Logo

dev-resources.site

for different kinds of informations.

OSI Model Layers and Protocols: Computer Networks

Published at
12/31/2024
Categories
network
computerscience
Author
harshm03
Categories
2 categories in total
network
open
computerscience
open
Author
8 person written this
harshm03
open
OSI Model Layers and Protocols: Computer Networks

The Complete Guide to OSI Model Layers and Protocols

The OSI (Open Systems Interconnection) model is the foundation for understanding how data is transmitted across networks. It consists of seven layers, each serving a specific function and associated with various protocols. This article provides an exhaustive list of all OSI layers and their commonly used protocols, helping developers, network engineers, and tech enthusiasts deepen their understanding of network communication.


1. Physical Layer (Layer 1)

Purpose: Responsible for transmitting raw bits over a physical medium (like cables or wireless).

Key Protocols and Technologies:

  • Ethernet (Physical layer standards, e.g., IEEE 802.3)
  • Wi-Fi (Physical aspects of IEEE 802.11)
  • Bluetooth
  • DSL (Digital Subscriber Line)
  • ISDN (Integrated Services Digital Network)
  • Optical Fiber
  • Coaxial Cable
  • Infrared Communication
  • RS-232 (Serial Communication Standard)
  • SONET (Synchronous Optical Network)
  • PON (Passive Optical Network)

2. Data Link Layer (Layer 2)

Purpose: Handles reliable transmission of data frames between nodes.

Key Protocols:

  • Ethernet (IEEE 802.3)
  • Wi-Fi (Data Link layer aspects of IEEE 802.11)
  • PPP (Point-to-Point Protocol)
  • HDLC (High-Level Data Link Control)
  • ARP (Address Resolution Protocol)
  • RARP (Reverse Address Resolution Protocol)
  • MPLS (Multiprotocol Label Switching)
  • Frame Relay
  • ATM (Asynchronous Transfer Mode)
  • Token Ring
  • FDDI (Fiber Distributed Data Interface)
  • LLDP (Link Layer Discovery Protocol)
  • VLAN (Virtual Local Area Network, IEEE 802.1Q)

3. Network Layer (Layer 3)

Purpose: Manages routing, addressing, and packet forwarding.

Key Protocols:

  • IP (Internet Protocol - IPv4 and IPv6)
  • ICMP (Internet Control Message Protocol)
  • IGMP (Internet Group Management Protocol)
  • IPsec (Internet Protocol Security)
  • RIP (Routing Information Protocol)
  • OSPF (Open Shortest Path First)
  • BGP (Border Gateway Protocol)
  • EIGRP (Enhanced Interior Gateway Routing Protocol)
  • IS-IS (Intermediate System to Intermediate System)
  • GRE (Generic Routing Encapsulation)
  • NAT (Network Address Translation)

4. Transport Layer (Layer 4)

Purpose: Ensures reliable or best-effort transmission between hosts.

Key Protocols:

  • TCP (Transmission Control Protocol)
  • UDP (User Datagram Protocol)
  • SCTP (Stream Control Transmission Protocol)
  • DCCP (Datagram Congestion Control Protocol)
  • RSVP (Resource Reservation Protocol)
  • QUIC (Quick UDP Internet Connections)
  • RTP (Real-time Transport Protocol)

5. Session Layer (Layer 5)

Purpose: Manages sessions and connections between applications.

Key Protocols:

  • NetBIOS (Network Basic Input/Output System)
  • PPTP (Point-to-Point Tunneling Protocol)
  • RPC (Remote Procedure Call)
  • SOCKS (Socket Secure)
  • TLS/SSL (Transport Layer Security/Secure Sockets Layer)
  • AppleTalk Session Protocols

6. Presentation Layer (Layer 6)

Purpose: Ensures data is in a usable format and handles encryption, compression, and translation.

Key Protocols:

  • TLS/SSL (Transport Layer Security/Secure Sockets Layer)
  • JPEG (Image Compression)
  • GIF, PNG (Image Formats)
  • MPEG, MP3 (Media Formats)
  • ASCII, EBCDIC (Character Encoding)
  • XML, JSON (Data Serialization Formats)
  • XDR (External Data Representation)
  • HTML, CSS (Presentation Formats)

7. Application Layer (Layer 7)

Purpose: Provides services for end-user applications and network access.

