Sign In
Sign In

The OSI Model: A Complete Beginner’s Guide

The OSI Model: A Complete Beginner’s Guide
Hostman Team
Technical writer
Infrastructure

When studying how computer networks work, sooner or later you will encounter the so-called OSI open network model. The OSI model is crucial for understanding network technologies, and it often presents unexpected challenges for beginners.

In this article, we’ll go over the basic principles of the OSI model and will try to provide an “OSI model for dummies” kind of guide.

The Concept of a Protocol

Communication protocols (or simply protocols) are necessary so that participants in information exchange can understand each other. A wide variety of protocols are involved in the operation of computer networks, relating to different network layers. For example, a computer's network controller follows a protocol that describes how to convert digital data into an analog signal transmitted over wires. A browser connects to a website using the TCP transport protocol, and a server and a browser communicate using the HTTP protocol.

In other words, a protocol is a set of agreements between software and hardware developers. It describes how programs and devices interact with other programs and devices that support the protocol.

OSI

OSI stands for Open Systems Interconnection. It does not refer to Open Source; in this context, "open systems" are systems built on open (publicly available) specifications that conform to established standards.

You will often come across the term "Open Systems Interconnection (OSI) Reference Model." The reference model outlines the layers a network should have and the functions performed at each layer. The OSI model divides all protocols into the following seven layers:

  • Physical
  • Data Link
  • Network
  • Transport
  • Session
  • Presentation
  • Application

The OSI model does not include descriptions of the protocols themselves; these are defined in separate standards. 

Today, the OSI model is not much used in practice. In the past, there were literal implementations with exactly seven layers, but over time, they were replaced by the less prescriptive TCP/IP protocol suite, which underpins the modern Internet.

Nevertheless, the protocols in use today roughly correspond to the OSI layers, and the model is still used as a common language for describing how networks work.

Physical Layer

All layers are numbered, starting from the one closest to the data transmission medium. In this case, the first layer of the OSI model is the physical layer. This is where bits of information are converted into signals that are then transmitted through the medium. The physical protocol used depends on how the computer is connected to the network.

For example, in a typical local area network (LAN) using twisted-pair cables, the 100BASE-TX specification (IEEE 802.3u standard) is employed. It defines the cables and connectors, wire characteristics, frequencies, voltage, encoding, and much more. Wi-Fi connections are more complex since data is transmitted over shared radio channels. The interaction of Wi-Fi devices is described by the IEEE 802.11 specification, which, like Ethernet, includes parts of both the physical and data link layers.

When accessing the Internet via a cellular network, GSM specifications are utilized, which include specialized protocols (such as GPRS) that affect not only the first two layers but also the network layer. There are also relatively simple protocols, such as RS232, which is used when connecting two computers via a null-modem cable through COM ports.

Data Link Layer

Next is the data link layer of the OSI model. At this layer, entire messages (frames) are transmitted instead of just bits. The data link layer receives a stream of bits from the physical layer, identifies the start and end of the message, and packages the bits into a frame. Error detection and correction also take place here. In multipoint network connections, where multiple computers use the same communication channel, the data link layer additionally provides physical addressing and access control to the shared transmission medium.

Some tasks theoretically handled by protocols at this layer are addressed in the Ethernet and Wi-Fi specifications; however, there is more. Network interfaces in multipoint connections recognize each other using special six-byte identifiers—MAC addresses. When configuring a network, network adapters must know which device is responsible for which network address (IP address) to send packets (blocks of data transmitted in a packet-switched mode) to their destinations correctly. The ARP (Address Resolution Protocol) is used to automatically build tables that map IP addresses to MAC addresses.

In point-to-point connections, ARP is not needed. However, the PPP (Point-to-Point Protocol) is often used. In addition to frame structure and integrity checks, PPP includes rules for establishing a connection, checking line status, and authenticating participants.

Network Layer

The next level is the network layer of the OSI model. It is designed to build large, composite networks based on various networking technologies. At this level, differences between different data link layer technologies are reconciled, and global addressing is provided, allowing each computer on the network to be uniquely identified. Routing is also performed here, determining the path for packet forwarding through intermediate nodes.

