DEV Community

Harsh Mishra
Harsh Mishra

Posted on

OSI Model Layers and Protocols: Computer Networks

The Complete Guide to OSI Model Layers and Protocols

The OSI (Open Systems Interconnection) model is the foundation for understanding how data is transmitted across networks. It consists of seven layers, each serving a specific function and associated with various protocols. This article provides an exhaustive list of all OSI layers and their commonly used protocols, helping developers, network engineers, and tech enthusiasts deepen their understanding of network communication.


1. Physical Layer (Layer 1)

Purpose: Responsible for transmitting raw bits over a physical medium (like cables or wireless).

Key Protocols and Technologies:

  • Ethernet (Physical layer standards, e.g., IEEE 802.3)
  • Wi-Fi (Physical aspects of IEEE 802.11)
  • Bluetooth
  • DSL (Digital Subscriber Line)
  • ISDN (Integrated Services Digital Network)
  • Optical Fiber
  • Coaxial Cable
  • Infrared Communication
  • RS-232 (Serial Communication Standard)
  • SONET (Synchronous Optical Network)
  • PON (Passive Optical Network)

2. Data Link Layer (Layer 2)

Purpose: Handles reliable transmission of data frames between nodes.

Key Protocols:

  • Ethernet (IEEE 802.3)
  • Wi-Fi (Data Link layer aspects of IEEE 802.11)
  • PPP (Point-to-Point Protocol)
  • HDLC (High-Level Data Link Control)
  • ARP (Address Resolution Protocol)
  • RARP (Reverse Address Resolution Protocol)
  • MPLS (Multiprotocol Label Switching)
  • Frame Relay
  • ATM (Asynchronous Transfer Mode)
  • Token Ring
  • FDDI (Fiber Distributed Data Interface)
  • LLDP (Link Layer Discovery Protocol)
  • VLAN (Virtual Local Area Network, IEEE 802.1Q)

3. Network Layer (Layer 3)

Purpose: Manages routing, addressing, and packet forwarding.

Key Protocols:

  • IP (Internet Protocol - IPv4 and IPv6)
  • ICMP (Internet Control Message Protocol)
  • IGMP (Internet Group Management Protocol)
  • IPsec (Internet Protocol Security)
  • RIP (Routing Information Protocol)
  • OSPF (Open Shortest Path First)
  • BGP (Border Gateway Protocol)
  • EIGRP (Enhanced Interior Gateway Routing Protocol)
  • IS-IS (Intermediate System to Intermediate System)
  • GRE (Generic Routing Encapsulation)
  • NAT (Network Address Translation)

4. Transport Layer (Layer 4)

Purpose: Ensures reliable or best-effort transmission between hosts.

Key Protocols:

  • TCP (Transmission Control Protocol)
  • UDP (User Datagram Protocol)
  • SCTP (Stream Control Transmission Protocol)
  • DCCP (Datagram Congestion Control Protocol)
  • RSVP (Resource Reservation Protocol)
  • QUIC (Quick UDP Internet Connections)
  • RTP (Real-time Transport Protocol)

5. Session Layer (Layer 5)

Purpose: Manages sessions and connections between applications.

Key Protocols:

  • NetBIOS (Network Basic Input/Output System)
  • PPTP (Point-to-Point Tunneling Protocol)
  • RPC (Remote Procedure Call)
  • SOCKS (Socket Secure)
  • TLS/SSL (Transport Layer Security/Secure Sockets Layer)
  • AppleTalk Session Protocols

6. Presentation Layer (Layer 6)

Purpose: Ensures data is in a usable format and handles encryption, compression, and translation.

Key Protocols:

  • TLS/SSL (Transport Layer Security/Secure Sockets Layer)
  • JPEG (Image Compression)
  • GIF, PNG (Image Formats)
  • MPEG, MP3 (Media Formats)
  • ASCII, EBCDIC (Character Encoding)
  • XML, JSON (Data Serialization Formats)
  • XDR (External Data Representation)
  • HTML, CSS (Presentation Formats)

7. Application Layer (Layer 7)

Purpose: Provides services for end-user applications and network access.

Key Protocols:

  • HTTP/HTTPS (Hypertext Transfer Protocol)
  • FTP (File Transfer Protocol)
  • SFTP (Secure File Transfer Protocol)
  • SMTP (Simple Mail Transfer Protocol)
  • IMAP (Internet Message Access Protocol)
  • POP3 (Post Office Protocol v3)
  • DNS (Domain Name System)
  • DHCP (Dynamic Host Configuration Protocol)
  • SNMP (Simple Network Management Protocol)
  • Telnet
  • SSH (Secure Shell)
  • LDAP (Lightweight Directory Access Protocol)
  • NTP (Network Time Protocol)
  • TFTP (Trivial File Transfer Protocol)
  • WHOIS
  • IRC (Internet Relay Chat)

Mapping the Protocols to Layers

Here’s a quick summary of where these protocols fit:

Layer Key Protocols
Physical Ethernet, Wi-Fi, Bluetooth, RS-232, DSL, SONET
Data Link Ethernet, Wi-Fi, PPP, HDLC, ARP, MPLS, Frame Relay, ATM
Network IP, ICMP, IGMP, RIP, OSPF, BGP, EIGRP, NAT, GRE
Transport TCP, UDP, SCTP, DCCP, RSVP, QUIC
Session NetBIOS, PPTP, RPC, SOCKS, TLS/SSL
Presentation JPEG, GIF, PNG, MPEG, MP3, ASCII, XML, JSON, HTML
Application HTTP/HTTPS, FTP, SMTP, IMAP, DNS, DHCP, SNMP, SSH, NTP, LDAP

This detailed list not only highlights must-hear protocols but also clarifies how each protocol plays a role in enabling seamless communication between devices. Understanding these layers and protocols is essential for diagnosing issues, optimizing performance, or designing robust network systems.

Top comments (0)