OSI Model: A Framework for Data Transmission

OSI Model: A Framework for Data Transmission

Telecommunication encompasses the transmission of information across vast distances through electromagnetic methods, involving the interchange of data over extended ranges via diverse technologies like wired connections, radio waves, and other electromagnetic systems. Telecommunication and networking employ a wide array of procedures, devices, software, and protocols. Various models have emerged over time to enhance the depiction of data flow between devices utilizing different protocols. A protocol constitutes a collection of instructions or regulations governing data transmission between electronic devices. The majority of operating systems and protocols conform to the OSI model as an abstract framework. This article's objective is to delve into this model and illustrate how it can be employed to visualize the data transmission process within a network.

Article content


What is the OSI Model?

Back in the early 1980s, the ISO (International Standards Organization) introduced something called the OSI (Open Systems Interconnection) model. It's like a blueprint or plan (ISO-7498 standard) that was made to help make sure that different computer systems can talk to each other in a standardized way when they share information. 

In this model, networking tasks, rules, and services are split into seven layers. Each layer has its own job in making information move smoothly between devices. Companies can use this model to build their own networking systems and make sure their devices work well together.

Most of the internet today uses the TCP/IP model. But if you know what each layer in the OSI model does and the protocols that go with them, you'll get a better grasp of how networks work in general.

The OSI Models explained:

7- Application Layer: The application layer is used by end-user software such as web browsers and email clients. It provides protocols that allow software to send and receive information and present meaningful data to users. A few examples of application layer protocols are the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post Office Protocol (POP), Simple Mail Transfer Protocol (SMTP), and Domain Name System (DNS).

6- Presentation Layer: The presentation layer prepares data for the application layer. It defines how two devices should encode, encrypt, and compress data so it is received correctly on the other end. The presentation layer takes any data transmitted by the application layer and prepares it for transmission over the session layer.

5- Session Layer: The session layer creates communication channels, called sessions, between devices. It is responsible for opening sessions, ensuring they remain open and functional while data is being transferred, and closing them when communication ends. The session layer can also set checkpoints during a data transfer—if the session is interrupted, devices can resume data transfer from the last checkpoint.

4- Transport Layer: The transport layer takes data transferred in the session layer and breaks it into “segments” on the transmitting end. It is responsible for reassembling the segments on the receiving end, turning it back into data that can be used by the session layer. The transport layer carries out flow control, sending data at a rate that matches the connection speed of the receiving device, and error control, checking if data was received incorrectly and if not, requesting it again.

3- Network Layer: The network layer has two main functions. One is breaking up segments into network packets and reassembling the packets on the receiving end. The other is routing packets by discovering the best path across a physical network. The network layer uses network addresses (typically Internet Protocol addresses) to route packets to a destination node.

2- Data Link Layer: The data link layer establishes and terminates a connection between two physically connected nodes on a network. It breaks up packets into frames and sends them from source to destination. This layer is composed of two parts—Logical Link Control (LLC), which identifies network protocols, performs error checking and synchronizes frames, and Media Access Control (MAC) which uses MAC addresses to connect devices and define permissions to transmit and receive data.

1- Physical Layer: The physical layer is responsible for the physical cable or wireless connection between network nodes. It defines the connector, the electrical cable or wireless technology connecting the devices, and is responsible for transmission of the raw data, which is simply a series of 0s and 1s, while taking care of bit rate control.

The OSI Model in the Context of Cybersecurity Threats:

1. Physical Layer (Layer 1): Cyber threats at this layer primarily involve physical access to network infrastructure. For example, an attacker may physically tamper with cables or hardware devices to disrupt network operations or gain unauthorized access.

2. Data Link Layer (Layer 2): Threats at this layer may include MAC (Media Access Control) address spoofing and ARP (Address Resolution Protocol) poisoning, which can lead to network eavesdropping and man-in-the-middle attacks.

3. Network Layer (Layer 3): Common threats at this layer involve IP address spoofing, routing attacks, and denial-of-service (DoS) attacks that can disrupt network traffic and compromise network availability.

4. Transport Layer (Layer 4): This layer is where attackers may exploit vulnerabilities in protocols like TCP and UDP to launch attacks such as session hijacking, SYN flood attacks, and data manipulation during transmission.

5. Session Layer (Layer 5): Cyber threats related to session layer vulnerabilities often involve session hijacking and session fixation attacks, which can lead to unauthorized access to applications or sensitive data.

6. Presentation Layer (Layer 6): Attacks at this layer may involve exploiting vulnerabilities in data encoding, compression, or encryption methods, potentially leading to data leakage or tampering.

7. Application Layer (Layer 7): The application layer is where most cybersecurity threats occur. These threats include web application attacks (e.g., SQL injection, cross-site scripting), malware distribution, email phishing, and other forms of application-level exploits.

When analyzing cybersecurity in the context of the OSI Model, it's essential to consider that security measures and best practices are often applied at multiple layers to protect against a wide range of threats. These measures can include firewalls, intrusion detection systems (IDS), encryption, access controls, and security policies. Understanding which layer, a specific threat targets can aid in implementing effective security countermeasures and incident response strategies.


To view or add a comment, sign in

More articles by Ephraim Norbert

  • Bypass cookies using cookie manipulation

    Cookies store important information in a user’s browser and are generated by the web server, acting as a user’s…

    6 Comments
  • Active Directory Project

    Active Directory (AD) is a directory service developed by Microsoft that is used for managing computers, users, groups,…

    1 Comment
  • What is Log Analysis: Importance and use Cases.

    A log file is a chronological record of events that occur within a system. It contains detailed information about each…

  • Malware Reverse Engineering

    The rise of cyber threats has emerged as a significant concern, presenting a substantial danger to society. Malware…

  • Exploring Web Directory and File Brute Forcing with WFUZZ

    Penetration Testers and ethical hackers often perform vulnerability assessments to find flaws in web applications. One…

  • Cyber Kill Chain

    The latest UK government survey showed that 32% of businesses and 24% of charities overall recall any breaches or…

    1 Comment
  • Penetration Testing Tools

    Penetration testing, also known as ethical hacking, involves simulating cyberattacks on computer systems, networks, or…

  • Linux: A Key Element for Hacking and IT Security

    In the competitive world of IT, hacking has become a prestigious career. To succeed in this field, having a deep…

    2 Comments
  • Cybersecurity 101: A beginner’s guide to online safety.

    Since the creation of the Internet and the start of the recent digital transformation, cybersecurity has gained broad…

    1 Comment
  • Security Researchers has found an exploit to bypass detection for PaperCut Vulnerability.

    PaperCut received the report from a customer of suspicious activity on their PaperCut server on the 18th of April…

Insights from the community

Others also viewed

Explore topics