0% found this document useful (0 votes)
73 views14 pages

OSI Model: Cybersecurity

The document discusses the OSI reference model, which is an internationally standardized network architecture consisting of 7 layers - physical, data link, network, transport, session, presentation, and application layer. It provides concise descriptions of the functions of each layer, with the lower layers (1-4) focusing on communication technologies and the higher layers (5-7) focusing on user applications. The model defines a framework for network implementation that promotes interoperability between different systems and vendors.

Uploaded by

Aadithya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views14 pages

OSI Model: Cybersecurity

The document discusses the OSI reference model, which is an internationally standardized network architecture consisting of 7 layers - physical, data link, network, transport, session, presentation, and application layer. It provides concise descriptions of the functions of each layer, with the lower layers (1-4) focusing on communication technologies and the higher layers (5-7) focusing on user applications. The model defines a framework for network implementation that promotes interoperability between different systems and vendors.

Uploaded by

Aadithya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 14

OSI Model

in CYBERSECURITY
OSI Reference Model
• OSI Reference Model - internationally
standardised network architecture.
• OSI = Open Systems Interconnection: deals
with open systems, i.e. systems open for
communications with other systems.
• Specified in ISO 7498.
• Model has 7 layers.
7-Layer OSI Model
Layer 7 Application Layer • Layers 1-4 are
Layer 6 Presentation Layer communications technology.
• Layers 5-7 are user
Layer 5 Session Layer
applications.
Layer 4 Transport Layer

Layer 3 Network Layer

Layer 2 Data Link Layer

Layer 1 Physical Layer


Layer 7: Application Layer
• Level at which applications access network
services.
– Represents services that directly support software
applications for file transfers, database access, and
electronic mail etc.
Layer 6: Presentation Layer
• Related to representation of transmitted data
– Translates different data representations from the
Application layer into uniform standard format
• Providing services for secure efficient data
transmission
– e.g. data encryption, and data compression.
Layer 5: Session Layer
• Allows two applications on different computers to
establish, use, and end a session.
– e.g. file transfer, remote login
• Establishes dialog control
– Regulates which side transmits, plus when and how long it
transmits.
• Performs token management and synchronization.
Layer 4: Transport Layer
• Manages transmission packets
– Repackages long messages when necessary into
small packets for transmission
– Reassembles packets in correct order to get the
original message.
• Handles error recognition and recovery.
– Transport layer at receiving acknowledges packet
delivery.
– Resends missing packets
Layer 3: Network Layer
• Manages addressing/routing of data within the subnet
– Addresses messages and translates logical addresses and
names into physical addresses.
– Determines the route from the source to the destination
computer
– Manages traffic problems, such as switching, routing, and
controlling the congestion of data packets.
• Routing can be:
– Based on static tables
– determined at start of each session
– Individually determined for each packet, reflecting the
current network load.
Layer 2: Data Link Layer
 Packages raw bits from the Physical layer into
frames (logical, structured packets for data).
 Provides reliable transmission of frames
 It waits for an acknowledgment from the receiving
computer.
 Retransmits frames for which acknowledgement
not received
Layer 1: Physical Layer
• Transmits bits from one computer to another
• Regulates the transmission of a stream of bits over a
physical medium.
• Defines how the cable is attached to the network
adapter and what transmission technique is used to
send data over the cable.
Internet Protocols vs OSI
Application • Session layers is
missing in Internet
Presentation Application Protocols
Session • Data Link and
Network Layers
Transport TCP
redesigned
Network IP

Data Link Network Interface

Physical Hardware
Services in the OSI Model
• In OSI model, each layer provide services to
layer above, and ‘consumes’ services provided
by layer below.
• Active elements in a layer called entities.
• Entities in same layer in different machines
called peer entities.
Connections
• Layers can offer connection-oriented like
telephone system
( or)
• connectionless services like postal system.
Reliability
Types of services
• Reliable services never lose/corrupt data.
• Reliable service costs more.
• Not all applications need connections.

You might also like