It’s sometimes said that in the Internet, the IP (Internet Protocol) functions as the network layer. This is true in a sense: IP defines the structure of individual packets transmitted through gateways, the system of network addresses, and some other functions. However, several other protocols can also be attributed to the network layer, even though they operate "on top" of the IP protocol.

One of the most important of these is the Internet Control Message Protocol (ICMP). It enables communication between network participants regarding various normal and abnormal conditions, including link failures, the absence of a suitable route, and other delivery issues. Sometimes, ICMP messages contain recommendations for using alternative routes.

Transport Layer

Packets transmitted over a network using network layer protocols are typically limited in size. They may arrive out of order, be lost, or even duplicated. Application programs require a higher level of service that ensures reliable data delivery and ease of use. This is precisely the role of transport layer protocols in the OSI model. They monitor packet delivery by sending and analyzing acknowledgments, numbering packets, and reordering them correctly upon arrival.

As mentioned earlier, network layer protocols do not guarantee packet delivery. A sent packet might be lost, duplicated, or arrive out of sequence. The content of such a packet is usually called a datagram.

One of the simplest transport protocols is the User Datagram Protocol (UDP). Participants in network communication running on the same computer are identified by integers called port numbers (or simply ports). The UDP protocol requires that the data sent over the network be accompanied by the sender’s and receiver’s port numbers, the length of the datagram, and its checksum. All of this is “wrapped” into a packet according to the IP protocol's conventions. However, the responsibility for acknowledgments, retransmissions, splitting information into smaller pieces, and reassembling it in the correct order falls on the software developer. Therefore, UDP does not protect against packet loss, duplication, or disorder — only the integrity of data within a single datagram is ensured.

There is also a second type of transport interaction — stream-based communication. Here, all issues related to packet loss and data reconstruction from fragments are handled by the transport protocol implementation itself, which makes it significantly more complex than datagram-based protocols. The corresponding transport protocol used on the Internet is TCP (Transmission Control Protocol). Unlike UDP, TCP stream communication requires establishing a connection. It guarantees that all bytes written to the stream will be available for reading on the other end and in the correct order. If this guarantee cannot be upheld, the connection will be terminated, and both parties will be informed.

The TCP protocol includes a number of sophisticated agreements, but fortunately, all of these are handled by the operating system.

The Remaining Layers

Identifying which real-world protocols correspond to the remaining three layers is somewhat more difficult. Following the transport layer comes the session layer. According to the creators of the OSI model, its purpose is to establish communication sessions. This includes managing the order of message transmission during dialogues (such as in video conferences), handling concurrent access to critical operations, and providing protection against connection loss (synchronization function).

The problem is that, in practice, all of these functions are either implemented by application-layer protocols or by even higher-level mechanisms that fall outside the scope of the OSI model. As a result, the session layer is not used in real networks.

The next layer is the presentation layer. Its task is to present data in a form that is understandable to both the sender and the receiver. This includes various data formats and interpretation rules, such as text encoding protocols (like ASCII, UTF-8, and KOI8-R), specifications for different versions of HTML/XHTML, image formats (JPEG, GIF, PNG), the MIME specification set, and others. This is also the layer where encryption and decryption are implemented. The most popular examples are TLS (Transport Layer Security) and SSL (Secure Sockets Layer).

The application layer is the most straightforward. It facilitates the interaction of user-facing applications. This includes email, the World Wide Web, social networks, video and audio communication, and so on.

Pros and Cons 

The OSI model was adopted by the International Organization for Standardization (ISO) in 1983, a time when networking technologies were rapidly developing. While the committee debated standards, the world gradually shifted to the TCP/IP stack, which began to displace other protocols. When the OSI protocol implementations were finally released, they were met with a wave of criticism. Critics pointed out their incompatibility with real technologies, incomplete specifications, and limited capabilities compared to existing protocols.

Additionally, experts considered the division into seven layers to be unjustified. Some layers were rarely used, and the same tasks were often handled at multiple different layers. Specialists joke that the OSI model ended up with seven layers because the committee had seven subcommittees, and each proposed its own addition. Meanwhile, the TCP/IP protocol suite, which underpins the entire modern Internet, was developed by a small group of people in an ad hoc fashion—solving problems as they arose, with no committees involved.

