Email Alerts
-
OSI -- Securing the stack
Secure your network with our OSI model reference that links to all the tips in our "OSI -- securing the stack" series by security expert and author Michael Gregg. The series is based on his book, "Hack the Stack." Tip series
-
Extending OSI to Network Security -- Chapter 1 of 'Hack the Stack'
Extending OSI to Network Security covers topics such as common stack attacks, mapping the OSI model to the TCP/IP model, and talks about the current state of IT security. The goal of this chapter is to take the well-known Open Systems Interconnect (... Chapter Download
-
OSI model: Crash Course
The OSI model is the conceptual backbone of most enterprise networks, but do you remember all the details? Read our rundown of the OSI model and what all those layers do. Crash Course
-
FastFacts on the OSI model
These resources will help you better understand the OSI model and all those layers in a snap. Networking FastFacts
-
Understanding Layer 2, 3, and 4 protocols
This chapter excerpt explains the layers of the OSI model, switching, TCP, UDP, and VRRP. Reprint
-
F5 training effort with University of Phoenix to boost ADC skills
F5 Networks and the University of Phoenix team up for vendor-neutral application delivery controller training. News | 03 Jul 2013
-
The answer to the top 5 virtualization problems
Transitioning to a virtualized network can be challenging for network engineers, despite the advantages. Understand these top five virtualization problems and how to handle them. Fast Packet | 22 Dec 2011
-
vCloud and VEPA: Neither answer is a winner
vCloud and VEPA fail to address the virtualization networking problem, as both are deemed proprietary and don’t enable networking functions within the vSphere environment. Fast Packet | 22 Dec 2011
-
When physical security breaches are the problem
Network engineers are so busy dealing with intrusion prevention and firewalling that they forget about physical security breaches. Blogger Ethan Banks has some advice. Fast Packet | 22 Dec 2011
-
Cisco upgrades the Catalyst 6500…but some wonder why
The Cisco Catalyst 6500 upgrade announced this year didn't excite everyone as expected. Blogger Greg Ferro wonders why Cisco didn't stay focused on the Nexus line instead. Fast Packet | 22 Dec 2011
-
Need 10 GbE optimization? Hardware is not the solution
10 GbE brings speed, but network latency is still an issue. The answer to 10 GbE optimization can't be found in increasing hardware. Our blogger says it's about the application. Fast Packet | 22 Dec 2011
-
Cius vs. the iPad: Why bother comparing?
Cisco launched its Cius tablet this year, which focuses on enterprise apps, desktop virtualization and network management, but one blogger says he'd rather have an iPad. Fast Packet | 22 Dec 2011
-
Can Virtual Extensible LAN solve the VLAN problem?
The Virtual Extensible LAN (VXLAN) protocol could mean the ability to spin off many more VLANs across dispersed data centers. So why does blogger Ivan Pepelnjak take issue? Fast Packet | 22 Dec 2011
-
OpenFlow controllers will only take shape if vendors play nice
OpenFlow controllers can result in a new level of granular network management and network virtualization on top of commodity hardware, but vendors will have to step out of the way. Fast Packet | 22 Dec 2011
-
Network fabrics may not be the end-all
Feature-rich network fabrics have been all the rage, but one blogger says the technology is only for creating more bandwidth. Other features should be left to edge software. Fast Packet | 22 Dec 2011
- See more News on The OSI Model
-
OSI: Securing the Stack, Layer 8 -- Social engineering and security policy
Network security is essential at every layer of the OSI model, including the mythical eighth layer, where users interact with technology. Since hackers can use social engineering to exploit people, it is important to train your users and implement go... Tip
-
OSI: Securing the Stack, Layer 7 -- Applications
Domain Name System (DNS) wasn't designed to handle today's security threats, making it a prime target at Layer 7 -- the application layer -- of the OSI model. In this tip, learn how DNS works and some of the ways hackers attack it, including exploiti... Tip
-
OSI: Securing the Stack, Layer 6 -- Encryption
SSL or TLS encryption takes place at the presentation layer, Layer 6 of the OSI model. In this tip, learn why encryption is so important and how certain hacker attacks can still circumvent SSL or TLS and threaten your networks. Tip
-
OSI: Securing the Stack, Layer 4 -- Fingerprinting
At Layer 4 of the OSI model, the transport layer, a major security threat is fingerprinting. Learn how active and passive fingerprinting can endanger your network -- and what you can do to prevent fingerprinting -- in this tip, part of our "Securing ... Tip
-
OSI: Securing the Stack, Layer 3 -- The role of ICMP
Michael Gregg examines the security vulnerabilities of Internet Control Message Protocol (ICMP) and how to help secure OSI Layer 3, the network layer. Tip
-
OSI: Securing the stack, Layer 2 -- Understanding the role of ARP
Security expert Michael Gregg continues his layer-by-layer discussion of OSI model network security with this tip on the vulnerabilities present in Layer 2, the Data Link Layer, and specifically addresses the Address Resolution Protocol. Tip
-
OSI: Securing the stack, Layer 1 -- Physical security threats
Security expert Michael Gregg kicks off his layer-by-layer discussion of OSI model network security with this tip on securing Layer 1 against physical security threats. Tip
-
OSI: Securing the Stack, Layer 5 -- session hijacking
To help secure your systems against session hijacking, this tip walks you through the steps hackers use to hijack active sessions and take over your network. You'll also learn how to detect and prevent session hijacking attacks, a major security conc... Tip
-
PKI still tricky to implement, but showing up in new forms
PKI still tricky to implement, but showing up in new forms. Tip
-
Which OSI layers are network managers responsible for?
