its different network layers has helped you gain a fair understanding of how data moves at the level of bits and signals and how we, as end-users, interact with it at the application level.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The internet isn\u2019t an abstract idea but has real physical existence. Let\u2019s explore how computers and other devices communicate via networks\u2026 Not so long ago, sending messages to someone living&#8230;<\/p>\n","protected":false},"author":9,"featured_media":1781,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[79],"tags":[152,120],"class_list":["post-1774","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-other","tag-network-layers","tag-osi","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How the OSI Model &amp; Network Communication Layers Work - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"The OSI model is a conceptual framework or guidelines for how data communicates across network layers. Explore what it is &amp; how it all works.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/how-osi-model-network-communication-layers-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How the OSI Model &amp; Network Communication Layers Work - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"The OSI model is a conceptual framework or guidelines for how data communicates across network layers. Explore what it is &amp; how it all works.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/how-osi-model-network-communication-layers-work\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-16T09:58:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/osi-model-network-layers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lumena Mukherjee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lumena Mukherjee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-osi-model-network-communication-layers-work\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-osi-model-network-communication-layers-work\\\/\"},\"author\":{\"name\":\"Lumena Mukherjee\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/8fc401352fbdfcfdf08996099c088b1f\"},\"headline\":\"How the OSI Model &#038; Network Communication Layers Work\",\"datePublished\":\"2020-11-16T09:58:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-osi-model-network-communication-layers-work\\\/\"},\"wordCount\":2224,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-osi-model-network-communication-layers-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/osi-model-network-layers.jpg\",\"keywords\":[\"Network Layers\",\"OSI\"],\"articleSection\":[\"Other\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-osi-model-network-communication-layers-work\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-osi-model-network-communication-layers-work\\\/\",\"name\":\"How the OSI Model & Network Communication Layers Work - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-osi-model-network-communication-layers-work\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-osi-model-network-communication-layers-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/osi-model-network-layers.jpg\",\"datePublished\":\"2020-11-16T09:58:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/8fc401352fbdfcfdf08996099c088b1f\"},\"description\":\"The OSI model is a conceptual framework or guidelines for how data communicates across network layers. Explore what it is & how it all works.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-osi-model-network-communication-layers-work\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-osi-model-network-communication-layers-work\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-osi-model-network-communication-layers-work\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/osi-model-network-layers.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/osi-model-network-layers.jpg\",\"width\":1600,\"height\":1000,\"caption\":\"osi model network layers notes\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-osi-model-network-communication-layers-work\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How the OSI Model &#038; Network Communication Layers Work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/8fc401352fbdfcfdf08996099c088b1f\",\"name\":\"Lumena Mukherjee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g\",\"caption\":\"Lumena Mukherjee\"},\"description\":\"Lumena is a cybersecurity consultant, tech writer, and regular columnist for InfoSec Insights. She is currently pursuing her masters in cybersecurity and has a passion for helping companies implement better security programs to protect their customers' data.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How the OSI Model & Network Communication Layers Work - InfoSec Insights","description":"The OSI model is a conceptual framework or guidelines for how data communicates across network layers. Explore what it is & how it all works.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/how-osi-model-network-communication-layers-work\/","og_locale":"en_US","og_type":"article","og_title":"How the OSI Model & Network Communication Layers Work - InfoSec Insights","og_description":"The OSI model is a conceptual framework or guidelines for how data communicates across network layers. Explore what it is & how it all works.","og_url":"https:\/\/sectigostore.com\/blog\/how-osi-model-network-communication-layers-work\/","og_site_name":"InfoSec Insights","article_published_time":"2020-11-16T09:58:00+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/osi-model-network-layers.jpg","type":"image\/jpeg"}],"author":"Lumena Mukherjee","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lumena Mukherjee","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/how-osi-model-network-communication-layers-work\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/how-osi-model-network-communication-layers-work\/"},"author":{"name":"Lumena Mukherjee","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/8fc401352fbdfcfdf08996099c088b1f"},"headline":"How the OSI Model &#038; Network Communication Layers Work","datePublished":"2020-11-16T09:58:00+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/how-osi-model-network-communication-layers-work\/"},"wordCount":2224,"image":{"@id":"https:\/\/sectigostore.com\/blog\/how-osi-model-network-communication-layers-work\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/osi-model-network-layers.jpg","keywords":["Network Layers","OSI"],"articleSection":["Other"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/how-osi-model-network-communication-layers-work\/","url":"https:\/\/sectigostore.com\/blog\/how-osi-model-network-communication-layers-work\/","name":"How the OSI Model & Network Communication Layers Work - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/how-osi-model-network-communication-layers-work\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/how-osi-model-network-communication-layers-work\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/osi-model-network-layers.jpg","datePublished":"2020-11-16T09:58:00+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/8fc401352fbdfcfdf08996099c088b1f"},"description":"The OSI model is a conceptual framework or guidelines for how data communicates across network layers. Explore what it is & how it all works.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/how-osi-model-network-communication-layers-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/how-osi-model-network-communication-layers-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/how-osi-model-network-communication-layers-work\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/osi-model-network-layers.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/11\/osi-model-network-layers.jpg","width":1600,"height":1000,"caption":"osi model network layers notes"},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/how-osi-model-network-communication-layers-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How the OSI Model &#038; Network Communication Layers Work"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/8fc401352fbdfcfdf08996099c088b1f","name":"Lumena Mukherjee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g","caption":"Lumena Mukherjee"},"description":"Lumena is a cybersecurity consultant, tech writer, and regular columnist for InfoSec Insights. She is currently pursuing her masters in cybersecurity and has a passion for helping companies implement better security programs to protect their customers' data."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=1774"}],"version-history":[{"count":2,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1774\/revisions"}],"predecessor-version":[{"id":1782,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1774\/revisions\/1782"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/1781"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=1774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=1774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=1774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}