Engineering-Computing Academy of
Science and Technology
BSIT
Course Code NTW 247
Course Description Networking
Module Title OSI Model Layers and Protocols in
Computer Network
I. INTRODUCTION:
The OSI (Open Systems Interconnection) Model is a foundational framework in computer
networking that standardizes how communication occurs between devices over a network.
It divides the process of data transmission into seven distinct layers, each responsible for
specific functions. By structuring communication into these layers, the OSI model ensures
that devices from different manufacturers or systems can communicate effectively. From
physical connections, like cables and hardware, to higher-level processes such as data
formatting and encryption, the OSI model enables seamless data transfer and reliable
communication. Protocols such as TCP, IP, HTTP, and others operate within these layers
to manage how data is sent, received, and interpreted across networks. The OSI model is
crucial in modern networking, providing a universal standard for developers, network
engineers, and organizations to build and troubleshoot robust communication systems.
II. PRE- DISCUSSION ACTIVITY:
In your own words (2-3 sentences each number) define the following:
1. Protocols
2. Communication
3. Network
Engineering-Computing Academy of
Science and Technology
BSIT
III.DISCUSSION:
CHAPTER 4.1 Overview of the OSI Model
History of OSI Model
By the late 1970s, there was a growing need for standard ways for
devices to communicate. Researchers from France, the UK, and the USA
started projects to create these standards, aiming for compatibility between
different manufacturers. Two major groups worked on this: the International
Organization for Standardization (ISO) and the International Telegraph
and Telephone Consultative Committee (CCITT).
In 1983, the efforts of both groups merged into a single document,
creating what we now call the OSI (Open Systems Interconnection) Model.
The goal was to make the OSI model the standard for computer networking
and ensure that different devices could work together. However, many
devices at the time used different protocols, making it hard to create a single
standard.
During the 1980s and 1990s, the TCP/IP model gained popularity,
especially among vendors. While the OSI model was being developed,
Engineering-Computing Academy of
Science and Technology
BSIT
TCP/IP was already being widely adopted, and eventually, it became the
standard for networking. The OSI model never achieved the same level of
acceptance.
What is OSI (Open Systems Interconnection) Model?
The Open Systems Interconnection (OSI) model describes seven layers
that computer systems use to communicate over a network. It was the first
standard model for network communications, adopted by all major computer
and telecommunication companies in the early 1980s
The OSI Model is a logical and conceptual model that defines network
communication used by systems open to interconnection and communication
with other systems. The Open System Interconnection (OSI Model) also
defines a logical network and effectively describes computer packet transfer
by using various layers of protocols.
Engineering-Computing Academy of
Science and Technology
BSIT
The open systems interconnection (OSI) model is a conceptual model
created by the International Organization for Standardization which enables
diverse communication systems to communicate using standard protocols. In
plain English, the OSI provides a standard for different computer
systems to be able to communicate with each other.
The OSI Model can be seen as a universal language for computer
networking. It is based on the concept of splitting up a communication system
into seven abstract layers, each one stacked upon the last.
Importance of OSI (Open Systems Interconnection) Model
Establishing standard communication protocols is essential for efficient
communication across networks like the cloud and the internet. It helps
devices communicate faster, no matter where the data comes from or where
it's going.
The OSI model allows manufacturers to create their own standards while
ensuring their equipment can still connect with others. It also helps
troubleshoot network problems. When a device or application fails,
administrators can use the OSI model to pinpoint the issue at a specific layer.
This makes the OSI model crucial for designing, building, and fixing network
systems.
Engineering-Computing Academy of
Science and Technology
BSIT
Advantages and Disadvanatages of OSI Model
Following are the benefits or advantages of OSI Model:
It distinguishes very clearly between services, interfaces and protocols.
Hence devices or equipment from different vendors can work together
in the single network unlike proprietary systems.
As mentioned above, each layer defines a set of functions in data
communication. As a result, troubleshooting is easier.
The protocols in OSI model are hidden and hence they are easily
replaced by new protocols and changes in the protocols.
OSI model is truly general model which is very easy to adopt by
equipment/device manufacturers.
This model supports connection oriented and connectionless services.
Following are the drawbacks or disadvantages of OSI Model:
Many of the applications do not require data integrity provided by OSI
model.