Learn which layers of the OSI model network managers should be responsible for. Our expert, Lindi Horton, explains where to focus your manual operations, especially regarding automated operation tasks. Ask the Expert
-
How can I use a Layer 3 switch for voice routing?
Learn how to use a Layer 3 switch for voice routing in this expert response from a switch expert. Ask the Expert
-
What network monitoring tools monitor all OSI layers?
To understand network monitoring in all Open Systems Interconnection (OSI) layers, view this expert response. Ask the Expert
-
How do routers and switches differ in the OSI model?
Learn the difference between a switch and a router in relation to the OSI model in this Ask the Expert. Ask the Expert
-
How can I define the layered approach to protocols?
Learn what the network security advantages are in the layered approach to protocols and how to define the layered approach protocol, in this Q&A with Michael Gregg. Ask the Expert
-
How does a Layer 3 switch work in a network?
Learn how a Layer 3 switch works in a network, in this Q&A with routing and switching expert Sudhanshu Gupta. Ask the Expert
-
Is it possible to convert a Layer 2 switch to a Layer 3 switch?
In this expert response, our networking fundamentals expert, Chris Partsenidis, talks about the possibilities of converting a Layer 2 switch to a Layer 3 switch. Ask the Expert
-
What are the differences between physical and logical addressing?
Ask the Expert
-
What is the difference between OSI model and TCP/IP other than the number of layers?
Ask the Expert
-
What is OSI?
Ask the Expert
- See more Expert Advice on The OSI Model
-
data link layer
The Data-Link Layer is the protocol layer in a program that handles the moving of data in and out across a physical link in a network. Definition
-
CDPD (Cellular Digital Packet Data)
CDPD (Cellular Digital Packet Data) is a specification for supporting wireless access to the Internet and other public packet-switched networks. Definition
-
Layer Two Tunneling Protocol (L2TP)
Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a virtual private network (VPN) over the Internet. Definition
-
presentation layer
In the Open Systems Interconnection (OSI) communications model, the presentation layer ensures that the communications passing through are in the appropriate form for the recipient. Definition
-
Common Management Information Protocol (CMIP)
Common Management Information Protocol (CMIP) is a network management protocol built on the Open Systems Interconnection (OSI) communication model. Definition
-
Technical Office Protocol (TOP)
Technical Office Protocol (TOP), also called Technical and Office Protocol, is a set of protocols intended for networks that perform distributed information processing in business offices... (Continued) Definition
-
TP0-TP4 (transport protocols 0 to 4)
TP0-TP4 (transport protocols 0 to 4) are the five protocols in the Transport layer of the Open Systems Interconnection (OSI) model for telecommunication. Definition
-
physical layer
In the Open Systems Interconnection (OSI) communications model, the physical layer supports the electrical or mechanical interface to the physical medium. Definition
-
layer 2
Layer 2 refers to the Data Link layer of the commonly-referenced multilayered communication model, Open Systems Interconnection (OSI). Definition
-
Network layer
In the Open Systems Interconnection (OSI) communications model, the Network layer knows the address of the neighboring nodes in the network, packages output with the correct network address information, selects routes and quality of service, and reco... Definition
- See more Definitions on The OSI Model
-
F5 training effort with University of Phoenix to boost ADC skills
F5 Networks and the University of Phoenix team up for vendor-neutral application delivery controller training. News
-
data link layer
The Data-Link Layer is the protocol layer in a program that handles the moving of data in and out across a physical link in a network. Definition
-
The answer to the top 5 virtualization problems
Transitioning to a virtualized network can be challenging for network engineers, despite the advantages. Understand these top five virtualization problems and how to handle them. Fast Packet
-
vCloud and VEPA: Neither answer is a winner
vCloud and VEPA fail to address the virtualization networking problem, as both are deemed proprietary and don’t enable networking functions within the vSphere environment. Fast Packet
-
When physical security breaches are the problem
Network engineers are so busy dealing with intrusion prevention and firewalling that they forget about physical security breaches. Blogger Ethan Banks has some advice. Fast Packet
-
Cisco upgrades the Catalyst 6500…but some wonder why
The Cisco Catalyst 6500 upgrade announced this year didn't excite everyone as expected. Blogger Greg Ferro wonders why Cisco didn't stay focused on the Nexus line instead. Fast Packet
-
Need 10 GbE optimization? Hardware is not the solution
10 GbE brings speed, but network latency is still an issue. The answer to 10 GbE optimization can't be found in increasing hardware. Our blogger says it's about the application. Fast Packet
-
Cius vs. the iPad: Why bother comparing?
Cisco launched its Cius tablet this year, which focuses on enterprise apps, desktop virtualization and network management, but one blogger says he'd rather have an iPad. Fast Packet
-
Can Virtual Extensible LAN solve the VLAN problem?
The Virtual Extensible LAN (VXLAN) protocol could mean the ability to spin off many more VLANs across dispersed data centers. So why does blogger Ivan Pepelnjak take issue? Fast Packet
-
OpenFlow controllers will only take shape if vendors play nice
OpenFlow controllers can result in a new level of granular network management and network virtualization on top of commodity hardware, but vendors will have to step out of the way. Fast Packet
- See more All on The OSI Model
About The OSI Model
The OSI model is the conceptual backbone of all networks. These resources will help you understand the OSI model: all seven layers (physical, data link, network, transport, session, presentation, and application) and what they do.
Network Management Strategies for the CIO