Fact-checked by Grok 2 weeks ago

OSI model

The Open Systems Interconnection (OSI) model is a that standardizes the functions of a telecommunication or computing system into seven abstraction layers, facilitating the exchange of information between different systems through a common set of protocols. Developed by the (ISO) and the CCITT (now ) in the late to address challenges among diverse computer networks, it was first published in 1984 as ISO 7498, with the current version codified as ISO/IEC 7498-1:1994. The model's layered architecture promotes modularity, allowing developers to design, implement, and troubleshoot network protocols independently at each level while ensuring seamless communication across the stack. At its core, the OSI model organizes network operations from the physical transmission of bits to high-level application interactions, providing a universal reference for understanding how data moves through a . Its primary purpose is to enable open systems—computers and devices from different vendors—to interconnect reliably, fostering global standardization in networking technologies. Unlike implementation-specific models like TCP/IP, the OSI framework is purely descriptive, serving as an educational and analytical tool rather than a rigid , though it influences modern standards such as those used in the . The seven layers of the OSI model, numbered from bottom to top, each handle distinct aspects of communication: This structure not only simplifies complex network designs but also aids in diagnosing issues by isolating problems to specific layers, making it a foundational concept in computer networking education and practice.

Overview

Purpose and Scope

The Open Systems Interconnection (OSI) model is a seven-layer reference model developed by the (ISO) to enable open systems interconnection. Its primary purpose is to provide a common basis for coordinating the development of standards that facilitate communication between diverse computer systems by abstracting network functions into modular layers. This abstraction allows systems from different vendors to interoperate without proprietary dependencies, addressing the silos created by manufacturer-specific networking protocols prevalent in the . The scope of the OSI model encompasses both theoretical understanding of network communications and practical applications in protocol design, with an emphasis on vendor-neutral standards that promote global compatibility. It serves as a framework for standardizing how data is exchanged across networks, applicable to a wide range of technologies while remaining independent of specific implementations. Key benefits of the OSI model include enhanced interoperability among heterogeneous systems, modularity that simplifies protocol development and integration of new technologies, and easier troubleshooting by isolating issues to specific layers. Additionally, it establishes a common language for networking professionals, fostering consistent terminology and approaches in education, design, and maintenance.

Key Principles

The OSI reference model is founded on the principle of , which decomposes the complex process of open systems interconnection into a structured of seven layers. Each layer is responsible for a distinct set of functions, providing standardized services to the layer immediately above it while utilizing the services offered by the layer below. This hierarchical arrangement enforces strict boundaries between layers, preventing direct dependencies and enabling modular design where each layer operates as an autonomous entity within the overall architecture. A fundamental aspect of this model is , which allows each layer to conceal the specific details of its internal mechanisms and s from adjacent layers. By presenting only a simplified of services and , abstraction facilitates the independent evolution of individual layers, permitting updates or replacements in one layer's without necessitating changes in others, thereby enhancing and adaptability in diverse environments. Service access points (SAPs) define the critical between consecutive layers, serving as the designated points through which an upper layer requests and receives services from the lower layer. These access points encapsulate the interactions, ensuring that exchange occurs in a controlled and standardized manner, with units passed across the boundary via such as request, indication, response, and confirm. The model employs communication as a logical , wherein entities residing in the same layer on different communicating systems interact directly through their respective to fulfill layer-specific objectives. This communication is abstracted from the underlying layers, relying on the services provided below to protocol data units between peers, thus maintaining the integrity of the layered separation while enabling end-to-end functionality across interconnected systems. Independence among layers is a guiding that underscores the model's robustness, stipulating that alterations to the internal operations or technologies within one layer should have no impact on the functionality of other layers, except in cases where the defined interfaces or service specifications are modified. This separation promotes among heterogeneous systems by isolating implementation choices and allowing for at individual layers without disrupting the broader interconnection framework.

Historical Development

Origins in ISO Standardization

The development of the OSI model originated from efforts within the (ISO) to establish a universal framework for network interoperability amid the rise of incompatible proprietary systems in the 1970s. In 1977, ISO's Technical Committee 97 (TC 97) formed Subcommittee 16 (SC 16) specifically to address "Open Systems Interconnection," tasked with creating an architectural model that would enable diverse computer systems from different vendors to communicate seamlessly. This initiative was driven by the need to counteract vendor-specific protocols, such as IBM's (SNA) introduced in 1974 and Digital Equipment Corporation's (DEC) network architectures, which locked users into single-vendor ecosystems and hindered multivendor integration. The subcommittee's work drew inspiration from earlier networking experiments, including the ARPANET's packet-switching concepts developed in the late 1960s and Xerox Network Systems (XNS), a layered protocol stack pioneered by Xerox in the mid-1970s that emphasized modularity and interoperability. However, SC 16's focus remained on crafting vendor-neutral international standards rather than adopting any single prior implementation, with the first plenary meeting occurring in March 1978, where initial architectural principles were outlined. Key contributors included delegates from Europe and the United States, such as French engineer Hubert Zimmermann, who played a central role in drafting the layered structure; U.S. representatives like Charles Bachman (chairman of SC 16) from Honeywell and John Day from the University of Illinois; and British physicist Donald Davies, whose work on packet switching at the National Physical Laboratory influenced the model's foundational ideas. Initial drafts of the reference model emerged in the late 1970s through collaborative sessions involving representatives from 23 member countries, culminating in the publication of ISO 7498, "Information Processing Systems—Open Systems Interconnection—Basic Reference Model," as an international standard in October 1984. This document formalized the seven-layer architecture, providing a conceptual blueprint for open networking that prioritized modularity, transparency, and global applicability over proprietary constraints.

Evolution and Key Milestones

Following the initial publication of the OSI Reference Model in 1984 as ISO 7498, subsequent developments focused on enhancing its applicability through specialized addenda and revisions. In 1989, the (ISO) introduced ISO 7498-2, which defined a architecture for the OSI model, outlining services such as , , data , and across the layers. Concurrently, the (then CCITT) approved Recommendation X.290 in November 1988, establishing a methodology and for OSI protocols, including general concepts for abstract test suites to ensure . These updates addressed critical gaps in and verification, enabling more robust implementations of OSI-compliant systems. The model underwent a significant revision process starting in 1988, culminating in the publication of ISO/IEC 7498-1:1994, which refined the basic by incorporating prior addenda (such as connectionless modes), clarifying layer interactions (e.g., prohibiting relays), and aligning with emerging standards like ISO 9545 for structure. Additionally, ISO/IEC 7498-4:1989 provided a dedicated , defining OSI concepts, including fault, , , , and functions to support ongoing network operations. This 1994 edition emphasized stability and coordination for standards development, serving as a foundational update without major structural overhauls. Adoption of the OSI model gained momentum in the late 1980s through international policies and collaborations. The (precursor to the ) endorsed OSI via its Open Systems policy, with national governments across Europe mandating its use in procurements to promote vendor by the mid-1980s. Simultaneously, the model was integrated into recommendations, building on the 1984 alliance between ISO and CCITT (now ), which harmonized OSI principles with telecommunication protocols for global consistency. By the 1990s, direct implementations of declined sharply due to the rise of the simpler, royalty-free TCP/IP suite, which dominated growth and U.S. government priorities after 1992. Despite this, the OSI model endured as a vital educational and conceptual tool, providing a structured framework for teaching principles and influencing design in academia and industry training programs. As of 2025, the OSI model retains relevance in contemporary standards and architectures. It informs cybersecurity frameworks like ISO/IEC 27001 for in industrial control systems and broader networks. In 5G and emerging 6G discussions, OSI layers—particularly 1), 5), and 6)—guide , security, and AI-integrated connectivity in non-terrestrial networks and spectrum innovations.

Definitions and Standards

Core Definitions

In the OSI model, a is defined as a set of rules and formats (semantic and syntactic) that governs the interaction between peer entities at the same layer to perform specific functions. These rules ensure consistent communication behavior across open systems, enabling without regard to underlying hardware differences. A , in contrast, refers to the capabilities provided by a given layer (N) and all layers below it to the adjacent higher layer (N+1) through a defined at their boundary. This service abstraction allows the higher layer to request functions such as data transfer or error handling without needing to understand the implementation details of the lower layers. Services form the foundation for modular system design in the OSI . The is the fundamental unit of data exchanged by a at a specific layer, comprising protocol control information and, optionally, user data passed from the higher layer. For instance, at the , the PDU consists of bits; at the , it takes the form of frames. PDUs facilitate peer-to-peer communication by encapsulating data as it traverses layers, preserving the integrity of . OSI services are categorized into connection-oriented and connectionless modes, which determine how data transfer occurs between layers. A connection-oriented service establishes an association, or connection, between entities before data exchange, providing explicit identification for the transfer and agreement on service parameters; this mode supports reliable, sequenced delivery akin to a . For example, it ensures data units are delivered in order and acknowledges receipt, suitable for applications requiring guaranteed transmission. Conversely, a connectionless service transmits data without establishing a prior connection or maintaining logical relationships between units, treating each as an independent for efficient, . This mode prioritizes speed over reliability, as in scenarios where occasional loss is tolerable. Addressing schemes in the OSI model provide unambiguous identifiers for entities or service access points at each layer, enabling precise and delivery of PDUs within and across open systems. These schemes are layer-specific; for example, the uses hardware addresses like MAC addresses to identify devices on a local . Such mechanisms support the model's goal of hierarchical communication without requiring global knowledge at lower layers.

Relevant Standards Documents

The OSI model's foundational framework is formalized in the ISO/IEC 7498 series of international standards, developed by the (ISO) and the (IEC). The core document, ISO/IEC 7498-1:1994, titled "Information technology — Open systems interconnection — Basic Reference Model — Part 1: The basic model," defines the seven-layer architecture and principles for open systems interconnection, providing a common basis for coordinating standards development in network protocols and services; it incorporates amendments from the original 1984 edition (ISO 7498) to refine concepts like layering and service definitions. Complementing this, ISO/IEC 7498-2:1989, "Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 2: Security architecture," extends the model by specifying general security services (such as and ) and mechanisms applicable across layers, positioning them within the reference model to support secure communications between open systems. ISO/IEC 7498-3:1997, "Information technology — Open Systems Interconnection — Basic Reference Model — Part 3: Naming and addressing," establishes mechanisms for identifying and locating objects in the OSI environment, including definitions for names, addresses, naming domains, and authorities to ensure consistent resolution in distributed systems. Additionally, ISO/IEC 7498-4:1989, "Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 4: Management framework," outlines a structure for OSI management activities, including scopes like fault, , , , and management, to guide the development of related standards for monitoring and controlling interconnected systems. Related standards from the Telecommunication Standardization Sector () align closely with the ISO/IEC 7498 series, particularly in the X.200 recommendation series for data networks and open systems; for instance, ITU-T Recommendation X.200 (1994), "Information technology — Open Systems Interconnection — Basic Reference Model: The basic model," is identical to ISO/IEC 7498-1:1994 and serves as an overview for OSI conformance in telecommunication contexts. As of 2025, these editions remain the current versions with no major revisions published, reflecting the model's enduring conceptual stability; they are available for purchase in digital formats (PDF) through the official ISO online store, with previews often accessible via the ISO standards database.

Layered Architecture

Design Principles

The OSI model's layered architecture is founded on several principles that ensure its effectiveness as a for open systems interconnection. These principles guide the division of network functions into distinct layers, promoting and manageability in diverse environments. Central to this is the concept of , which structures communication functions hierarchically while maintaining independence between components. Modularity forms a foundational , treating each layer as a self-contained responsible for specific functions, such as or error detection, without dependency on internal implementations of other layers. This allows for parallel development, where different teams or vendors can work on individual layers independently, facilitating easier updates, testing, and across heterogeneous systems. By encapsulating functionality within modules, the model reduces and enhances reusability, as changes in one layer's implementation do not necessitate revisions elsewhere, provided the defined interfaces remain consistent. Hierarchy establishes a strict top-down dependency structure among layers, where each layer relies on services from the layer below and provides services to the layer above through well-defined interfaces. This vertical organization ensures orderly data flow and abstraction, with higher layers focusing on user-oriented tasks while lower layers handle transmission details. Interactions between layers are mediated by service primitives—request, indication, response, and confirm—which standardize communication: a request from a higher layer triggers an indication in the lower layer, potentially eliciting a response that leads to a confirm back to the originator. This primitive-based mechanism enforces reliable, sequenced service invocation, preventing direct interlayer bypassing and maintaining architectural integrity. Openness is embedded in the model's design to promote across diverse systems from different manufacturers, achieved through internationally agreed-upon standards that specify protocols and interfaces without constraints. By defining open systems as those adhering to these standards, the OSI model enables seamless , allowing equipment and software from various sources to interoperate as if part of a unified , a key enabler for global communication infrastructures. Completeness ensures the model encompasses all essential aspects of communication, spanning from physical in the lowest layer to high-level application interactions in the uppermost layer. This comprehensive coverage addresses the full spectrum of operations, including bit-level concerns, , session , and , providing a holistic for implementing end-to-end without gaps in functionality. Flexibility is inherent in the architecture's support for both connection-oriented and connectionless operations across layers, accommodating varied communication needs such as reliable, sequenced delivery (connection-oriented) or efficient, datagram-style transmission (connectionless). This duality allows the model to adapt to different technologies and applications, from real-time streaming to file transfers, while the layered permits evolution in individual layers without disrupting the overall structure.

