How OSI Model Works in Real Life Example? - GeeksforGeeks (2024)

Skip to content

How OSI Model Works in Real Life Example? - GeeksforGeeks (1)

Last Updated : 17 Apr, 2024

Summarize

Comments

Improve

Suggest changes

Like Article

Like

Save

Report

Answer: The OSI model is defined as a framework that helps to understand the network architecture and communication protocols. It provides with the systematic approach for transmission and communication of between the devices connected in the network.

Below are the Real life examples:

Example 1: Ethernet and Local Area Networks

Ethernet is defined as an important element of OSI model that works as a vital backbone of LAN connections. It provides the way to connect networking devices into a single digital system for transmission of data. In the OSI model at physical layer, transmission of signals is done by ethernet cables and reliability of transmission is provided by Data Link Layer.

Example 2: IP Addressing and the Internet

IP addressing works at the network layer of OSI model and transmit the data over internet. A unique identity is being assigned to every device involved in the communication that helps to transmit the data from sender to receiver. The way of communication is being revolutionized through IP addressing and the working of network layer.

Example 3: Email Communication and SMTP

Email communication works on the SMTP protocol. It is a standard protocol for sending and receiving of mail that operates at the Application Layer of OSI model. It provides with efficient transmission of data of email communication. Thus Application Layer provides with efficient interface and services that helps to interact with sender and receivers via SMTP protocol.



Please Login to comment...

Similar Reads

What is OSI Model? - Layers of OSI Model

OSI stands for Open Systems Interconnection , where open stands to say non-proprietary. It is a 7-layer architecture with each layer having specific functionality to perform. All these 7 layers work collaboratively to transmit the data from one person to another across the globe. The OSI reference model was developed by ISO - 'International Organiz

15+ min read

Similarities between TCP/IP model and OSI model

Pre-Requisite: Layers of OSI Model, TCP/IP Model OSI Model or Open Systems Interconnection is an architecture of 7 layers in which each layer has its work to perform whereas TCP/IP is a concise version of the OSI Model. TCP/IP Model consists of 4 layers rather than the 7 layers of the OSI Model. There are so many similarities between the TCP/IP mod

5 min read

This is exactly why we still use the OSI model when we have TCP/IP Model

What is the OSI Model?OSI is an acronym for Open Systems Interconnection. The International Organization for Standardization (ISO) created the OSI model (ISO). It's a model for how applications communicate over the internet. In order to facilitate interoperability between diverse devices and applications, the OSI model describes computing functions

10 min read

Difference Between OSI Model and TCP/IP Model

Data communication is a process or act in which we can send or receive data. Understanding the fundamental structures of networking is crucial for anyone working with computer systems and communication. For data communication two models are available, the OSI (Open Systems Interconnection) Model, and the TCP/IP (Transmission Control Protocol/Intern

5 min read

Critique of OSI Model and Protocols

Open System Interconnection (OSI) model is reference model that is used to describe and explain how does information from software application in one of computers moves freely through physical medium to software application on another computer. This model consists of total of seven layers and each of layers performs specific task or particular netw

4 min read

How Communication happens using OSI model

The Open System Interconnection (OSI) model is a standard “reference model” created by an International Organization for Standardization (ISO) to describe how software and hardware components involved in network communication divide efforts and interact with each other. The OSI model defines a seven-layer set of functional elements, from physical i

4 min read

Physical Layer in OSI Model

The physical Layer is the bottom-most layer in the Open System Interconnection (OSI) Model which is a physical and electrical representation of the system. It consists of various network components such as power plugs, connectors, receivers, cable types, etc. The physical layer sends data bits from one device(s) (like a computer) to another device(

5 min read

Presentation Layer in OSI model

Prerequisite : OSI Model Introduction : Presentation Layer is the 6th layer in the Open System Interconnection (OSI) model. This layer is also known as Translation layer, as this layer serves as a data translator for the network. The data which this layer receives from the Application Layer is extracted and manipulated here as per the required form

6 min read

5 min read

Why Does the OSI Reference Model Matter?

