0% found this document useful (0 votes)
22 views5 pages

7 Layers of OSI Model

7 Layers of OSI Model

Uploaded by

veewhyte51
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views5 pages

7 Layers of OSI Model

7 Layers of OSI Model

Uploaded by

veewhyte51
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

8/10/24, 11:03 AM What is the OSI Model?

Understanding the 7 Layers - Check Point Software

Cyber Hub (/cyber-hub/) / Secure The Network (/cyber-hub/network-security/)

/ What is the OSI Model? Understanding the 7 Layers

What is the OSI Model? Understanding


the 7 Layers
Network stacks are complex, multi-layered systems that map application-layer data
structures to bits transferred over physical media and back again. The Open Systems
Interconnection (OSI) Model is a conceptual framework that provides a protocol-agnostic
description of how the various layers of a network stack combine to enable network
communications. The goal of the OSI model is to enable diverse communication systems to
better interoperate using standard communication protocols.

Request A Demo
(https://pages.checkpoint.com/quantum-force-org-
demo.html?utm_term=cyber-hub)

Miercom 2024 NGFW Security Benchmark


(https://www.checkpoint.com/resources/items/miercom-2024-
ngfw-security-benchmark-caa7?utm_term=cyber-hub)

This website uses cookies in order to optimize your user


experience as well as for advertising and analytics. For further
information, please read our Privacy Policy
(https://www.checkpoint.com/privacy/) and our Cookie Notice
(https://www.checkpoint.com/privacy/cookies/). Hey there! Quantum Force
1
upgrades your security🚀 Want to
see how?
Manage Preferences DISMISS

https://www.checkpoint.com/cyber-hub/network-security/what-is-the-osi-model-understanding-the-7-layers/ 1/5
8/10/24, 11:03 AM What is the OSI Model? Understanding the 7 Layers - Check Point Software

The Importance for Network Security


The OSI model takes a complex system and breaks it into several discrete layers based upon
the various tasks fulfilled by networking protocols. This abstraction makes it easier to
troubleshoot issues, identify security risks, and describe network-layer attacks.

As a theoretical model, the OSI model is not necessary for modern networking protocols to
operate. However, it does make it easier to identify security risks and analyze the capabilities
of cybersecurity solutions, making it an invaluable tool for network security (/cyber-
hub/network-security/what-is-network-security/).

7 Layers of OSI Model


The OSI model is broken up into seven layers. Each layer fulfills an important role within the
networking stack and communicates with other layers by exchanging protocol data units
(PDUs).

The layers in the OSI model are commonly referred to by name or number (1-7). From lowest-
level to highest-level they are:

#1. The Physical Layer


The physical layer is where the raw bitstream is physically transmitted over a physical
medium. The Layer 1 PDU is the “symbol”. This includes translating bits to electricity, light, or
radio signals and controlling the rates at which they are sent over the chosen medium.

#2. The Data Link Layer


The data link layer breaks data to be transmitted into frames for transmission at the physical
layer. It also manages connections between two different nodes, including setting up the
connection, identifying and correcting any bit errors that occur at the physical layer, and
terminating the connection once the session is complete.

#3. The Network Layer


At the network
This layer,
website uses the in
cookies focus
orderexpands
to optimizefrom a point-to-point link to include many
your user
experience as well as for advertising and analytics. For further
interconnected nodes within a network. Network-layer devices operate on packets and are
information, please read our Privacy Policy
responsible for routing traffic to itsand
(https://www.checkpoint.com/privacy/) destination
our Cookie based
Notice on IP addresses.
(https://www.checkpoint.com/privacy/cookies/).

https://www.checkpoint.com/cyber-hub/network-security/what-is-the-osi-model-understanding-the-7-layers/ 2/5
8/10/24, 11:03 AM What is the OSI Model? Understanding the 7 Layers - Check Point Software

#4. The Transport Layer


The transport layer is the first of four “host” layers with the rest referred to as “media”
layers. The transport layer PDU is the “segment” or “datagram”. This layer manages the
transmission of data between nodes, including ensuring that data arrives in the correct
sequence and that any errors are corrected. The Transmission Control Protocol (TCP)
operates at Layer 4

#5. The Session Layer


The session layer manages sessions between nodes and acts on the “data” PDU. Session
management includes setup, authentication, termination, and reconnections.

#6. The Presentation Layer


The presentation layer is primarily responsible for translating data from network data to the
formats expected by an application. For example, data encodings and encryption are managed
at Layer 6.