Encapsulation Process

In the OSI model, encapsulation refers to the process by which data is progressively wrapped with protocol-specific information as it travels downward through the layers from the application to the physical layer on the sending system. This wrapping adds headers (and sometimes trailers) to the original data at each layer, enabling each to perform its functions independently while ensuring reliable transmission across interconnected systems. The process is defined in the OSI Reference Model (ISO/IEC 7498-1), which standardizes how layers interact to facilitate open systems interconnection. During the downward journey, application-layer data begins as a Protocol Data Unit (PDU), typically called "data," and is passed to the presentation layer, where it is encapsulated with a header for tasks like encryption, compression, and format conversion. This presentation PDU is then handed to the session layer, which adds a header for session management, synchronization, and dialog control, forming a session PDU. The session PDU reaches the transport layer, which segments the data and adds a header with control information such as sequence numbers for reassembly, creating a segment (or Transport PDU). The transport segment is passed to the network layer, which adds a header with logical addressing details like source and destination IP addresses, transforming it into a packet. This packet reaches the data link layer, which appends a header (including MAC addresses) and possibly a trailer for error detection, resulting in a frame. Finally, the frame is converted into a bit stream at the physical layer for transmission over the medium, without additional encapsulation but with signal encoding. The overall PDU transformation sequence is: application data → presentation data → session data → transport segment → network packet → data link frame → physical bits. On the receiving system, de-encapsulation reverses this process in an upward journey from the physical to the application layer. The physical layer receives the bit stream and reconstructs the frame, which the data link layer strips of its header and trailer to yield the packet. The network layer removes its header to retrieve the segment, and the transport layer strips the segment header to reassemble the data, passing it to the session layer. The session layer removes its header to handle synchronization and dialog, then passes to the presentation layer, which strips its header to perform decryption, decompression, and format conversion before delivering the original data to the application layer. This layer-by-layer stripping ensures that control information is processed only by the appropriate layer, restoring the data for application use. A generic example of data packet traversal illustrates this: an application generates user , which is encapsulated downward—adding presentation formatting/, session , sequencing, , and framing—into bits for transmission; upon arrival, the bits are de-encapsulated upward, with each layer stripping its additions (e.g., presentation conversion and session management) to deliver the intact to the destination application. This bidirectional encapsulation maintains , allowing changes in one layer without affecting others, as outlined in the OSI model's layered .

The Seven Layers

Physical Layer

The , Layer 1 of the OSI , serves as the foundational component responsible for the transparent transmission of raw bit streams between communicating devices over a physical medium. It defines the electrical, mechanical, procedural, and functional specifications necessary to activate, maintain, and deactivate a bit-level physical , ensuring between open systems without regard to the underlying or semantics. This layer operates independently of higher-layer protocols, focusing solely on the physical aspects of signal propagation to enable reliable bit delivery. Core functions of the Physical Layer include bit synchronization, which aligns the timing clocks of sender and receiver to accurately delineate individual bits within the stream, and control, which governs the transmission speed to match the medium's capabilities. It also specifies transmission modes—simplex for unidirectional flow, for bidirectional but not simultaneous exchange, or full-duplex for concurrent —and handles the or deactivation of physical circuits. These functions ensure the electrical, optical, or electromagnetic signals representing bits are generated and interpreted correctly, without any structuring or handling. The Physical Layer accommodates diverse transmission media, such as twisted-pair copper wiring for short-range connections, coaxial cables for broadband signals, fiber optic cables for high-speed long-distance optical transmission, and wireless media using radio frequencies for untethered communication. Supported network topologies include bus (linear shared medium), (centralized hub connections), (circular daisy-chaining), and (interconnected nodes), each influencing how signals propagate and collide on the medium. For instance, twisted-pair and fiber optics commonly underpin topologies in modern deployments. Key standards exemplify these specifications: (now TIA/EIA-232-F) defines serial point-to-point interfaces with voltage levels of +3 V to +15 V for logic 0 (space) and -3 V to -15 V for logic 1 (mark), employing single-ended unbalanced signaling for distances up to 50 feet at rates to 20 kbps. Similarly, the standard outlines (PHY) parameters, including encoding schemes and interfaces for twisted-pair, coaxial, and fiber media, supporting speeds from 1 Mb/s to 400 Gb/s via methods like encoding for synchronization. Signaling at this layer typically involves analog modulation techniques, such as or for wireless and optical links, to superimpose digital bits onto continuous carrier waves. The Data Link Layer, the second layer in the OSI reference model, provides node-to-node data transfer services across a single physical link or by organizing bits from the into logical frames and ensuring reliable delivery between directly connected devices. It handles the of data transmission, insertion of control information for error management, and regulation of access to the shared medium, operating exclusively within local boundaries without involvement in . Key functions of the Data Link Layer include framing, which involves encapsulating network-layer packets into frames by adding headers and trailers to delineate data boundaries and enable synchronization. Physical addressing is achieved through Media Access Control (MAC) addresses, 48-bit unique identifiers assigned to network interfaces for local delivery within the segment. Error detection and correction mechanisms, such as Cyclic Redundancy Check (CRC), append a checksum to frames to identify transmission errors like bit flips, with CRC using polynomial division to generate a remainder that verifies integrity upon receipt. Flow control regulates the rate of data transmission to prevent overwhelming the receiver, often through techniques like sliding window protocols that manage buffer capacities. The Data Link Layer is subdivided into two sublayers: the Logical Link Control (LLC) sublayer and the Media Access Control (MAC) sublayer, as defined in the IEEE 802 standards to separate multiplexing and medium access functions. The LLC sublayer, specified in IEEE 802.2, provides multiplexing and demultiplexing of protocols above it using Service Access Points (SAPs), such as Destination SAP (DSAP) and Source SAP (SSAP), and supports connectionless or connection-oriented services for reliable data exchange. The MAC sublayer manages access to the physical medium, resolving contention in shared environments through methods like Carrier Sense Multiple Access with Collision Detection (CSMA/CD) for detecting and resolving simultaneous transmissions, or token passing, where a control token circulates to grant sequential access rights. Prominent standards governing the Data Link Layer include the IEEE 802 series, which map to OSI Layer 2 for local area networks (LANs). defines Ethernet, incorporating MAC framing, CRC for error detection, and CSMA/CD for half-duplex operations on wired segments. specifies the MAC for wireless LANs (), using CSMA with Collision Avoidance (CSMA/CA) to mitigate hidden node problems and support frame acknowledgments for reliability. Common protocols at this layer include (), a byte-oriented standard for establishing direct connections over serial links, providing framing, authentication, and multilink capabilities without assuming a specific physical medium. (HDLC), a bit-oriented ISO protocol, supports synchronous with flags for framing, fields, and optional error correction via retransmission. These protocols operate in half-duplex , allowing bidirectional communication but not simultaneously, or full-duplex , enabling simultaneous transmit and receive without , as in modern switched Ethernet networks. Overall, the Data Link Layer ensures hop-by-hop reliability in a single network segment, transforming raw physical signals into structured, error-checked frames for efficient local communication.