OSI (Open Systems Interconnection) model is a reference model that describes the movement of information between software applications in different computer systems. It is a seven-layered model used in computer networking. It is useful for developing new standards while considering the existing networking standards. With dynamically changing needs

3 min read

Functions of Physical layer in OSI Model

The physical layer is the lowest layer of the OSI model. The physical layer consists of various networking devices such as connectors, receivers, plugs, modems, repeaters, cables, Hubs, etc. The rules and procedures that are defined for interaction between the physical layers are known as physical layer protocols. The physical connections between t

5 min read

Data Link Layer in OSI Model

Below are some common GATE CS topics of data link layer. Carrier Sense Multiple Access (CSMA) Carrier Sense Multiple Access or CSMA method was developed to minimize the probability of collision and thus, to increase the performance. The probability of collision can be minimized if a station senses or reads the medium before trying to use it for sen

3 min read

Transport Layer in OSI Model

The transport layer, or layer 4 of the OSI model, controls network traffic between hosts and end systems to guarantee full data flows. Data volume, destination, and rate are all controlled by transport-layer protocols including TCP, UDP, DCCP, and SCTP. The transport layer is positioned between the network and session layers in the OSI paradigm. Th

7 min read

Which layer of OSI Model is Responsible for Reliable Connections?

Answer: The Transport layer of the OSI model is responsible for reliable connections.Reliable DeliveryThe Transport layer ensures the reliable delivery of data between source and destination hosts, regardless of the underlying network's reliability. Error Detection and CorrectionThe Transport layer uses techniques like checksums and sequence number

1 min read

Network Layer in OSI Model

OSI stands for Open Systems Interconnection. It was developed by the ISO – ‘International Organization for Standardization‘, in the year 1984. It is a 7-layer architecture with each layer having specific functionality to perform. All these 7 layers work collaboratively to transmit the data from one person to another across the globe. What is a Netw

10 min read

OSI Model Full Form in Computer Networking

Introduction : The OSI (Open Systems Interconnection) model is a conceptual framework that defines how computers communicate with each other over a network. It consists of seven layers, each with its own specific function and set of protocols. Starting from the bottom, the first layer is the physical layer, which deals with the physical aspects of

5 min read

Working of ISO-OSI Model

The ISO-OSI (International organization of Standardization - Open System Interconnection) says to group together the functions which are related to each other. The Functions in OSI Model that are needed for proper communication can be divided into 2 types :- 1. Mandatory Functions: Here the implementation of the functions is not optional, i.e., it

7 min read

Application Layer in OSI Model

The Application Layer of OSI (Open System Interconnection) model, is the top layer in this model and takes care of network communication. The application layer provides the functionality to send and receive data from users. It acts as the interface between the user and the application. The application provides services like file transmission, mail

8 min read

Examples of TCP and UDP in Real Life

Today we will see the Real-Life Examples of TCP and UDP in Computer Networks Before looking at the Real-Life Examples of TCP and UDP, Let's see What is Computer Network? A Computer Network is a set of devices (Nodes) that are connected to each other by communication links to share digital information.The communication links can either be wireless m

8 min read

OSI, TCP/IP and Hybrid Models

OSI Model is developed by International Organization for Standardization or ISO, the Open Systems Interconnection model or OSI model is a critical building block in networking. OSI Model helps in troubleshooting and understanding networks because of the layered approach that it follows. It consists of seven layers in which each layer has its functi

4 min read

OSI Full Form

The Open System Interconnection (OSI) Reference Modelwas created as the first step towards the standardization of protocols by the International Standards Organization (ISO) in 1984. It is also called as the OSI Seven Layer Model as it divides the network architecture into seven distinct layers. Characteristics : The OSI model has layered architec

2 min read

OSI Security Architecture

The OSI Security Architecture is internationally recognized and provides a standardized technique for deploying security measures within an organization. It focuses on three major concepts: security attacks, security mechanisms, and security services, which are criticalin protecting data and communication processes. In this article, we will discus

8 min read

How message authentication code works?

Prerequisite - Message authentication codes Apart from intruders, the transfer of message between two people also faces other external problems like noise, which may alter the original message constructed by the sender. To ensure that the message is not altered there's this cool method MAC. MAC stands for Message Authentication Code. Here in MAC, s

2 min read

Ransomware Explained: How It Works And How To Prevent It

According to Cybersecurity Ventures, the rise in ransomware attacks is expected to cost companies $20 billion by 2021. Nowadays, ransomware attacks are on the rise, and the most common type of attack is phishing. Ransomware attackers can infect victims' PCs with viruses through email phishing and other methods, resulting in data encryption and subs

6 min read

How DORA Works?

