Posted on 2004-11-26
Last Modified: 2013-11-29
when looking at the  OSI model. what happens between a client and a server when requesting a Web page. Oh! and Why should network architects be concerned  with the OSI Model and data frames.......

Question by:jayrilla4life

    Expert Comment

        The OSI Model is just a matter of logically thinking about how a network, works!  It defines how information should be handled when being transported over a network. It defines how software should interact with the network. It sorts network communication functions and divides it into layers.  It specifies how the boundaries between different layers operate. The model specifies the standard interfaces between the layers.  It specifies that any layer's processes should be invisible to the layer above it, and below it.
         Check out the below links, they should enlighten you on how the osi model, and how networks do what they do.  hope this helps!    --simple descriptions of network layers.    --much more in-depth descriptions and examples of the network layers.,,sid7_gci523729,00.html    --nice graphic showing layers and items that run at a particular layer.

    LVL 5

    Accepted Solution

    why not ?
    Sorry, a more serious answer:
    What is your concern ? As prestonspcworx pointed out in his comment, each layers processes are
    invisible to the layers above, so if you are concerned with web design (http, layer 7) you couldn't
    care less about bits'n'bytes and routers and cabling length limitation. If you are planing a network
    you should know how long each segment can safely get without a repeater (and you can either believe
    the manual or go into deth and study how ethernet collision detction works). Unless you are programming
    at a lowlevel (talking OSI, not your skills :-)) or are very curious to know what's 'under the hood' you
    probably will never have to know anything about data frames.
    On the other hand, when I configured the DSL modem and router for my private home network the
    delivered manual assumed me knowing all that stuff to understand what they were talking about - so
    for once I felt learning this years ago was not in vain :-)
    if you have specific concerns or questions on this, don't hesitate ...


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Maximize Your Threat Intelligence Reporting

    Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

    SSL is a very common protocol used these days when browsing the web.  The purpose is to provide security to communication, but how does it do it?  There are several pieces at work that have to be setup before SSL will even work and it requires both …
    If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
    Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now