The OSI Model is the blueprint of the internet. It breaks down the complex process of communication into 7 digestible layers. 🗺ï¸
The Open Systems Interconnection (OSI) model is a conceptual framework used to understand network interactions. It explains how data moves between two devices.
Note: It is a theoretical model which physically does not exist as a single entity. The real-world implementation is the TCP/IP Model.
It has seven layers, traditionally counted from Bottom (Physical) to Top (Application).
In reality, data flow starts from the Application layer (Layer 7) when you send data, and goes down to the Physical layer (Layer 1).
"The Interface"
When you open a browser (Chrome) or use an app (WhatsApp), you are interacting with this layer. It ensures the application knows how to communicate with the network. This is where the human is talking to the networks through an application interface.
"The Translator"
This layer ensures that data is in a usable format. It handles encryption, compression, and translation. Think of it as the designer and stylist of the data.
"The Manager"
This layer establishes, maintains, and terminates connections (sessions).
"The Courier"
The most critical layer for delivery. It decides how much data to send and ensures it arrives. Here, either TCP or UDP header (depending on your connection) is added to the data segments.
"The Navigator"
The segments are given IP Headers to make Packets. This layer handles Routing and finds the best path for data to reach its destination across different networks.
"The Local Delivery"
This is where the packets search for the destination IP's MAC Address within the destination LAN to deliver the data packets. Each hop (like your router -> ISP -> server) gets a new MAC header for the next segment.
"The Hardware"
These are the real data pulses, regardless of the IP, TCP, or UDP headers. It involves the physical electric pulses of the data moving through cables or air.
To understand security, you must know what hits where.
| Layer | Name | Common Attacks |
|---|---|---|
| 7 | Application | Phishing, HTTP Floods, SQL Injection, XSS, DNS Poisoning |
| 6 | Presentation | SSL Stripping, Malformed Encoding |
| 5 | Session | Session Hijacking, Man-in-the-Middle (MITM) |
| 4 | Transport | TCP SYN Flood, UDP Flood, Port Scanning |
| 3 | Network | IP Spoofing, Ping of Death, ICMP Flood, Route Injection |
| 2 | Data Link | ARP Spoofing, MAC Flooding, VLAN Hopping |
| 1 | Physical | Wiretapping, Jamming, Physical Tampering |