Dynamic Host Configuration Protocol(DHCP) uses the DORA. Dynamic Host Configuration Protocol is the protocol of the application layer. It is used to provide Subnet Mask, Router Address, DNS Address, and Vendor Class Identifier. In fact, DHCP provides an automatic IP address to Hosts which want to connect to a network. DORA is the process that is us

4 min read

How Does BOOTP Works?

Prerequisite: Bootstrap Protocol The BOOTP protocol is a networking protocol, the main goal of BOOTP is to find IP addresses from a server. It was developed to replace the RARP. BOOTP was designed to let systems discover what they need to function correctly after booting up. It uses a relay agent which listens to port 68 of UDP, which lets the loca

3 min read

How BPDU is Generated and How BPDU Works?

Before starting our topic we have to know about some basic things about computer networks and the role of BPDU in computer networks: What is Computer Networks?Types of Computer Networks.What is BPDU?Computer networks are a procedure of connecting devices such as laptops, desktops, smartphones, servers, and various IoT devices such as cameras, doorb

4 min read

What is Network Hub and How it Works?

Hub in networking plays a vital role in data transmission and broadcasting. A hub is a hardware device used at the physical layer to connect multiple devices in the network. Hubs are widely used to connect LANs. A hub has multiple ports. Unlike a switch, a hub cannot filter the data, i.e. it cannot identify the destination of the packet, So it broa

6 min read

How does FTP Server Works?

Answer: An FTP server works by listening on a network for connection requests from FTP clients, allowing users to upload, download, and manage files on the server.An FTP (File Transfer Protocol) server operates as a central file storage location that can be accessed over a network using FTP, a standard network protocol: Listening for Connections: T

2 min read

How Does Concept of "Redirection" Works in ICMP?

Answer: ICMP redirection is used to inform a host to update its routing table to send packets through a more efficient route for a given destination.TriggerWhen a host sends a packet to a destination, but the router identifies a better route through another router, it triggers the redirection process. ICMP Redirection MessageThe router sends an ICM

1 min read

We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our Cookie Policy & Privacy Policy

How OSI Model Works in Real Life Example? - GeeksforGeeks (4)

'); $('.spinner-loading-overlay').show(); jQuery.ajax({ url: writeApiUrl + 'create-improvement-post/?v=1', type: "POST", contentType: 'application/json; charset=utf-8', dataType: 'json', xhrFields: { withCredentials: true }, data: JSON.stringify({ gfg_id: post_id, check: true }), success:function(result) { jQuery.ajax({ url: writeApiUrl + 'suggestions/auth/' + `${post_id}/`, type: "GET", dataType: 'json', xhrFields: { withCredentials: true }, success: function (result) { $('.spinner-loading-overlay:eq(0)').remove(); var commentArray = result; if(commentArray === null || commentArray.length === 0) { // when no reason is availaible then user will redirected directly make the improvment. // call to api create-improvement-post $('body').append('

'); $('.spinner-loading-overlay').show(); jQuery.ajax({ url: writeApiUrl + 'create-improvement-post/?v=1', type: "POST", contentType: 'application/json; charset=utf-8', dataType: 'json', xhrFields: { withCredentials: true }, data: JSON.stringify({ gfg_id: post_id, }), success:function(result) { $('.spinner-loading-overlay:eq(0)').remove(); $('.improve-modal--overlay').hide(); $('.unlocked-status--improve-modal-content').css("display","none"); $('.create-improvement-redirection-to-write').attr('href',writeUrl + 'improve-post/' + `${result.id}` + '/', '_blank'); $('.create-improvement-redirection-to-write')[0].click(); }, error:function(e) { $('.spinner-loading-overlay:eq(0)').remove(); var result = e.responseJSON; if(result.detail.non_field_errors.length){ $('.improve-modal--improve-content .improve-modal--improve-content-modified').text(`${result.detail.non_field_errors}.`); jQuery('.improve-modal--overlay').show(); jQuery('.improve-modal--improvement').show(); $('.locked-status--impove-modal').css("display","block"); $('.unlocked-status--improve-modal-content').css("display","none"); $('.improve-modal--improvement').attr("status","locked"); $('.improvement-reason-modal').hide(); } }, }); return; } var improvement_reason_html = ""; for(var comment of commentArray) { // loop creating improvement reason list markup var comment_id = comment['id']; var comment_text = comment['suggestion']; improvement_reason_html += `