OSI model is too complex compare to TCP/IP which is more optimized
and effective. Session and presentation layers are hardly used. Data
link layer and network layer functionalities are split into several layers.
Connection mode transfer in OSI model requires agreement between
three parties viz. users and service provider. Hence it is slow.
Engineering-Computing Academy of
Science and Technology
BSIT
OSI model is not adopted for all the telecommunication applications
used on the computer.
Due to complexity of model, initial implementations were time
consuming and slow.
CHAPTER 4.2 The 7 Layers of the OSI Model
OSI model is a layered server architecture system in which each layer is
defined according to a specific function to perform. All these seven layers
work collaboratively to transmit the data from one layer to another.
The Upper Layers: It deals with application issues and mostly
implemented only in software. The highest is closest to the end system
user. In this layer, communication from one end-user to another begins by
Engineering-Computing Academy of
Science and Technology
BSIT
using the interaction between the application layer. It will process all the
way to end-user.
The Lower Layers: These layers handle activities related to data
transport. The physical layer and datalink layers also implemented in
software and hardware.
7. Application Layer
The application layer is used by end-user software such as web browsers
and email clients. It provides protocols that allow software to send and
receive information and present meaningful data to users. A few examples of
application layer protocols are the Hypertext Transfer Protocol (HTTP), File
Transfer Protocol (FTP), Post Office Protocol (POP), Simple Mail Transfer
Protocol (SMTP), and Domain Name System (DNS).
Engineering-Computing Academy of
Science and Technology
BSIT
6. Presentation Layer
This layer is primarily responsible for preparing data so that it can be used by
the application layer; in other words, layer 6 makes the data presentable for
applications to consume. The presentation layer is responsible for
translation, encryption, and compression of data.
Two communicating devices may be using different encoding methods, so
layer 6 is responsible for translating incoming data into a syntax that the
application layer of the receiving device can understand.
If the devices are communicating over an encrypted connection, layer 6 is
responsible for adding the encryption on the sender’s end as well as
decoding the encryption on the receiver's end so that it can present the
application layer with unencrypted, readable data.
Finally, the presentation layer is also responsible for compressing data it
receives from the application layer before delivering it to layer 5. This helps
improve the speed and efficiency of communication by minimizing the
amount of data that will be transferred.
Engineering-Computing Academy of
Science and Technology
BSIT
5. Session Layer
This is the layer responsible for opening and closing communication between
the two devices. The time between when the communication is opened and
closed is known as the session. The session layer ensures that the session
stays open long enough to transfer all the data being exchanged, and then
promptly closes the session in order to avoid wasting resources.
The session layer also synchronizes data transfer with checkpoints. For
example, if a 100-megabyte file is being transferred, the session layer could
set a checkpoint every 5 megabytes. In the case of a disconnect or a crash
after 52 megabytes have been transferred, the session could be resumed
from the last checkpoint, meaning only 50 more megabytes of data need to
be transferred. Without the checkpoints, the entire transfer would have to
begin again from scratch.
Engineering-Computing Academy of
Science and Technology
BSIT
4. Transport Layer
Layer 4 is responsible for end-to-end communication between the two
devices. This includes taking data from the session layer and breaking it up
into chunks called segments before sending it to layer 3. The transport layer
on the receiving device is responsible for reassembling the segments into
data the session layer can consume.
The transport layer is also responsible for flow control and error control. Flow
control determines an optimal speed of transmission to ensure that a sender with
a fast connection does not overwhelm a receiver with a slow connection. The
transport layer performs error control on the receiving end by ensuring that the
data received is complete, and requesting a re-transmission if it isn’t.
Engineering-Computing Academy of
Science and Technology
BSIT
3. Network Layer
The network layer is responsible for facilitating data transfer between two
different networks. If the two devices communicating are on the same network,
then the network layer is unnecessary. The network layer breaks up segments
from the transport layer into smaller units, called packets, on the sender’s
device, and reassembling these packets on the receiving device. The network
layer also finds the best physical path for the data to reach its destination; this is
known as routing.
Network layer protocols include IP, the Internet Control Message Protocol
(ICMP), the Internet Group Message Protocol (IGMP), and the IPsec suite.
