Module 1 of 21 · Foundations

What network models are for

15 min read 3 outcomes Interactive quiz + diagram

By the end of this module you will be able to:

  • Explain why layered models exist and what problem they were built to solve
  • Tell the difference between the OSI reference model and the Internet architecture without forcing a perfect match
  • Name the first communication function to check when a service stops working

1.1 What a reference model actually is

Think of a reference model like an architectural blueprint for a building. The blueprint does not build the building. It gives every contractor (electricians, plumbers, structural engineers) a shared plan so they can work independently without breaking each other's work.

A network reference model works the same way. It splits communication into layers, where each layer has one job. The layer that moves electrical signals along a cable does not need to know about web browsers. The layer that handles web requests does not need to worry about voltage levels on the wire.

Before ISO published the OSI model in 1984, every major vendor (IBM, DEC, Honeywell) had its own proprietary networking system. If you learned IBM's SNA, that knowledge was useless when you sat down in front of DEC's DECnet. There was no shared vocabulary for asking "which part of the communication broke?"

The purpose of this International Standard is to provide a common basis for the coordination of standards development for the purpose of systems interconnection, while allowing existing standards to be placed into perspective within the overall Reference Model.

ISO/IEC 7498-1:1994 - Clause 1, Scope

Separate teams needed to design protocols for different parts of the communication stack without stepping on each other. The model gave them a coordination framework. It was never meant to be deployed as software.

Hubert Zimmermann, the original architect, published six principles for deciding where one layer should end and the next should begin. He wrote these in a 1980 IEEE paper, four years before the model was formally published:

Create a boundary at a point where the description of services can be small and the number of interactions across the boundary is minimised.

Zimmermann, 1980 - IEEE Trans. Comm., COM-28(4):425-432

Seven layers came from this principle. Each boundary had to be narrow enough that you could change the implementation on one side without redesigning the other. Three layers would have been too few (too many responsibilities per layer). Fifteen would have been too many (too much overhead crossing boundaries).

You do not deploy the OSI model. You use it to describe what you deployed. It is a shared vocabulary, not a wiring diagram.

1.2 How the seven layers fit together

Each layer in the OSI model has a specific responsibility. Data starts at the top (Application layer, where a user clicks "send") and moves down through each layer, picking up headers along the way. On the receiving end, the process reverses. Each layer strips its header and passes the data up.

Here is a quick summary. We will cover each layer in more detail in Module 1.4.

Layer 7, Application. Where software talks to the network. Your browser, email client, or API call lives here. Protocols: HTTP, SMTP, DNS.

Layer 6, Presentation. Handles data formatting, encryption, and compression. Think: "Is this JSON or XML? Is it encrypted with TLS?"

Layer 5, Session. Manages ongoing conversations between two systems. Example: keeping a WebSocket connection alive so messages flow both ways.

Layer 4, Transport. Responsible for reliable delivery between two endpoints. TCP guarantees delivery and ordering. UDP skips those guarantees for speed.

Layer 3, Network. Handles addressing and routing across networks. IP addresses live here. Routers operate at this layer, deciding which path a packet takes.

Layer 2, Data Link. Moves data between devices on the same local network segment. MAC addresses (the hardware addresses burned into your network card) operate here. Switches work at this layer.

Layer 1, Physical. The actual electrical signals, light pulses, or radio waves on the wire, fibre, or air. Cables, connectors, and voltage levels.

The diagram below shows why each layer exists. Click or tap any layer to see what it does and which real protocols operate there.

1.3 Two models, one reality

OSI defines seven layers. The Internet (TCP/IP) uses four. People sometimes treat these as rivals, but they describe the same underlying communication at different levels of detail.

OSI came from a standards body (ISO) trying to create a universal framework. TCP/IP came from researchers (DARPA) building a working network. OSI won the vocabulary. TCP/IP won the deployment. Both survived because they do different jobs.

The Application Layer of the Internet suite essentially combines the functions of the top two layers, Presentation and Session, of the OSI reference model.

RFC 1122 - Section 1.1.3, Internet Protocol Suite

The Internet designers did not create separate layers for session management and data formatting. Application protocols like HTTP handle those functions internally. The functions still exist, but they sit inside the application layer rather than getting their own layers.

When you troubleshoot a live system, you typically use the four-layer Internet model because it matches how protocols are actually implemented. When you need to describe a responsibility precisely ("this is a transport-layer function"), OSI vocabulary is more specific.

Good engineers use both depending on context, the same way a builder might use metric drawings for structural work and imperial for plumbing fittings. Knowing when to use which model matters more than memorising either one.

Common misconception

TCP/IP replaced the OSI model.

TCP/IP is a set of protocols you run on real networks. OSI is a reference framework you use to describe what those protocols do. You use TCP/IP protocols and describe their behaviour using OSI vocabulary. CompTIA Network+ N10-009 (Objective 1.1) tests both, because both are useful in practice.

Common misconception

The Session and Presentation layers do not exist in modern networking.

The functions exist under different names. HTTP persistent connections and WebSocket handle session management. TLS handles encryption and formatting (presentation). JSON, XML, and Protocol Buffers are presentation-layer data formats. The dedicated layers are gone, but the work they described still happens.

1.4 When layers fail each other

On August 30, 2020, CenturyLink (now Lumen Technologies) had a five-hour outage that took down Amazon, Twitter, Microsoft, Cloudflare, Reddit, Hulu, and Discord.

The root cause was one badly written Flowspec rule. Flowspec is a BGP extension that lets engineers distribute firewall rules across a network using the same protocol that handles routing (BGP, or Border Gateway Protocol, the system that tells routers how to reach different networks).

The rule was too broad. It matched BGP traffic itself. So every router that received the rule immediately blocked its own BGP connections. When BGP dropped, the routers stopped receiving the bad rule, so BGP came back. When BGP restored, the rule propagated again, and BGP dropped again. A persistent on-off loop across the entire network.

Users saw websites go unreachable (Layer 7). The actual problem was a routing configuration at Layer 3 destroying the protocol that carried it. Without understanding the layer separation, the oscillating pattern makes no sense. With it, the explanation is straightforward: a Layer 3 control-plane function was carrying a rule that killed Layer 3 itself.

Symptoms almost always show up one or two layers away from the actual cause. A user sees "website unreachable." The real problem might be DNS, routing, TLS, or a physical cable. A model gives you the vocabulary to trace backwards.

1.6 Where to start when something breaks

When a service fails, resist the urge to guess. Instead, identify the first communication function that stopped working.

A web request goes through these steps, in order:

1. The browser asks DNS for an IP address.
2. The operating system opens a TCP connection to that IP address.
3. TLS negotiates encryption (for HTTPS sites).
4. HTTP sends the actual request and receives a response.

Each step depends on the one before it. If DNS fails, nothing else can happen. If TCP connects but TLS fails, you know the problem is between Layer 4 and Layer 6.

Start at the top (can you resolve the domain name?) and work down. The first function that fails is where your investigation begins.

Compare these two statements from the same incident:

"The website is down."

"DNS resolution for this domain returns SERVFAIL from three different resolvers, which suggests the authoritative nameserver is unreachable."

Both people noticed the same symptom. Only the second person told you something you can act on. That is what a model gives you.

Key takeaways

  • A reference model splits communication into layers so that teams can build and troubleshoot each part independently.
  • OSI gives you precise vocabulary for describing responsibilities. TCP/IP matches how real protocols are implemented. You need both.
  • Symptoms almost always appear one or two layers away from the real cause. Trace backwards.
  • When a service fails, name the first communication function that stopped. That is where you start.

Standards and sources cited in this module

  1. ISO/IEC 7498-1:1994, Open Systems Interconnection Basic Reference Model

    Clause 1 (Scope) and Clause 5 (Architecture principles)

    Defines why layered models exist and the criteria for placing layer boundaries. Quoted in Section 1.1 to establish the purpose of the model.

  2. Zimmermann, H. (1980). OSI Reference Model

    IEEE Transactions on Communications, COM-28(4):425-432

    The original design paper with six principles for determining layer boundaries. Quoted in Section 1.1 to explain why there are seven layers.

  3. RFC 1122, Requirements for Internet Hosts: Communication Layers

    Section 1.1.3, Internet Protocol Suite

    Defines the four-layer Internet architecture. Quoted in Section 1.3 to show how TCP/IP maps to OSI and where the models diverge.

  4. CompTIA Network+ N10-009 Exam Objectives

    Domain 1.0, Objective 1.1: OSI reference model

    Current certification standard for networking professionals. Referenced to show that both OSI and TCP/IP knowledge are expected in industry.

  5. Cloudflare Blog: Understanding How Facebook Disappeared from the Internet

    Published October 4, 2021

    Independent technical analysis of the Facebook/Meta outage. Used as the opening case study (Section 1.1) to show cross-layer failure cascading.

  6. Cloudflare Blog: Analysis of Today's CenturyLink/Level(3) Outage

    Published August 30, 2020

    Independent analysis of the BGP Flowspec loop. Used in Section 1.4 to show a control-plane function destroying its own infrastructure.

You now know why layered models exist and how to use them to describe failures precisely. The next module shows what actually happens inside each layer when data moves down the stack: encapsulation turns your application data into frames on the wire, and each header tells the next device what to do.

Module 1 of 21 in Foundations