However, not everything is negative. A clear advantage of the OSI model is its strong theoretical foundation for network communication, making it a standard reference for documentation and education. Some believe that all is not lost and that the model may still find a role—for example, in cloud computing.

Infrastructure

Similar

Infrastructure

Private Cloud In Cloud Computing: Benefits and When To Use

What is a cloud? It’s virtualized server resources: RAM, processor power, disk space, and installed applications. The main advantage of the cloud-based approach to infrastructure is flexibility. If you need more performance, you can easily add memory or connect additional processing power when the load increases. Difference Between Private, Public, and Hybrid Clouds Below is the standard classification of cloud services: Private Cloud: The infrastructure is used by only one organization. The equipment can be located either at the provider’s site or on the user’s premises. Public Cloud: The infrastructure is shared by all registered users. Examples include Amazon Web Services, Microsoft Azure, and Hostman. Hybrid Cloud: A combination of private and public infrastructure. Part of the equipment may be located with the user, and part with the provider. From this classification, it’s clear that hybrid clouds are a compromise solution. However, using them isn’t always justified. To understand this better, let’s compare all three types across several parameters. Comparison Table Parameter Private Public Hybrid Complexity High level of complexity. Requires selecting equipment and developing architecture. Low level of complexity. You choose a suitable service and pay for it. High level of complexity. You need to configure the private part and connect it with the external infrastructure. Cost Expenses are borne by the owner of the equipment and licenses. Expenses are borne by the provider; the user pays a service fee. Expenses are partly on the user, partly on the provider. Maintenance The organization must monitor the system and fix failures itself. The provider manages the infrastructure. The organization must monitor its private part. Scalability Additional resources must be purchased and configured manually. Additional resources are available on demand. Additional resources are available on demand. Security High, as everything is under the owner’s control. Lower level of control; many security aspects remain the provider’s responsibility. High level of security with proper architecture, when all critical nodes are located in the private cloud. Private Cloud Advantages and Disadvantages The comparison table above clearly shows the pros and cons of private clouds. Let’s look at them in more detail. Advantages: Physical access to the equipment usually remains only with the owner. It’s also possible to limit internet connections to prevent unauthorized data access. You can save on physical equipment by investing in the development of a virtual infrastructure instead. Flexible configuration of resources and computing power for different departments within the company. Disadvantages: Requires significant financial investment: you can’t build it without purchasing or renting equipment. System design and deployment take a lot of time. Scalability is limited by the available physical resources. If more capacity is needed, new equipment must be purchased. When to Create a Private Cloud Now that we understand what a private cloud is and what its pros and cons are, let’s figure out when companies choose this approach. The main scenario comes from how a private cloud operates. Large organizations often have enough resources to purchase equipment, design a well-thought-out architecture, and fund teams of specialists to maintain the system. Such companies also tend to handle large volumes of data that require a high level of security. Based on this scenario, the main users of private clouds are: Mobile network operators Banks Insurance companies Gas and oil enterprises Retail companies The types of data that companies host in their private cloud environments can vary, but they generally fall into two main categories: Confidential or proprietary information, for which the organization must retain full control. Security policies or internal regulations may prohibit the use of public cloud servers, leaving private infrastructure as the only viable option. Data governed by strict legal or industry-specific compliance requirements. For instance, certain privacy laws or standards (such as GDPR, HIPAA, or PCI DSS) require data to be stored in secure, controlled environments or within specific jurisdictions. In such cases, a private cloud is often the most suitable solution. It provides greater control over security and compliance, reduces regulatory risks, and allows for certification under relevant industry standards. Moreover, if the company later needs to expand its infrastructure to store or process less sensitive data, it can integrate a public cloud and adopt a hybrid model, combining flexibility with strong data protection.
17 October 2025 · 4 min to read
Infrastructure

Hardware Virtualization: What It Is, Its Types, and Benefits

Hardware virtualization allows creating virtual machines (VMs) on physical hardware while distributing resources as efficiently as possible. This article explains how it works, what types exist, and what advantages it provides for business. How It Works The basic level of any virtualization is the server. Data processing occurs on physical hardware, regardless of the level of abstraction. In hardware virtualization, a hypervisor is installed on the server. This is software that creates sets of virtual resources. There are two main types of hypervisors: Type 1 (bare-metal), which runs directly on the hardware, and Type 2 (hosted), which runs on top of a host operating system. Both create and manage virtual machines, but Type 1 generally offers higher performance. We have covered hypervisors in detail in a separate article. The top layer of abstraction is the virtual machine. At first glance, it does not differ from a traditional server. Essentially, a VM consists of a single virtual disk and files describing its configuration. The virtual machine is installed on the hardware hypervisor. Once the VM is prepared, operating systems and application software can be installed on it. A helpful analogy is a book. Imagine a physical server with installed software as a book on a shelf. You can pick it up and move it physically, but creating a copy to give to someone else requires significant effort: retyping or scanning each page, assembling the pages, and binding the book. A configured VM with allocated resources and installed applications is like a digital version of the book. You can make unlimited copies with minimal time and effort. You can create a backup, transfer a copy to another machine, or share it with another user. Virtualization of CPUs and other resources enables this simplicity in deployment and management. Hardware Support For VMs to function efficiently, resource allocation must be supported at the processor level. Two major technologies exist from leading manufacturers: Intel VT and AMD-V. Both technologies have multiple development directions. The primary one is CPU virtualization, which allows running multiple systems on a single processor, either in parallel or nested within each other. Technologies for virtualized graphics and input/output are also advancing. They facilitate remote access and sharing of physical hardware, which is useful for remote workstations or online gaming. These hardware extensions are particularly important for Type 1 hypervisors, allowing virtual machines to run at near-native performance without modifying the guest operating system. Types of Hardware Virtualization The main types of virtualization are: Full virtualization: hardware is fully emulated. This creates an environment that can run on different servers without lengthy configuration. Paravirtualization: a special version of the operating system is created for the virtual machine. It can be modified or recompiled based on the server's hardware resources. This method was historically used to improve performance, but modern hardware virtualization extensions have largely reduced its advantage. Hardware-assisted virtualization: a fully virtualized VM is created using the computer's physical hardware with support from processor extensions (Intel VT/AMD-V). The choice of type depends on the tasks to be solved. Differences Between Hardware and Software Virtualization Hardware virtualization is not the only approach. Software virtualization relies on a host system and adds an extra layer of abstraction: Physical server with resources Host operating system Hypervisor installed on the host OS (Type 2 hypervisor) Virtual machines installed and managed via the hypervisor Adding this extra layer complicates the process and reduces hardware performance. Physical resources are consumed by both the host OS and the hypervisor. Other issues include: If the host system fails, all VMs running on it lose access to physical resources. Security risks become larger; if the host OS is compromised, all VMs are at risk. Updating or reinstalling the host OS requires stopping the VMs. Software virtualization is suitable for simple tasks, such as testing another operating system inside the main one, avoiding the need to install multiple OSes side by side. For business purposes, hardware virtualization is preferred because it provides higher performance and security. The key is efficient resource usage. Business Advantages Virtualization technology offers several benefits: Cost efficiency: reduces expenses for purchasing, configuring, and maintaining physical hardware. Instead of multiple servers, a single powerful machine can be used, with the virtualization system dividing resources among VMs performing different tasks. Flexibility: VM configurations can be saved as images and deployed across different hardware or moved between servers. Scalability: when workload increases, additional VMs can be quickly launched to add resources and stabilize operations. Fault tolerance: VM snapshots can be created at any time. Copies can be distributed geographically, so even if part of the hardware fails, the infrastructure continues to function. The load on active components can be managed by adding extra resources. Security: VMs are isolated from each other. Compromising one VM does not affect others. Conclusion With hardware virtualization, external applications cannot distinguish virtual machines from physical servers. Guest operating systems run on the CPU without knowledge of other OSes sharing the same hardware. This isolation helps maintain high security. Virtualization is used by large companies, small and medium businesses, and individual users. It enables building a flexible infrastructure of any size that can be easily scaled and protected against internal and external threats.
17 October 2025 · 5 min to read
Infrastructure