Network Layer

The Network Layer, designated as layer 3 in the OSI reference model, provides the functional and procedural means of transferring variable-length data sequences (packets) from a source host on one network to a destination host on a potentially different network, while maintaining quality of service characteristics for the established connection. This layer establishes the foundation for internetwork communication by abstracting the underlying subnetwork technologies, enabling end-to-end data delivery across multiple interconnected networks without regard to the specific routing or switching mechanisms employed. Unlike the Data Link Layer, which operates within a single physical link, the Network Layer extends scope to multi-network environments, marking the onset of true end-to-end addressing and path selection. Key functions of the Network Layer include logical addressing, , fragmentation and reassembly, and basic congestion control. Logical addressing assigns unique identifiers (such as network service access points or NSAPs) to hosts and networks, facilitating packet identification and delivery independent of physical locations. involves determination through the use of routing tables and algorithms, such as those the shortest between nodes, to forward packets toward their destination across intermediate systems (routers). Fragmentation breaks down oversized packets to conform to subnetwork (MTU) limits, with reassembly performed at the destination, ensuring compatibility across diverse network types. Congestion control mechanisms monitor network load and adjust traffic flow to prevent overload, though this is typically best-effort rather than guaranteed. The Network Layer supports two primary operational approaches: connectionless () mode, where each packet is routed independently without prior setup, and connection-oriented () mode, which establishes a logical path before data transfer for sequenced delivery. The connectionless mode, exemplified by protocols like the Connectionless Network Protocol (CLNP) defined in ISO/IEC 8473, treats each packet as a self-contained unit, promoting flexibility but offering no inherent reliability or ordering. In contrast, connection-oriented operation pre-allocates resources along the path, akin to virtual circuits, to support applications requiring consistent performance. These conceptual roles, outlined in ISO/IEC 7498-1, emphasize the layer's independence from specific implementations, allowing diverse protocols to interoperate within the OSI framework.

Transport Layer

The Transport Layer, designated as layer 4 in the OSI , provides transparent end-to-end data transfer services between peer entities in different systems, ensuring reliable communication independent of the underlying characteristics. This layer bridges the gap between the network layer's host-to-host delivery and the higher layers' need for process-to-process communication, focusing on host systems rather than intermediate . Its primary role is to segment application data into transport protocol data units (TPDUs) for transmission and reassemble them at the destination, while offering to allow multiple applications to share the same connection via transport service access points (TSAPs). The Transport Layer supports two main service types: connection-oriented and connectionless. In connection-oriented service, it establishes a virtual connection before data transfer, enabling reliable delivery through mechanisms like sequence numbering for ordering TPDUs, acknowledgments to confirm receipt, retransmissions for lost or corrupted data, and windowing to manage and prevent . This mode is specified in ISO/IEC 8073, which defines five protocol classes tailored to network reliability: Class 0 for simple, error-free networks with minimal functions; Class 1 for basic on networks prone to signal loss; Class 2 for with optional ; Class 3 combining and ; and Class 4 for full end-to-end detection and using checksums on unreliable networks. In contrast, connectionless service transfers data without prior setup, prioritizing simplicity and speed for applications tolerating potential loss, with functions limited to via addressing and optional detection via checksums, but without segmentation, reassembly, or mechanisms. This mode is defined in ISO/IEC 8602, which operates over either connectionless or connection-oriented network services. End-to-end error recovery and flow control in the ensure and efficient transmission across diverse network conditions, distinguishing it from layer's focus on . For instance, in connection-oriented protocols, flow control uses credit-based windowing where the receiver advertises available space through TPDUs, preventing overload. These mechanisms collectively provide the reliability guarantees needed for upper-layer services, such as those in the , without assuming specific network paths.

Session Layer

The session layer, the fifth layer in the Open Systems Interconnection (OSI) reference model, is responsible for establishing, managing, and terminating communication sessions between applications on different devices, ensuring coordinated and reliable dialogue over potentially unreliable transport connections. It provides mechanisms for dialog control and synchronization, allowing applications to maintain stateful interactions without directly handling lower-layer complexities. Key functions of the session layer include session establishment via the CONNECT Service Protocol Data Unit (SPDU), which initiates a between session entities; maintenance through ongoing data transfer SPDUs that support continuous communication; and termination using the DISCONNECT SPDU to cleanly end the session. Dialog control is achieved by regulating the direction and mode of communication, supporting (one-way), half-duplex (bidirectional but alternating), or full-duplex (simultaneous bidirectional) operations, primarily through token-based mechanisms that determine which entity may transmit at a given time. Synchronization features enable recovery from interruptions in long-running sessions by defining checkpoints, such as minor sync points (via MINOR SYNC POINT SPDU) for lightweight pauses and major sync points (via MAJOR SYNC POINT SPDU) for more robust markers, allowing resynchronization with the RESYNCHRONIZE SPDU to resume from the last agreed point without full restart. In multi-party sessions, token management coordinates access by using GIVE TOKENS and PLEASE TOKENS SPDUs to transfer control tokens among participants, preventing conflicts and ensuring orderly interaction. The protocol operates in two modes: token mode, which enforces strict control via token possession for activities like data sending, and no-token mode, which permits freer data exchange without requiring token ownership, alongside activity management through ACTIVITY START and ACTIVITY END SPDUs to delineate logical units of work within the session. These functions are standardized in ISO/IEC 8327-1:1996, which specifies the connection-oriented session protocol for OSI environments, identical to ITU-T Recommendation X.225.

Presentation Layer

The Presentation Layer, the sixth layer in the Open Systems Interconnection (OSI) model, ensures that data exchanged between applications on different systems is in a compatible format by handling translation, formatting, and representation differences. It acts as an intermediary between the Application Layer and the Session Layer, providing independence from variations in data syntax and semantics to enable seamless interoperability across heterogeneous environments. This layer transforms data into a standardized form suitable for network transmission while preserving its integrity and meaning. Key functions of the Presentation Layer include data syntax translation, compression, and encryption/decryption. Syntax translation involves converting between different data representations, such as character encodings from ASCII to EBCDIC, to accommodate diverse system architectures. Compression reduces data volume for efficient transmission without loss of information, while encryption/decryption applies basic primitives to secure data confidentiality during transfer, with more advanced security mechanisms addressed elsewhere. These operations ensure that the receiving system can correctly interpret the data regardless of originating platform differences. The layer employs Abstract Syntax Notation One (ASN.1) to define abstract data structures, types, values, and constraints independently of specific machine or language implementations, facilitating the description of information for protocol exchanges. supports the creation of an abstract syntax that outlines the logical structure of data. To enable actual transmission, the Presentation Layer converts this abstract syntax into a transfer syntax using standardized encoding rules, which map internal representations to network-compatible formats. Relevant standards include ISO/IEC 8824, which specifies for basic notation in defining abstract syntax, and ISO/IEC 8825, which outlines encoding rules such as Basic Encoding Rules (BER) for deriving transfer syntaxes from definitions. These standards, developed under the OSI framework, promote consistent data handling across open systems.