#7. The Application Layer


The application layer includes protocols designed for end-users. For example, HTTP is a
Layer 7 protocol designed to transmit data between a web server and a client.

Network Layers: OSI vs TCP/IP


The OSI model is only one networking model. Another is the TCP/IP model, which predates
the OSI model and maps more closely to the protocols that implement the networking stack.

The TCP/IP model breaks the network stack into four layers:

Application Layer: This single layer maps to the Application, Presentation, and Session
layers of the OSI model. Some protocols that operate at this layer include HTTP, SMTP, and
DNS.

Transport Layer: This layer maps to the Transport layer of the OSI model. TCP and the User
Datagram Protocol (UDP) operate at this layer.

Internet Layer: The Internet layer is equivalent to the Network Layer in the OSI model. This
layer is primarily covered by the Internet Protocol (IP), but ARP, IGMP, and ICMP also
operate at this layer.
This website uses cookies in order to optimize your user
experience as well as for advertising and analytics. For further
Network Access Layer: This layer combines the Physical and Data Link layers from the OSI
information, please read our Privacy Policy
model. Ethernet, Token Ring, ATM,
(https://www.checkpoint.com/privacy/) andand
our Frame Relay are examples from the TCP/IP Protocol
Cookie Notice
(https://www.checkpoint.com/privacy/cookies/).
Suite that operate at this layer.

https://www.checkpoint.com/cyber-hub/network-security/what-is-the-osi-model-understanding-the-7-layers/ 3/5
8/10/24, 11:03 AM What is the OSI Model? Understanding the 7 Layers - Check Point Software

The OSI model is more theoretical, describing the various tasks that must be accomplished to
enable application-layer data to be transmitted via electricity, light, or radio waves. The
TCP/IP model is more practical and maps closely to actual network protocols.

Advantages of the OSI Model


OSI provides a mental model for how networking works, including describing all of the
various functions that are performed to make network communications possible. This model
makes it easier to troubleshoot issues with network protocols, to examine the security of
networking protocols, and discuss various network-level attacks.

Check Point Solutions and the OSI Model


Network attacks can occur at varying levels of the OSI model. For example, Distributed Denial
of Service (DDoS) (/quantum/ddos-protector/) attacks can attempt to exhaust network
bandwidth (layers 3/4) or overwhelm a particular application with more requests than it can
handle (layer 7).

An enterprise network security architecture (/cyber-hub/network-security/what-is-network-


security/network-security-architecture/) should have the ability to view and analyze data at all
of the “host” layers (4-7) of the OSI model. To learn more about expanding your organization’s
network visibility through the OSI model, you’re welcome to request a free demo
(https://pages.checkpoint.com/quantum-network-security-demo.html) of Check Point
Quantum Network Security.

Get Started
Quantum Network Security (/quantum/)

Consolidated Security Architecture (/infinity-vision/total-protection-architecture/)

Applied Zero Trust Security (/solutions/zero-trust-security/)

Quantum NGFW (/quantum/next-generation-firewall/)

Related Topics
This website uses cookies in order to optimize your user
experience as well as for advertising and analytics. For further
What is Network Security? (/cyber-hub/network-security/what-is-network-security/)
information, please read our Privacy Policy
(https://www.checkpoint.com/privacy/)
What and our Cookie Notice
is a Firewall? (/cyber-hub/network-security/what-is-firewall/)
(https://www.checkpoint.com/privacy/cookies/).
Network Security Best Practices (/cyber-hub/network-security/what-is-network-
security/network-security-best-practices/)

https://www.checkpoint.com/cyber-hub/network-security/what-is-the-osi-model-understanding-the-7-layers/ 4/5
8/10/24, 11:03 AM What is the OSI Model? Understanding the 7 Layers - Check Point Software

Network Security vs Application Security (/cyber-hub/network-security/what-is-


network-security/network-security-vs-application-security/)

Cybersecurity Mesh Architecture (CSMA) (/cyber-hub/cyber-security/what-is-


cybersecurity-mesh-architecture-csma/)

This website uses cookies in order to optimize your user


experience as well as for advertising and analytics. For further
information, please read our Privacy Policy
(https://www.checkpoint.com/privacy/) and our Cookie Notice
(https://www.checkpoint.com/privacy/cookies/).

https://www.checkpoint.com/cyber-hub/network-security/what-is-the-osi-model-understanding-the-7-layers/ 5/5

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy