Ever wonder what happens when you click a link? Learn how data is packaged and unboxed across seven layers to make the internet feel seamless.

The OSI model is like a seven-story factory: your data starts on the top floor as a raw message and picks up a new protective layer of encapsulation at every level as it heads toward the basement.
Encapsulation is the process of "packaging" raw data as it moves down the seven layers of the OSI model. Each layer adds its own protective header or "envelope" containing specific instructions, such as the destination IP address or port number. This modular system is necessary because it allows different parts of the network to handle specialized tasks—like routing or error checking—without needing to understand the actual content of the message being sent.
An IP address, found at the Network Layer (Layer 3), acts like a permanent home address that identifies the final destination of a packet across the global internet. In contrast, a MAC address, found at the Data Link Layer (Layer 2), is a physical hardware identifier used for "local" delivery. While the destination IP address stays the same throughout the entire journey, the destination MAC address changes at every "hop" as the data is handed off from one local device to the next.
TCP is described as a "perfectionist" protocol that ensures reliability by numbering segments and requiring the receiver to acknowledge they arrived; if a piece is missing, TCP will send it again. UDP is a "best effort" protocol that prioritizes speed over reliability, throwing data "into the wind" without waiting for confirmation. This makes TCP ideal for emails or web pages where every bit matters, while UDP is better for live streaming or gaming where speed is more important than a perfectly intact stream.
The OSI model allows for a logical "bottom-up" approach to troubleshooting, starting with the Physical Layer to ensure cables are plugged in and power is on. By isolating problems to specific layers—such as confirming a connection works via IP address (Layer 3) but fails via website name (Layer 7)—users can quickly identify if a fault lies with the hardware, the network routing, or the specific application.
Encryption primarily maps to the Presentation Layer (Layer 6), which is responsible for formatting, translating, and securing data. This is where the "secret code" of a TLS handshake occurs, turning plain-text data into an unreadable format for its trip through the lower layers. This ensures that even if a packet is intercepted at the Network or Data Link layers, the contents remain private to anyone without the proper decryption key.
From Columbia University alumni built in San Francisco
"Instead of endless scrolling, I just hit play on BeFreed. It saves me so much time."
"I never knew where to start with nonfiction—BeFreed’s book lists turned into podcasts gave me a clear path."
"Perfect balance between learning and entertainment. Finished ‘Thinking, Fast and Slow’ on my commute this week."
"Crazy how much I learned while walking the dog. BeFreed = small habits → big gains."
"Reading used to feel like a chore. Now it’s just part of my lifestyle."
"Feels effortless compared to reading. I’ve finished 6 books this month already."
"BeFreed turned my guilty doomscrolling into something that feels productive and inspiring."
"BeFreed turned my commute into learning time. 20-min podcasts are perfect for finishing books I never had time for."
"BeFreed replaced my podcast queue. Imagine Spotify for books — that’s it. 🙌"
"It is great for me to learn something from the book without reading it."
"The themed book list podcasts help me connect ideas across authors—like a guided audio journey."
"Makes me feel smarter every time before going to work"
From Columbia University alumni built in San Francisco