Application Layer

The , designated as Layer 7 in the OSI , serves as the interface between end-user applications and the underlying network services, enabling distributed applications to communicate effectively across open systems. It provides a set of standardized services that allow application processes to access the OSI environment without needing to manage the intricacies of lower-layer protocols or data formatting. According to the OSI Basic , this layer focuses on user-oriented functionalities, such as initiating and managing network-based tasks, while abstracting away the details of , , and physical transmission. Key functions of the Application Layer include supporting common network services like file transfer, electronic messaging, and directory services, which facilitate interoperability among diverse systems. It does not include direct user interfaces—those are handled by the application software itself—but rather supplies the necessary primitives for applications to request and receive network resources. For instance, it enables applications to establish associations with remote peers, transfer data, and manage sessions at a high level of abstraction. The layer's design emphasizes modularity, allowing specific services to be combined to meet application needs, thereby promoting standardization in open interconnection environments. The structure and components of the Application Layer are formally defined in ISO/IEC 9548-1, which outlines the architectural , including association control service (ACSE) for managing application associations and common application service (CASE) that provide reusable functionalities across multiple applications. Specific Application Service (SASE) tailor these services to particular tasks, ensuring that the layer remains conceptual yet adaptable to various implementations. This standard establishes guidelines for how application processes interact with the OSI stack, focusing on service primitives like request, indication, response, and to handle distributed operations efficiently. Representative protocols operating at the Application Layer include the , Access, and Management (FTAM) protocol, standardized in ISO 8571, which provides mechanisms for initiating , accessing remote file stores, and performing management operations such as deletion and attribute retrieval across heterogeneous systems. Another example is the Message Handling System, developed by , which defines a comprehensive for services, including message submission, transfer, and delivery, thereby supporting email-like functionalities in an OSI-compliant manner. These protocols exemplify the layer's role in delivering high-level, application-specific services while maintaining compatibility with the OSI model's principles of layered abstraction.

Interlayer Interactions

Cross-Layer Functions

Cross-layer functions in the OSI model encompass mechanisms that enable interactions and optimizations across multiple layers, diverging from the model's ideal of strict to address real-world networking challenges such as varying conditions and constraints. These functions facilitate between layers, allowing for joint decision-making that enhances overall system performance, particularly in environments where traditional can introduce inefficiencies. By permitting higher layers to influence lower-layer operations or vice versa, cross-layer approaches optimize metrics like throughput and reliability, though they complicate and maintenance. Quality of Service (QoS) mechanisms exemplify cross-layer functions, as parameters such as delay and inherently span multiple OSI layers to ensure reliable data delivery. For instance, propagation delay at the due to over directly contributes to end-to-end latency experienced at the , where congestion control protocols must mitigate accumulated delays. , or variation in packet arrival times, arises from interactions between the layer's error correction and the Network layer's routing decisions, requiring cross-layer signaling to prioritize traffic like . In wireless sensor networks, cross-layer frameworks address these by coordinating QoS metrics across , , and layers, reducing time-delay through adaptive resource allocation. A multilayered QoS architecture based on the OSI employs cross-layer coordination to integrate from lower layers into higher-layer policies, ensuring consistent performance in systems. Security functions, particularly , operate across layers to protect data confidentiality throughout transmission. Encryption processes typically initiate at the , where data is formatted and encrypted using algorithms like to abstract application-specific representations, but the protection extends through the Network layer by embedding encrypted payloads in packets that traverse intermediate routers without decryption. This spanning ensures that even if lower layers like are compromised during local hops, the core data remains secure from source to destination. In wireless security contexts, such cross-layer encryption addresses vulnerabilities at each OSI layer, with end-to-end mechanisms like at the Network layer complementing Presentation-layer encryption to counter threats like . Mobility management in networks relies on cross-layer handoffs to maintain seamless as devices move between access points. Handoffs involve the for maintaining local associations and switching medium access control addresses, while the Network layer updates routing tables and care-of addresses to redirect traffic without session interruption. For example, in networks, handoffs are enhanced by layer 1/2 triggered mobility, where beam management coordinates with scheduling and RRC signaling at higher layers to reduce handover and support ultra-reliable low- communications. This coordination minimizes signaling overhead and , affecting layers from Physical (radio link adaptation) to (connection continuity). Representative examples of cross-layer functions include adaptive modulation, which adjusts Physical-layer transmission parameters based on feedback from the Network layer to optimize path selection in dynamic channels. In cross-layer designs for wireless networks, adaptive modulation and coding (AMC) at the Physical layer integrates with Data Link-layer hybrid automatic repeat request (HARQ) to boost throughput by 20-50% under varying signal-to-noise ratios, effectively bridging to Network-layer QoS requirements. Modern protocols like IEEE 802.11 in Wi-Fi employ cross-layer optimizations, where Physical-layer channel state information informs Data Link-layer scheduling, enhancing spectral efficiency in contention-based environments. Similar optimizations are employed in 5G NR, where cross-layer designs integrate PHY/MAC layer adaptations with higher-layer QoS to support ultra-reliable low-latency communications (URLLC). Criticisms of cross-layer functions highlight their violation of the OSI model's purity, as they undermine modularity and information hiding, potentially complicating interoperability and increasing design complexity in standardized systems. Despite this, such functions are necessary for efficiency in real-world deployments like Wi-Fi, where strict layering fails to handle wireless-specific issues like fading and mobility, leading to suboptimal performance without inter-layer coordination. In wireless networks, cross-layer approaches mitigate inefficiencies of traditional layered architectures, such as high error rates and handoff delays, by enabling adaptive optimizations that traditional OSI adherence cannot achieve.

Programming Interfaces

Programming interfaces in the OSI model enable software applications to interact with the underlying layers, primarily through standardized that abstract the complexities of layer-specific protocols. These interfaces allow developers to access services at the transport and layers without needing to implement low-level details, facilitating portable and efficient network programming. The most common mechanisms include socket-based for transport layer operations and more structured interfaces that align closely with the OSI layering for broader access. The Berkeley Software Distribution (BSD) sockets provides a foundational interface for accessing the (layer 4) of the OSI model, enabling applications to communicate using protocols such as for reliable, connection-oriented streams and for connectionless datagrams. Originating in systems, this uses file descriptors to represent sockets, allowing operations like binding addresses, connecting to peers, sending data, and receiving notifications of incoming connections. It serves as the for access, bridging the directly to transport services while hiding details of lower layers. For more explicit alignment with the OSI model's layered , the X/Open Transport (XTI) offers a standardized programming interface that supports access to transport layer services across multiple protocols, including those beyond /. Defined by the Open Group, XTI provides functions for connection establishment, data transfer, and disconnection, with options to select specific transport providers that map to OSI layer 4 behaviors. This interface emphasizes , allowing applications to query and configure transport characteristics like , making it suitable for environments requiring strict adherence to OSI principles. At the core of OSI layer interactions are service primitives, which define the standardized messages exchanged between adjacent layers to request, indicate, respond to, or confirm services. These primitives include four main types: request primitives issued by a higher layer (N+1) to invoke a service from the lower layer (N); indication primitives sent upward from layer N to layer N+1 to notify of events or incoming service activations; response primitives from layer N+1 to complete a previously indicated service; and confirm primitives from layer N to layer N+1 to acknowledge a requested service outcome. For example, in the transport layer, a T-CONNECT request from the session layer initiates a connection, triggering a T-CONNECT indication at the remote peer's session layer, followed by responses and confirmations to establish the end-to-end link. This primitive-based model ensures reliable interlayer communication and supports both connection-oriented and connectionless services across the OSI stack. Implementations of these interfaces vary by operating system, integrating OSI concepts into kernel-level networking stacks. In , the netfilter framework provides hooks for packet processing at the network layer (layer 3), allowing user-space applications to define rules for filtering, modification, and via tools like or , which inspect headers and enforce policies aligned with OSI network functions. Similarly, the Windows Sockets API (Winsock), an extension of the BSD sockets model, enables access through functions like socket(), connect(), and send(), with support for both IPv4 and protocols, abstracting the OSI services for Windows applications. These OS-specific realizations make OSI-compliant programming practical in real-world environments. As of 2025, modern extensions to OSI programming interfaces incorporate (SDN) controllers, which enable programmable access to multiple layers through centralized APIs like those in or P4, allowing dynamic reconfiguration of network behaviors at layers 2 through 7 via southbound interfaces to switches and northbound APIs for applications. This integration enhances flexibility in and edge environments by decoupling control logic from data planes, supporting OSI-like layering while adding programmability for emerging use cases such as quantum networks.

Comparisons with Other Models

TCP/IP Model

The TCP/IP model, developed as part of the ARPANET project and standardized by the Internet Engineering Task Force (IETF), organizes networking functions into four primary layers: the Network Access (or Link) layer, which handles physical transmission and data framing (mapping to OSI layers 1 and 2); the Internet layer, responsible for logical addressing and routing (OSI layer 3); the Transport layer, which provides end-to-end data delivery (OSI layer 4); and the Application layer, encompassing user interfaces, data formatting, and session management (OSI layers 5 through 7). This structure emerged from practical implementations in the 1970s and 1980s, prioritizing interoperability across diverse hardware. Key protocols in the TCP/IP suite align with these layers through direct mappings to OSI functions: the (IP) operates at the for packet routing and addressing, akin to the OSI ; the (TCP) and (UDP) function at the for reliable or unreliable data transfer, respectively; and application protocols such as Hypertext Transfer Protocol (HTTP) and (FTP) reside in the , integrating session establishment, data presentation, and application-specific logic without separate OSI-style Session or Presentation layers. These mappings highlight how TCP/IP condenses upper-layer responsibilities, allowing protocols like HTTP to handle encryption and formatting inline. In contrast to the OSI model's abstract, seven-layer reference framework designed for theoretical standardization and vendor neutrality, the TCP/IP model adopts a protocol-centric, implementation-driven approach with fewer, more flexible layers, omitting strict boundaries for session and . This pragmatic enabled rapid and deployment, as evidenced by the U.S. Department of Defense's 1983 mandate for TCP/IP adoption across , leading to its dominance in global internetworking by the . The OSI model's detailed layering, while comprehensive, proved overly rigid and resource-intensive, slowing commercial uptake despite international backing from the (ISO). The TCP/IP model's simplicity facilitated its role as the foundation of the modern , supporting scalable growth without the OSI's emphasis on modular protocol development. Today, hybrid approaches prevail in network analysis, where TCP/IP implementations are mapped onto the OSI model to aid troubleshooting, protocol debugging, and educational clarity, leveraging the OSI's structured lens for dissecting TCP/IP behaviors across functions like and application delivery.

Other Networking Frameworks

Systems Network Architecture (SNA), developed by in the 1970s, represents a hierarchical networking framework that contrasts sharply with the OSI model's layered approach. SNA organizes communication into five nested subnetworks—user, transaction, interprocess, subarea, and peripheral—emphasizing centralized control through elements like the System Services Control Point (SSCP) for and session establishment. This hierarchical structure, which evolved from an initial three-layer model in 1974, prioritizes IBM's unified product ecosystem over open , differing from OSI's seven independent layers designed for diverse systems. In SNA, functions such as and session management are tightly coupled across hierarchies, whereas OSI enforces strict layer boundaries to enable modular development. DECnet, Digital Equipment Corporation's proprietary networking suite introduced in the late 1970s, adopted a layered architecture that closely mirrored OSI's structure while remaining vendor-specific, influencing early OSI standardization efforts. Phase IV of DECnet featured eight layers—adding a user layer atop the seven OSI equivalents (Application, Presentation, Session, Transport, Network, Data Link, Physical)—supporting protocols like DDCMP for data link control and adaptive routing at the network layer. Digital's active participation in ISO committees since 1979, including contributions to OSI network layer protocols like ISO 8473, helped shape OSI's design by demonstrating practical layered implementations in proprietary contexts. Unlike OSI's open standards focus, DECnet's proprietary addressing (e.g., limited to 1023 nodes per area) and extensions like the DNA Naming Service optimized for DEC hardware, limiting cross-vendor compatibility until Phase V integrated full OSI compliance. In modern telecommunications, the 5G New Radio (NR) architecture defined by 3GPP maps its protocol stack to OSI layers, adapting OSI principles for high-speed, low-latency wireless environments while introducing service-based paradigms. The physical layer (OSI Layer 1) handles mmWave and massive MIMO transmission; Layer 2 encompasses MAC, RLC, and PDCP for error correction and multiplexing; Layer 3 includes RRC for connection management and IP-based routing; higher layers (4-7) integrate NAS for mobility and application services via SDN-enabled control planes. This mapping, outlined in 3GPP TS 38.300, extends OSI's modularity to support network slicing but diverges by embedding virtualization natively, unlike OSI's hardware-centric assumptions. Cloud networking models like AWS Virtual Private Cloud (VPC) further illustrate this evolution, implementing OSI layers through isolated virtual networks: Layer 1/2 via Elastic Network Interfaces and VPC endpoints for physical/data link abstraction; Layer 3 with route tables and Internet Gateways for IP routing; Layers 4-7 via Elastic Load Balancing and API Gateway for transport and application handling. AWS VPC's software-defined overlays enable scalable isolation, addressing OSI's limitations in multi-tenant environments. Comparisons highlight OSI's universality as a framework against the domain-specific optimizations of alternatives: SNA and DECnet prioritized vendor ecosystems, while and AWS VPC tailor layers for wireless and cloud scalability, respectively. OSI's influence persists in SDN and NFV, where planes decouple from planes across Layers 2-7, enabling programmable that OSI conceptually foreshadowed but did not explicitly support. A key gap in OSI is its absence of native virtualization mechanisms, assuming dedicated hardware per layer; newer frameworks like 5G's network slicing and AWS VPC's overlays integrate hypervisor-based functions to virtualize entire stacks, enhancing flexibility for and multi-tenancy.