${comment_text}

`; } $('.improvement-reasons_wrapper').html(improvement_reason_html); $('.improvement-bottom-btn').html("Create Improvement"); $('.improve-modal--improvement').hide(); $('.improvement-reason-modal').show(); }, error: function(e){ $('.spinner-loading-overlay:eq(0)').remove(); // stop loader when ajax failed; }, }); }, error:function(e) { $('.spinner-loading-overlay:eq(0)').remove(); var result = e.responseJSON; if(result.detail.non_field_errors.length){ $('.improve-modal--improve-content .improve-modal--improve-content-modified').text(`${result.detail.non_field_errors}.`); jQuery('.improve-modal--overlay').show(); jQuery('.improve-modal--improvement').show(); $('.locked-status--impove-modal').css("display","block"); $('.unlocked-status--improve-modal-content').css("display","none"); $('.improve-modal--improvement').attr("status","locked"); $('.improvement-reason-modal').hide(); } }, }); } else { if(loginData && !loginData.isLoggedIn) { $('.improve-modal--overlay').hide(); if ($('.header-main__wrapper').find('.header-main__signup.login-modal-btn').length) { $('.header-main__wrapper').find('.header-main__signup.login-modal-btn').click(); } return; } } }); $('.left-arrow-icon_wrapper').on('click',function(){ if($('.improve-modal--suggestion').is(":visible")) $('.improve-modal--suggestion').hide(); else{ $('.improvement-reason-modal').hide(); } $('.improve-modal--improvement').show(); }); function loadScript(src, callback) { var script = document.createElement('script'); script.src = src; script.onload = callback; document.head.appendChild(script); } function suggestionCall() { var suggest_val = $.trim($("#suggestion-section-textarea").val()); var array_String= suggest_val.split(" ") var gCaptchaToken = $("#g-recaptcha-response-suggestion-form").val(); var error_msg = false; if(suggest_val != "" && array_String.length >=4){ if(suggest_val.length <= 2000){ var payload = { "gfg_post_id" : `${post_id}`, "suggestion" : `

${suggest_val}

`, } if(!loginData || !loginData.isLoggedIn) // User is not logged in payload["g-recaptcha-token"] = gCaptchaToken jQuery.ajax({ type:'post', url: "https://apiwrite.geeksforgeeks.org/suggestions/auth/create/", xhrFields: { withCredentials: true }, crossDomain: true, contentType:'application/json', data: JSON.stringify(payload), success:function(data) { jQuery('.spinner-loading-overlay:eq(0)').remove(); jQuery('#suggestion-section-textarea').val(""); jQuery('.suggest-bottom-btn').css("display","none"); // Update the modal content const modalSection = document.querySelector('.suggestion-modal-section'); modalSection.innerHTML = `

Thank You!

Your suggestions are valuable to us.

You can now also contribute to the GeeksforGeeks community by creating improvement and help your fellow geeks.

`; }, error:function(data) { jQuery('.spinner-loading-overlay:eq(0)').remove(); jQuery('#suggestion-modal-alert').html("Something went wrong."); jQuery('#suggestion-modal-alert').show(); error_msg = true; } }); } else{ jQuery('.spinner-loading-overlay:eq(0)').remove(); jQuery('#suggestion-modal-alert').html("Minimum 5 Words and Maximum Character limit is 2000."); jQuery('#suggestion-modal-alert').show(); jQuery('#suggestion-section-textarea').focus(); error_msg = true; } } else{ jQuery('.spinner-loading-overlay:eq(0)').remove(); jQuery('#suggestion-modal-alert').html("Enter atleast four words !"); jQuery('#suggestion-modal-alert').show(); jQuery('#suggestion-section-textarea').focus(); error_msg = true; } if(error_msg){ setTimeout(() => { jQuery('#suggestion-section-textarea').focus(); jQuery('#suggestion-modal-alert').hide(); }, 3000); } } document.querySelector('.suggest-bottom-btn').addEventListener('click', function(){ jQuery('body').append('

'); jQuery('.spinner-loading-overlay').show(); if(loginData && loginData.isLoggedIn) { suggestionCall(); return; } // load the captcha script and set the token loadScript('https://www.google.com/recaptcha/api.js?render=6LdMFNUZAAAAAIuRtzg0piOT-qXCbDF-iQiUi9KY',[], function() { setGoogleRecaptcha(); }); }); $('.improvement-bottom-btn.create-improvement-btn').click(function() { //create improvement button is clicked $('body').append('