2. Data Link Layer
Engineering-Computing Academy of
Science and Technology
BSIT
Data link layer establishes and terminates a connection between two physically-
connected nodes on a network. It breaks up packets into frames and sends
them from source to destination. This layer is composed of two parts—Logical
Link Control (LLC), which identifies network protocols, performs error
checking and synchronizes frames, and Media Access Control (MAC) which
uses MAC addresses to connect devices and define permissions to transmit
and receive data.
Media Access Control (MAC) - It is responsible for controlling how device
in a network gain access to medium and permits to transmit data.
Logical link control (LLC) - is responsible for identity and encapsulating
network-layer protocols and allows you to find the error.
1. Physical Layer
Engineering-Computing Academy of
Science and Technology
BSIT
The physical layer is responsible for the physical cable or wireless
connection between network nodes. It defines the connector, the electrical
cable or wireless technology connecting the devices, and is responsible for
transmission of the raw data, which is simply a series of 0s and 1s, while
taking care of bit rate control.
In Summary:
Application Layer: Applications create the data.
Presentation Layer: Data is formatted and encrypted.
Session Layer: Connections are established and managed.
Transport Layer: Data is broken into segments for reliable delivery.
Network Layer: Segments are packaged into packets and routed.
Data Link Layer: Packets are framed and sent to the next device.
Physical Layer: Frames are converted into bits and transmitted
physically.
Chapter 4.3 Key Protocols at Each Layer
1. Physical Layer (Layer 1)
No specific protocols, but technologies and standards for physical
connections include:
o Ethernet (physical signaling)
o USB
Engineering-Computing Academy of
Science and Technology
BSIT
o Bluetooth
o Wi-Fi (IEEE 802.11 - physical transmission)
o DSL, ISDN (for digital data over telephone lines)
2. Data Link Layer (Layer 2)
Ethernet (IEEE 802.3) – Used for local area networks (LANs).
Wi-Fi (IEEE 802.11) – Wireless LAN technology.
PPP (Point-to-Point Protocol) – Used in direct connections between two
network nodes.
HDLC (High-Level Data Link Control) – Used in WAN connections.
MAC (Media Access Control) – Addresses devices for communication
within a LAN.
3. Network Layer (Layer 3)
IP (Internet Protocol) – Responsible for logical addressing and routing of
packets across networks (IPv4, IPv6).
ICMP (Internet Control Message Protocol) – Used for error reporting and
diagnostics (e.g., ping).
ARP (Address Resolution Protocol) – Resolves IP addresses to MAC
addresses.
OSPF (Open Shortest Path First) – Used for routing in large IP networks.
BGP (Border Gateway Protocol) – Used to route data between different
autonomous systems on the internet.
Engineering-Computing Academy of
Science and Technology
BSIT
4. Transport Layer (Layer 4)
TCP (Transmission Control Protocol) – Provides reliable, connection-
oriented data transfer (e.g., for web browsing, email).
UDP (User Datagram Protocol) – Provides connectionless, fast data
transfer (e.g., for video streaming, online gaming).
SCTP (Stream Control Transmission Protocol) – Used for reliable
message-oriented data transfer.
5. Session Layer (Layer 5)
NetBIOS – Allows applications on different computers to communicate
within a LAN.
RPC (Remote Procedure Call) – Enables executing procedures on
remote systems.
PPTP (Point-to-Point Tunneling Protocol) – Used to implement VPNs.
6. Presentation Layer (Layer 6)
SSL/TLS (Secure Sockets Layer/Transport Layer Security) – Used to
encrypt data over the network.
JPEG, GIF, PNG – Image formatting protocols for presentation.
MIME (Multipurpose Internet Mail Extensions) – Used for formatting
email attachments.
ASCII, EBCDIC – Text encoding protocols.
Engineering-Computing Academy of
Science and Technology
BSIT
7. Application Layer (Layer 7)
HTTP/HTTPS (Hypertext Transfer Protocol/Secure) – Protocols for web
browsing.
FTP (File Transfer Protocol) – Used for transferring files over a network.
SMTP (Simple Mail Transfer Protocol) – Used for sending emails.
DNS (Domain Name System) – Resolves domain names to IP addresses.
POP3, IMAP – Used for retrieving emails from a mail server.
SNMP (Simple Network Management Protocol) – Used for network
management and monitoring.
CHAPTER 4.4 OSI vs.TCP/IP Model
What is TCP/IP Model?
