• data link layer

    The Data-Link Layer is the protocol layer in a program that handles the moving of data in and out across a physical link in a network.

  • The answer to the top 5 virtualization problems

    Transitioning to a virtualized network can be challenging for network engineers, despite the advantages. Understand these top five virtualization problems and how to handle them.

  • vCloud and VEPA: Neither answer is a winner

    vCloud and VEPA fail to address the virtualization networking problem, as both are deemed proprietary and don’t enable networking functions within the vSphere environment.

  • When physical security breaches are the problem

    Network engineers are so busy dealing with intrusion prevention and firewalling that they forget about physical security breaches. Blogger Ethan Banks has some advice.

The OSI Model

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • CDPD (Cellular Digital Packet Data)

    CDPD (Cellular Digital Packet Data) is a specification for supporting wireless access to the Internet and other public packet-switched networks. 

  • Layer Two Tunneling Protocol (L2TP)

    Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a virtual private network (VPN) over the Internet. 

  • presentation layer

    In the Open Systems Interconnection (OSI) communications model, the presentation layer ensures that the communications passing through are in the appropriate form for the recipient. 

  • Common Management Information Protocol (CMIP)

    Common Management Information Protocol (CMIP) is a network management protocol built on the Open Systems Interconnection (OSI) communication model. 

  • Technical Office Protocol (TOP)

    Technical Office Protocol (TOP), also called Technical and Office Protocol, is a set of protocols intended for networks that perform distributed information processing in business offices... (Continued) 

  • TP0-TP4 (transport protocols 0 to 4)

    TP0-TP4 (transport protocols 0 to 4) are the five protocols in the Transport layer of the Open Systems Interconnection (OSI) model for telecommunication. 

  • OSI: Securing the Stack, Layer 7 -- Applications

    Domain Name System (DNS) wasn't designed to handle today's security threats, making it a prime target at Layer 7 -- the application layer -- of the OSI model. In this tip, learn how DNS works and some of the ways hackers attack it, including exploiti... 

  • OSI: Securing the Stack, Layer 6 -- Encryption

    SSL or TLS encryption takes place at the presentation layer, Layer 6 of the OSI model. In this tip, learn why encryption is so important and how certain hacker attacks can still circumvent SSL or TLS and threaten your networks. 

  • Network security -- Taking the layered approach

    Network security is tricky business. In his new book Hack the Stack, author and security expert Michael Gregg outlines how to secure the network using the OSI model. 

  • Is it possible to convert a Layer 2 switch to a Layer 3 switch?

    In this expert response, our networking fundamentals expert, Chris Partsenidis, talks about the possibilities of converting a Layer 2 switch to a Layer 3 switch.