osi model
osi model
So far in this section of the course, you learned about the components of a network, network
devices, and how communication occurs across a network. You also studied the TCP/IP model to
understand how network communication is organized across different layers of the internet.
All communication on a network is organized using network protocols. Previously, you learned
about the Transmission Control Protocol (TCP), which establishes connections between two
devices, and the Internet Protocol (IP), which is used for routing and addressing data packets as
they travel between devices on a network. These protocols are used on specific internet layers in
the TCP/IP model. The 4-layer TCP/IP model is a condensed form of the OSI (open Systems
Interconnection) model, which is made up of 7 layers. The OSI model will provide a more in
depth understanding of the processes that occur at each layer. We will work backwards from
layer seven to layer one, going from the processes that involve direct user interaction with the
network to those that involve the physical connection to the internet via network components like
cables and switches. This reading will also review the main differences between the TCP/IP and
OSI models.
The TCP/IP model has four layers: the network access layer, internet layer, transport layer, and
application layer. When analyzing network events, security professionals can determine what
layer or layers an attack occurred in based on what processes were involved in the incident.
The OSI model is a standardized concept that describes the seven layers computers use to
communicate and send data over the network. Network and security professionals often use this
model to communicate with each other about potential sources of problems or security threats
when they occur.
Some organizations rely heavily on the TCP/IP model, while others prefer to use the OSI model.
As a security analyst, it’s important to be familiar with both models. Both the TCP/IP and OSI
models are useful for understanding how networks work.
An example of a type of communication that happens at the application layer is using a web
browser. The internet browser uses HTTP or HTTPS to send and receive information from the
website server. The email application uses simple mail transfer protocol (SMTP) to send and
receive email information. Also, web browsers use the domain name system (DNS) protocol to
translate website domain names into IP addresses which identify the web server that hosts the
information for the website.
The session layer is also responsible for activities such as authentication, reconnection, and
setting checkpoints during a data transfer. If a session is interrupted, checkpoints ensure that the
transmission picks up at the last session checkpoint when the connection resumes. Sessions
include a request and response between applications. Functions in the session layer respond to
requests for service from processes in the presentation layer (layer 6) and send requests for
services to the transport layer (layer 4).
Protocols like network control protocol (NCP), high-level data link control (HDLC), and
synchronous data link control protocol (SDLC) are used at the data link layer.
Layer 1: Physical layer
As the name suggests, the physical layer corresponds to the physical hardware involved in
network transmission. Hubs, modems, and the cables and wiring that connect them are all
considered part of the physical layer. To travel across an ethernet or coaxial cable, a data packet
needs to be translated into a stream of 0s and 1s. The stream of 0s and 1s are sent across the
physical wiring and cables, received, and then passed on to higher levels of the OSI model.
Key takeaways
Both the TCP/IP and OSI models are conceptual models that help network professionals design
network processes and protocols with regards to data transmission between two or more systems.
The OSI model contains seven communication layers. Network and security professionals use
the OSI model to communicate with each other about potential sources of problems or security
threats when they occur. Network engineers and network security analysts use the TCP/IP and
OSI models to conceptualize network processes and communicate the location of disruptions or
threats.