What Is a Virtual Data Center (vDC): Its Capabilities and Purpose

Virtual Data Center is infrastructure resources in the “cloud” allocated for business needs. Physically, the equipment is located in traditional data centers. The provider rents it out using virtualized space. A virtual data center (vDC) can be managed from anywhere in the world via a console. At the same time, the flexibility of such a solution is higher than that of a traditional data center. There are also advantages in terms of cost efficiency, scalability, and security, which we will discuss below. Virtualization Layers A virtual data center is a multi-layered system, where virtualization is applied at each level. There are five main layers: Network. Virtualization allows configuring communication between multiple servers to build a unified infrastructure. Storage. Administrators manage file placement at this level, which is convenient even if the data is stored on different devices. Resources. Virtualization enables flexible adjustment of available computing power, changing resource usage based on business needs. Applications. Virtualization solves compatibility issues, allowing applications to run independently of the host operating system. Access. User rights management, for example, for remote system access. These layers are interdependent. A virtual data center operates correctly only if interactions between the layers are properly configured. vDC Capabilities The main advantage of a virtual data center is the ability to quickly scale resources up or down, allowing businesses to address various tasks without contacting the service provider. Other important capabilities include: Data protection. Storing information in a vDC significantly reduces the risk of data loss, especially when backups are properly configured and geographically distributed. Disaster recovery. With a simple and fast backup system, the infrastructure can be restored within minutes. Flexibility. IT teams can automate routine tasks, quickly implement and test new systems and features. Reliability. Providers use high-performance equipment and maintain the physical infrastructure of the vDC. Control. All monitoring and management tools are available to the customer who ordered and paid for the resources. Cost savings on hardware. There is no need to buy, configure, or maintain physical equipment; the provider handles this. Customers pay only for the resources they use. Another important aspect is the availability of different billing models. Customers can either pay a fixed monthly amount for allocated resources or only for the resources actually consumed. Both models guarantee that the provider will allocate the requested resources, preventing situations where the client requests capacity but does not receive it in full. Scalability Features One of the main advantages of a virtual data center is rapid scalability. When demand increases, add resources; when demand decreases, reduce unused capacity to save costs. Scalability can be of two types: Horizontal scaling: new elements are added. For example, if an application normally runs on two servers but user demand increases fivefold, additional servers can be added and users distributed among them. Vertical scaling: additional resources are added to an existing server. For instance, RAM can be increased, storage expanded, or the server replaced with a more powerful one if the CPU cannot handle the load. Horizontal and vertical scaling are not mutually exclusive and often complement each other. Horizontal scaling is usually used for expanding server clusters, while vertical scaling is applied when increasing load without adding new servers. A single task can be addressed with either horizontal or vertical scaling in a vDC. Example: A web server hosting a website experiences increased traffic. Vertical scaling would involve adding CPU, RAM, or storage to the existing server. Horizontal scaling would involve cloning the server and distributing the load across multiple virtual machines. Use Cases A virtual data center can fully replace physical infrastructure and help address almost any business task. Common scenarios include: Data storage Software development and testing Increasing capacity using reserve resources during peak loads Creating a backup data center that fully replicates the main data center Setting up remote workstations These are just a few typical use cases. In practice, vDCs can be beneficial in many situations. However, this solution is not suitable for everyone, partly because vDCs are usually more expensive than standalone cloud servers. Suitable for: Medium or large companies planning or already migrating some processes to the cloud. Companies with seasonal fluctuations or plans to increase load. Startups that need to minimize infrastructure costs initially but be prepared for rapid growth. The final decision on whether to deploy a virtual data center should involve IT specialists, economists, analysts, and managers responsible for strategic development, so everyone understands what a vDC is and the risks and benefits of its implementation.
16 October 2025 · 4 min to read

Do you have questions,
comments, or concerns?

Our professionals are available to assist you at any moment,
whether you need help or are just unsure of where to start.
Email us
Hostman's Support