TCP/IP stands for Transmission Control Protocol/Internet Protocol. It has 4
layers named as Physical layer, Network layer, Transport layer, and Application
layer. It also can be used as a communications protocol in a private computer
network. It was designed by Vint Cerf and Bob Kahn in the 1970s.
Engineering-Computing Academy of
Science and Technology
BSIT
Similarities Between OSI Model and TCP/IP Model
OSI and TCP/IP both are logical models. One of the main similarities between
the OSI and TCP/IP models is that they both describe how information is
transmitted between two devices across a network. Both models define a set of
layers. Each layer performs a specific set of functions to enable the
transmission of data.
Another similarity between the two models is that they both use the concept
of encapsulation, in which data is packaged into a series of headers and trailers
that contain information about the data being transmitted and how it should be
handled by the network.
Differences Between OSI Model and TCP/IP Model
The OSI (Open Systems Interconnection) Model and the TCP/IP (Transmission
Control Protocol/Internet Protocol) Model are two frameworks used to
understand how data moves through networks. While they both help in
organizing network communication, they have distinct structures and purposes.
Engineering-Computing Academy of
Science and Technology
BSIT
The TCP/IP model has 4 layers, while the OSI model has 7 layers.
Layers 5, 6, and 7 of the OSI model are grouped into the Application
Layer of the TCP/IP model, and OSI layers 1 and 2 are combined into
the Network Access Layer of TCP/IP.
The TCP/IP model is older and serves as the foundational protocol for
transferring data online. It has less strict boundaries between layers
compared to the OSI model.
All layers of the TCP/IP model are essential for data transmission, while
in the OSI model, some applications can skip certain layers. Only OSI
layers 1, 2, and 3 are required for data transmission.
Engineering-Computing Academy of
Science and Technology
BSIT
CHAPTER 5.5 Real World Applications of OSI Model
1. Troubleshooting Network Issues:
Understanding the OSI model helps in isolating
problems to specific layers. For example,
issues with physical connections like cables or
network interface cards fall under the Physical
layer, while problems with routing are related to
the Network layer.
2. Optimizing Network Performance: Knowledge of the OSI model aids in
optimizing network performance by identifying bottlenecks at different layers. For
instance, issues with data transmission
reliability can be addressed at the
Transport layer, while streamlining data
flow between applications can be
improved at the Session and
Presentation layers.
3. Security and Risk Assessment: The
OSI model assists in security
assessments by providing a structured
Engineering-Computing Academy of
Science and Technology
BSIT
approach to identifying vulnerabilities at each layer. This understanding helps in
implementing appropriate security measures to protect data and resources.
IV. ASSESSMENT:
Reference List:
Advantages of OSI Model | disadvantages of OSI Model. (n.d.).
https://www.rfwireless-world.com/Terminology/Advantages-and-Disadvantages-of-OSI-
model.html
Chepil, V. (2024, September 18). The OSI model acronym - How the OSI model began. MSP Blog -
Domotz Blog for MSPs. https://blog.domotz.com/it-security/history-of-the-osi-model/
GeeksforGeeks. (2024a, August 1). Difference Between OSI Model and TCP/IP Model. GeeksforGeeks.
https://www.geeksforgeeks.org/difference-between-osi-model-and-tcp-ip-model/
GeeksforGeeks. (2024b, August 30). What is OSI Model? Layers of OSI Model. GeeksforGeeks.
https://www.geeksforgeeks.org/open-systems-interconnection-model-osi/
Lafferty, P. (2023, July 27). A refresher course on OSI & TCP/IP. Real Time Automation, Inc.
https://www.rtautomation.com/rtas-blog/a-refresher-course-on-osi-tcp-ip/
Leo, B. (2024, June 27). OSI Model Layers and Protocols in Computer Network. Guru99.
https://www.guru99.com/layers-of-osi-model.html
Sharadin, G. (2023, December 21). What is OSI Model | 7 Layers Explained | Imperva. Learning
Center. https://www.imperva.com/learn/application-security/osi-model/
Engineering-Computing Academy of
Science and Technology
BSIT
Prepared by: Reviewed by: Recommending Approved:
Approval:
Justin Nichol P. Dr. Jane M. Virgo C. Lopez, PhD Donna Padilla
Pasamonte Fernandez Vice President for Taguiba, PhD
Faculty,E-Coast Dean,E-Coast Academics President