'); $('.spinner-loading-overlay').show(); // send this option via create-improvement-post api jQuery.ajax({ url: writeApiUrl + 'create-improvement-post/?v=1', type: "POST", contentType: 'application/json; charset=utf-8', dataType: 'json', xhrFields: { withCredentials: true }, data: JSON.stringify({ gfg_id: post_id }), success:function(result) { $('.spinner-loading-overlay:eq(0)').remove(); $('.improve-modal--overlay').hide(); $('.improvement-reason-modal').hide(); $('.create-improvement-redirection-to-write').attr('href',writeUrl + 'improve-post/' + `${result.id}` + '/', '_blank'); $('.create-improvement-redirection-to-write')[0].click(); }, error:function(e) { $('.spinner-loading-overlay:eq(0)').remove(); var result = e.responseJSON; if(result.detail.non_field_errors.length){ $('.improve-modal--improve-content .improve-modal--improve-content-modified').text(`${result.detail.non_field_errors}.`); jQuery('.improve-modal--overlay').show(); jQuery('.improve-modal--improvement').show(); $('.locked-status--impove-modal').css("display","block"); $('.unlocked-status--improve-modal-content').css("display","none"); $('.improve-modal--improvement').attr("status","locked"); $('.improvement-reason-modal').hide(); } }, }); });

How OSI Model Works in Real Life Example? - GeeksforGeeks (2024)
Top Articles
How to Make Money From Renting Out a Property | Avail
20 things You Can Do to Save Gas While Driving
Was ist ein Crawler? | Finde es jetzt raus! | OMT-Lexikon
Gabriel Kuhn Y Daniel Perry Video
The Ivy Los Angeles Dress Code
Craigslist Portales
5 Bijwerkingen van zwemmen in een zwembad met te veel chloor - Bereik uw gezondheidsdoelen met praktische hulpmiddelen voor eten en fitness, deskundige bronnen en een betrokken gemeenschap.
Phenix Food Locker Weekly Ad
Craigslist Estate Sales Tucson
123Moviescloud
Breakroom Bw
Huge Boobs Images
Mary Kay Lipstick Conversion Chart PDF Form - FormsPal
Pac Man Deviantart
Unity - Manual: Scene view navigation
My Homework Lesson 11 Volume Of Composite Figures Answer Key
Nordstrom Rack Glendale Photos
라이키 유출
2021 Volleyball Roster
Www.patientnotebook/Atic
Living Shard Calamity
Boxer Puppies For Sale In Amish Country Ohio
Violent Night Showtimes Near Amc Dine-In Menlo Park 12
Beaufort 72 Hour
Kimoriiii Fansly
Bj타리
Delete Verizon Cloud
Best Restaurants Ventnor
Sony Wf-1000Xm4 Controls
Ff14 Sage Stat Priority
Chicago Pd Rotten Tomatoes
Wake County Court Records | NorthCarolinaCourtRecords.us
Lil Durk's Brother DThang Killed in Harvey, Illinois, ME Confirms
Hattie Bartons Brownie Recipe
RUB MASSAGE AUSTIN
Texas Baseball Officially Releases 2023 Schedule
拿到绿卡后一亩三分地
The Syracuse Journal-Democrat from Syracuse, Nebraska
Oxford House Peoria Il
B.C. lightkeepers' jobs in jeopardy as coast guard plans to automate 2 stations
Shuaiby Kill Twitter
Gt500 Forums
Tunica Inmate Roster Release
Das schönste Comeback des Jahres: Warum die Vengaboys nie wieder gehen dürfen
Erespassrider Ual
Solving Quadratics All Methods Worksheet Answers
Sams La Habra Gas Price
Grandma's Portuguese Sweet Bread Recipe Made from Scratch
O.c Craigslist
Bones And All Showtimes Near Emagine Canton
Ingersoll Greenwood Funeral Home Obituaries
Latest Posts
Article information

Author: Jeremiah Abshire

Last Updated:

Views: 5958

Rating: 4.3 / 5 (54 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Jeremiah Abshire

Birthday: 1993-09-14

Address: Apt. 425 92748 Jannie Centers, Port Nikitaville, VT 82110

Phone: +8096210939894

Job: Lead Healthcare Manager

Hobby: Watching movies, Watching movies, Knapping, LARPing, Coffee roasting, Lacemaking, Gaming

Introduction: My name is Jeremiah Abshire, I am a outstanding, kind, clever, hilarious, curious, hilarious, outstanding person who loves writing and wants to share my knowledge and understanding with you.