References

  1. [1]
    What Is the OSI Model? - 7 OSI Layers Explained - Amazon AWS
    What are the seven layers of the OSI model? · Physical layer · Data link layer · Network layer · Transport layer · Session layer · Presentation layer · Application ...What are the seven layers of... · How does communication...
  2. [2]
    What Is the OSI Model? | IBM
    The Open Systems Interconnection (OSI) model is a conceptual model that divides network communication and interoperability into seven abstract layers.Overview · Where did the OSI model...
  3. [3]
    What is the OSI Model? | Cloudflare
    What are the 7 layers of the OSI Model? · 7. The application layer · 6. The presentation layer · 5. The session layer · 4. The transport layer · 3. The network layer.Network protocol definition · User Datagram Protocol (UDP) · What is ICMP?
  4. [4]
    [PDF] ISO/IEC 7498-1 - Ecma International
    Jun 15, 1996 · 1.1 The purpose of this Reference Model of Open Systems Interconnection is to provide a common basis for the coordination of standards ...
  5. [5]
    What is the OSI Model? The 7 Layers Explained - BMC Software
    Jul 31, 2024 · The Open Systems Interconnection (OSI) model is a conceptual framework that divides network communication into seven abstract layers, providing ...What Is The Osi Model? The 7... · Layer 2: The Data Link Layer · Layer 1: The Physical Layer
  6. [6]
    ISO/IEC 7498-1:1994 - Basic Reference Model
    In stockThe model provides a common basis for the coordination of standards development for the purpose of systems interconnection.Missing: scope | Show results with:scope<|control11|><|separator|>
  7. [7]
    OSI Layers : Definition, Benefits and Components - Motadata
    The OSI model makes network troubleshooting easier by separating faults within individual levels. The layered construction encourages modularity. Each layer ...
  8. [8]
    Internet - University at Albany
    In OSI model, each layer provide services to layer above, and 'consumes' ... Entities in same layer in different machines called peer entities. Page 37 ...
  9. [9]
    OSI: The Internet That Wasn't - IEEE Spectrum
    Jul 29, 2013 · A layered approach: The OSI reference model (left column) divides computer communications into seven distinct layers, from physical media in ...
  10. [10]
    [PDF] ISO Reference Model for Open Systems Interconnection (OSI)
    Oct 11, 2018 · The goal of Open Systems Interconnection (OS!) was designed to enable dissimilar com- puters in multivendor environments to share information ...
  11. [11]
    Xerox Network Systems - Wikipedia
    XNS predated and influenced the development of the Open Systems Interconnection (OSI) networking model, and was very influential in local area networking ...
  12. [12]
    ISO 7498-2:1989 - Information processing systems
    CHF 155.00Provides a general description of security services and related mechanisms, which can be ensured by the Reference Model, and of the positions within the ...Missing: OSI | Show results with:OSI
  13. [13]
    X.290 : OSI conformance testing methodology and framework ... - ITU
    Home : ITU-T : Publications : Recommendations : X Series : X.290 : X.290 (11/ ... Recommendation X.290 (11/88). Approved in 1988-11-25. Status : Superseded ...
  14. [14]
    [PDF] The (Un)Revised OSI Reference Model by John Day
    SC6, the committee responsible for the lower layers, was given the task of revising clauses 7.4 to 7.7, the descriptions of Transport, Network, Data Link, and ...
  15. [15]
    ISO/IEC 7498-4:1989 - Information processing systems
    Open Systems Interconnection — Basic Reference Model — Part 4: Management framework.Missing: OSI | Show results with:OSI
  16. [16]
    [PDF] Guide to Industrial Control Systems (ICS) Security
    ISO 27001 provides a model for establishing, implementing, operating, monitoring, reviewing, ... (OSI) model (ISO/IEC. 7498-1). Some devices, or subsystems, used ...<|control11|><|separator|>
  17. [17]
    2.2 Connectivity - ECS SRIA
    Connectivity and interoperability technologies in ECS enabling business and social benefits are tied to layers 1, 5, and 6 of the OSI model.
  18. [18]
    [PDF] ITU-T Rec. X.200 (07/94) Information technology
    3.1 An architecture, a framework, a multilayer model, a single layer model, a service definition, or a protocol specification consistent with this Basic ...
  19. [19]
    X.200 : Information technology - Open Systems Interconnection - ITU
    Dec 24, 2019 · X.200 : Information technology - Open Systems Interconnection - Basic Reference Model: The basic model. Recommendation X.200. In force ...
  20. [20]
    ISO 7498-2:1989(en), Information processing systems
    OSI security functions are concerned only with those visible aspects of a communications path which permit end systems to achieve the secure transfer of ...
  21. [21]
    ISO/IEC 7498-3:1997 - Open Systems Interconnection
    Open Systems Interconnection — Basic Reference Model: Naming and addressing. Published (Edition 1, 1997).
  22. [22]
    ISO/IEC 7498-3:1997(en), Information technology
    a) defines general mechanisms for the use of names and addresses to identify and locate objects in the OSIE; and. b) defines the use of these mechanisms within ...
  23. [23]
    ISO/IEC 7498-4:1989(en), Information processing systems
    This part of ISO/IEC 7498 establishes a framework for coordinating the development of existing and future standards for OSI Management.
  24. [24]
    [PDF] ITU-T Rec. X.200 (07/94) Information technology
    This Basic Reference Model covers the elements of OSI aspects of these activities which are essential for early development of OSI standards. Page 9. ISO/IEC ...
  25. [25]
    Intro to encapsulation and decapsulation in networking - TechTarget
    Jan 26, 2022 · The OSI model and encapsulation. ISO defined a model for protocols that separates system layers by function: the Open Systems Interconnection ...What Is Encapsulation? · The Osi Model And... · The Tcp/ip Model And...
  26. [26]
    What is OSI Model | 7 Layers Explained - Imperva
    The Open Systems Interconnection (OSI) model describes seven layers that computer systems use to communicate over a network.Transmission Control Protocol · What is Broken Object Level... · What is HTTP/2
  27. [27]
  28. [28]
    IEEE 802.3-2022 - IEEE SA
    Jul 29, 2022 · IEEE 802.3-2022 is the IEEE Standard for Ethernet, specifying speeds from 1 Mb/s to 400 Gb/s using CSMA/CD and various PHYs.
  29. [29]
    Fundamentals of RS-232 Serial Communications - Analog Devices
    Mar 29, 2001 · RS-232 is a complete standard. This means that the standard sets out to ensure compatibility between the host and peripheral systems.Missing: layer | Show results with:layer
  30. [30]
    Framing in Data Link Layer - GeeksforGeeks