Key Protocols:

  • HTTP/HTTPS (Hypertext Transfer Protocol)
  • FTP (File Transfer Protocol)
  • SFTP (Secure File Transfer Protocol)
  • SMTP (Simple Mail Transfer Protocol)
  • IMAP (Internet Message Access Protocol)
  • POP3 (Post Office Protocol v3)
  • DNS (Domain Name System)
  • DHCP (Dynamic Host Configuration Protocol)
  • SNMP (Simple Network Management Protocol)
  • Telnet
  • SSH (Secure Shell)
  • LDAP (Lightweight Directory Access Protocol)
  • NTP (Network Time Protocol)
  • TFTP (Trivial File Transfer Protocol)
  • WHOIS
  • IRC (Internet Relay Chat)

Mapping the Protocols to Layers

Here’s a quick summary of where these protocols fit:

Layer Key Protocols
Physical Ethernet, Wi-Fi, Bluetooth, RS-232, DSL, SONET
Data Link Ethernet, Wi-Fi, PPP, HDLC, ARP, MPLS, Frame Relay, ATM
Network IP, ICMP, IGMP, RIP, OSPF, BGP, EIGRP, NAT, GRE
Transport TCP, UDP, SCTP, DCCP, RSVP, QUIC
Session NetBIOS, PPTP, RPC, SOCKS, TLS/SSL
Presentation JPEG, GIF, PNG, MPEG, MP3, ASCII, XML, JSON, HTML
Application HTTP/HTTPS, FTP, SMTP, IMAP, DNS, DHCP, SNMP, SSH, NTP, LDAP

This detailed list not only highlights must-hear protocols but also clarifies how each protocol plays a role in enabling seamless communication between devices. Understanding these layers and protocols is essential for diagnosing issues, optimizing performance, or designing robust network systems.

network Article's
30 articles in total
Favicon
Kubernetes on Hybrid Cloud: Talos network
Favicon
Introduction To Networking
Favicon
OS: Public IP project
Favicon
Optimize Your IT Infrastructure with Expert IT Consultation Services
Favicon
How to Install Wireshark on Ubuntu
Favicon
How twitter.com Redirects to x.com (The Magic Behind URL Forwarding)
Favicon
Enhanced CIDR Block Calculator with Expanded Input Formats in Go
Favicon
Service VS Private Endpoint
Favicon
OSI Model Overview
Favicon
🏗️ Provision AWS EC2 Instances with Terraform and Set Up Docker via User Data
Favicon
Worms, Bots, and Botnets: How Hackers Take Over the Internet!
Favicon
Load Balancer
Favicon
Understanding AWS Networking Services: A Comprehensive Guide
Favicon
Network monitoring for Microservices architecture: A Developer’s guide
Favicon
TCP Handshake in Computer Network
Favicon
Understanding Networks – A Beginner’s Guide
Favicon
Nexus Network Testnet: A Revolution in Blockchain and Cybersecurity
Favicon
NATing on the cheap on AWS
Favicon
Defending Yourself From DDoS Attacks - An Essential Guide
Favicon
Solving Complex Network Issues: A Network Engineer's Journey
Favicon
Exploring Data Flow via Email Transmission
Favicon
Network Programming in Rust
Favicon
What is Narrowband Internet of Things (NB-IoT)? NB-IoT is a low-power wide-area network (LPWAN) technology designed for IoT devices. It https://protechsoultions.com/revolutionizing-connectivity-narrowband-internet-of-things-non-terrestrial-network/
Favicon
Network Layer: Addressing: Computer Networks
Favicon
Transport Layer: Computer Networks
Favicon
OSI Model Layers and Protocols: Computer Networks
Favicon
Protocols: Computer Networks
Favicon
Network Layer: Internet Protocol: Computer Networks
Favicon
Mastering the Cloud: A Comprehensive Guide to Virtual Private Clouds (VPC) and Their Benefits
Favicon
Working of Real-Time Chat Application -FireChat

Featured ones: