<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Dev by Mbithe]]></title><description><![CDATA[Dev by Mbithe]]></description><link>https://mbithe.dev</link><generator>RSS for Node</generator><lastBuildDate>Sun, 19 Apr 2026 08:59:26 GMT</lastBuildDate><atom:link href="https://mbithe.dev/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[Unveiling the OSI Model: Mapping Key Applications for Backend Engineers.]]></title><description><![CDATA[This article explores the critical applications within the OSI model and their specific placement, providing valuable insights for backend engineers and anyone involved in building backend applications.
It aims to demystify the processes behind the s...]]></description><link>https://mbithe.dev/unveiling-the-osi-model-mapping-key-applications-for-backend-engineers</link><guid isPermaLink="true">https://mbithe.dev/unveiling-the-osi-model-mapping-key-applications-for-backend-engineers</guid><dc:creator><![CDATA[Fiona Mbithe]]></dc:creator><pubDate>Thu, 28 Aug 2025 21:57:57 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/vIQDv6tUHYk/upload/9f1a21e5429b0c47c4c37924c22b1943.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This article explores the critical applications within the OSI model and their specific placement, providing valuable insights for backend engineers and anyone involved in building backend applications.</p>
<p>It aims to demystify the processes behind the scenes, such as client-server interactions, segmentation, routing, and APIs, enhancing understanding of what occurs beyond the user interface.</p>
<h2 id="heading-client-server-architecture">Client-server architecture.</h2>
<p>This model essentially separates applications into two components(client and server) and allows them to communicate with each other over a network.</p>
<p>The Client is the user’s device(the request side). It sends requests for data, services or resources. It handles the user interface and local processing but relies on the server for heavier operations.</p>
<p>The Server listens for incoming requests, processes them and prepares a logical response. It manages the database, files and beefy/complex computations.</p>
<p>The process:</p>
<ol>
<li><p>The client sends a request via network protocol(HTTP)</p>
</li>
<li><p>The server receives a request and prepares a response.</p>
</li>
<li><p>Sends back results(response) to the client</p>
</li>
<li><p>Connection management( Is it stateless, Independent, eg HTTPS, or is it stateful, maintaining session data, like using a gaming server)</p>
</li>
</ol>
<h3 id="heading-benefits">Benefits</h3>
<h2 id="heading-different-applications">Different applications</h2>
<ol>
<li><h3 id="heading-switch">Switch</h3>
<p> <img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1756298252114/8497c9fb-e1ef-47b8-9642-37d5004c5b45.jpeg" alt class="image--center mx-auto" /></p>
</li>
</ol>
<p>The client, in most cases, isn’t connected to the server directly; devices such as the switch and router forward packets to the intended destination(Server).</p>
<p>The switch receives the data frames, looks up the destination MAC address in its table and forwards it directly to the server. If the server is on a different network, the switch forwards the frame to a router for further routing.</p>
<ol start="2">
<li><h3 id="heading-router">Router</h3>
<p> It examines the destination IP address, checks its routing table and forwards the packet to the destination network. It ensures the client’s request reaches the correct server and the server’s response returns to the client.</p>
</li>
<li><h3 id="heading-synack">SYN/ACK</h3>
<p> SYN/ACK is also another good and practical example; it is basically a Three-way handshake in TCP. It occurs in the Transport layer, meaning no session is formed if the handshake is not complete.</p>
<p> Having no session means that no data transfer occurs, no communication is formed, and no connection is established.</p>
<p> The switch delivers frames containing TCP SYN, SYN/ACK and ACK packets in the same network, while the router delivers IP packets containing TCP SYN, SYN/ACK and ACK segments between different networks.</p>
</li>
<li><h3 id="heading-firewall">Firewall</h3>
<p> There are different types of Firewalls, some function in Layer 3, some in Layer 4 and more complex ones in Layer 7. All of them monitor and control inbound and outbound network traffic based on their set rules. Focusing on the Layer 4 one, it inspects TCP/UDP headers like Port numbers and TCP flags(SYN/ACK).</p>
<p> This enables it to protect the server from SYN flood Protection, which occurs when the attacker sends numerous SYN packets without finishing the connections. It therefore limits the rate of SYN packets being received. A firewall also protects users by using Port filtering, which allows or blocks traffic based on the destination port. It can block port 3389(RDP), block port 22(SSH)or allow 443(HTTPS).</p>
<p> Another is connection tracking, where the firewall only allows legitimate TCP connections (Complete SYN/ACK), thus protecting the server from unauthorised access.</p>
</li>
</ol>
<h3 id="heading-load-balancer">Load balancer</h3>
<p>The load balancer is basically a traffic manager. It ensures incoming network traffic is distributed to available servers. This prevents server overload, thus providing scalability, reliability and top-notch performance. It operates in Layer 7, as it requires interaction with application-layer protocols, such as HTTPS, to perform various functions.</p>
<p>This includes content-based routing, where traffic is routed based on application-layer data, such as file transfers, emails, and APIs. It also allows decryption of SSL/TLS encryption, thus improving the server’s performance.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1756561172909/1b5cda18-9655-4522-8b63-070b083cc091.jpeg" alt class="image--center mx-auto" /></p>
<h3 id="heading-note">Note</h3>
<p>By mapping key components such as client-server architecture, switches, routers, SYN/ACK processes, firewalls, and load balancers to their respective layers, engineers like you can gain valuable insights into the underlying processes that facilitate seamless communication and data transfer.</p>
<p>This knowledge not only enhances the efficiency and security of backend applications but also empowers you to design robust systems that can handle complex interactions and ensure optimal performance.</p>
]]></content:encoded></item></channel></rss>