    Sep 22, 2025 · In the Data Link Layer (DLL) of the OSI model, framing plays a critical role by dividing the continuous stream of bits into manageable, ...
  31. [31]
    The Structure and Coding of Logical Link Control (LLC) Addresses
    The standards for local area networks (LANs) are generally comprised of the physical layer, the medium access control (MAC) sublayer, and the logical link.
  32. [32]
    Error Detection in Computer Networks - GeeksforGeeks
    Sep 25, 2025 · In CRC, a sequence of redundant bits, called cyclic redundancy check bits, are appended to the end of the data unit so that the resulting data ...Cyclic Redundancy Check(CRC) · Checksum · One's Complement
  33. [33]
    IEEE 802.2c-1997 - IEEE SA
    The functions, features, protocol, and services of the Logical Link Control (LLC) sublayer, which constitutes the top sublayer in the data link layer of the ISO ...
  34. [34]
    Multiple Access Protocols in Computer Network - GeeksforGeeks
    Oct 17, 2025 · Multiple Access Control (MAC): ... Collision Handling: Detection (CSMA/CD) or avoidance (CSMA/CA). Token Passing: Sequential access control.
  35. [35]
    Basic Concepts of the Ethernet Data Link Layer - Huawei Support
    Mar 15, 2025 · CSMA/CD is used in half-duplex mode. Data is sent and received directly in full-duplex mode without having to detect if the line is idle.
  36. [36]
    [PDF] ISO/IEC 7498-l - iTeh Standards
    1.9. Clause 5 describes the general nature of the architecture of the Reference Model; namely that it is layered, what layering means, and the principles used ...<|separator|>
  37. [37]
  38. [38]
    [PDF] ISO/IEC 8602 - iTeh Standards
    Apr 1, 1995 · This Recommendation I International Standard specifies the connectionless-mode transport protocol and provides the PICS Proforma in compliance ...
  39. [39]
    [PDF] The OSI Model: Understanding the Seven Layers of Computer ...
    The ISO (International Organization for Standardization) standard 7498-1 defined this model. This model allows all network elements to operate together, no ...
  40. [40]
    ISO/IEC 8824-1:2021 - Specification of basic notation
    In stockThis document provides a standard notation called Abstract Syntax Notation One (ASN.1) that is used for the definition of data types, values, and constraints ...
  41. [41]
    ISO/IEC 8825-1:2015 - Information technology — ASN.1 encoding ...
    ISO/IEC 8825-1:2015 specifies a set of basic encoding rules that may be used to derive the specification of a transfer syntax for values of types defined ...
  42. [42]
    ISO/IEC 9548-1:1996
    ### Summary of ISO/IEC 9548-1:1996
  43. [43]
    ISO 8571-1:1988(en), Information processing systems
    ISO 8571 defines a basic file service. It provides sufficient facilities to support file transfer, and establishes a framework for file access and file ...
  44. [44]
    X.400 : Message handling services: Message handling system and service overview
    ### Summary of X.400 as an OSI Application Layer Protocol
  45. [45]
    Chapter 7. Sockets | FreeBSD Documentation Portal
    BSD sockets take interprocess communications to a new level. It is no longer necessary for the communicating processes to run on the same machine.
  46. [46]
    Programming With XTI and TLI - Programming Interfaces Guide
    The transport layer of the OSI model (layer 4) is the lowest layer of the model that provides applications and higher layers with end-to-end service. This layer ...
  47. [47]
    xti(7) - filibeto.org
    The X/Open Transport Interface (XTI) specification defines an independent transport-service interface that allows multiple users to communicate at the transport ...
  48. [48]
    G Overview of the OSI Layer and Services Concepts (Informative)
    A request primitive in System A induces an indication primitive in System B. If an indication primitive in System B requires a reply, a response primitive may ...
  49. [49]
    Service Primitives
    Indication: A primitive returned to layer (N + l) from layer N to advise of activation of a requested service or of an action initiated by the layer N service.
  50. [50]
    Understanding OSI - Chapter 2 - Packetizer
    The transport layer has a message used to establish a connection. The corresponding service primitives are the T-CONNECT request and the T-CONNECT indication.
  51. [51]
    Netfilter - ACLs | Cumulus Linux 4.2 - NVIDIA Docs Hub
    Netfilter asserts policies at layers 2, 3 and 4 of the OSI model by inspecting packet and frame headers based on a list of rules. ... Incremental nonatomic ...
  52. [52]
    Introduction to iptables - Dr. Mike Murphy
    Jan 22, 2023 · Netfilter is the code that actually performs packet inspection and filtering, and it can be configured in several different ways. Although newer ...Firewalls and the OSI Model · Functions of a Firewall · iptables
  53. [53]
    Windows Sockets 2 - Win32 apps - Microsoft Learn
    Jan 7, 2021 · Windows Sockets 2 (Winsock) enables programmers to create advanced Internet, intranet, and other network-capable applications to transmit application data ...Missing: OSI | Show results with:OSI<|separator|>
  54. [54]
    Sockets Concepts - Diranieh
    Note how the upper layers of the OSI model are referred to as Windows Sockets Application, while the lower layers form the Network System. The WinSock API (WSA) ...
  55. [55]
    What is software-defined networking SDN)? - TechTarget
    Mar 25, 2025 · SDN abstracts a network's different, distinguishable layers to make it more agile, flexible and easy to manage. Its main goal is to improve ...Missing: OSI | Show results with:OSI
  56. [56]
    OSI Stack Redesign for Quantum Networks - arXiv
    Jun 13, 2025 · This paper presents a comprehensive survey and architectural redesign of the OSI model tailored for quantum networks, particularly within the context of ...
  57. [57]
    TCP/IP Overview - Cisco
    Aug 10, 2005 · Figure 1 shows the TCP/IP protocol suite in relation to the OSI Reference model. Figure 2 shows some of the important Internet protocols and ...
  58. [58]
  59. [59]
    [PDF] OSI And SNA: A Perspective - Bitsavers.org
    Apr 10, 1981 · This paper will discuss similarities and differences between. Systems Network Architecture (SNA) of IBM and the ISO Reference ... this layer ...
  60. [60]
    [PDF] DECnet/OSI - Bitsavers.org
    Apr 4, 2023 · « iSO approvai process. What is OSI? OSi terms. Overview of a layered architecture ... DECnet/OSI Data Link Layer Protocols m DECnet/OSI ...
  61. [61]
    [PDF] 5G Security Challenges and Solutions: A Review by OSI Layers
    OSI provides three additional layers compared to TCP/IP, namely presentation, session, data link, and physical layers.
  62. [62]
    [PDF] 5G End-to-End Architecture Framework - NGMN
    Aug 28, 2019 · As such, the 5G architecture is a native SDN/ NFV architecture covering aspects ranging from endpoint/user equipment, (mobile/ fixed) ...