The OSI Model

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • OSI: Securing the Stack, Layer 8 -- Social engineering and security policy

    Network security is essential at every layer of the OSI model, including the mythical eighth layer, where users interact with technology. Since hackers can use social engineering to exploit people, it is important to train your users and implement go... 

  • CDPD (Cellular Digital Packet Data)

    CDPD (Cellular Digital Packet Data) is a specification for supporting wireless access to the Internet and other public packet-switched networks. 

  • Layer Two Tunneling Protocol (L2TP)

    Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a virtual private network (VPN) over the Internet. 

  • presentation layer

    In the Open Systems Interconnection (OSI) communications model, the presentation layer ensures that the communications passing through are in the appropriate form for the recipient. 

  • Common Management Information Protocol (CMIP)

    Common Management Information Protocol (CMIP) is a network management protocol built on the Open Systems Interconnection (OSI) communication model. 

  • Technical Office Protocol (TOP)

    Technical Office Protocol (TOP), also called Technical and Office Protocol, is a set of protocols intended for networks that perform distributed information processing in business offices... (Continued) 

  • TP0-TP4 (transport protocols 0 to 4)

    TP0-TP4 (transport protocols 0 to 4) are the five protocols in the Transport layer of the Open Systems Interconnection (OSI) model for telecommunication. 

  • OSI: Securing the Stack, Layer 7 -- Applications

    Domain Name System (DNS) wasn't designed to handle today's security threats, making it a prime target at Layer 7 -- the application layer -- of the OSI model. In this tip, learn how DNS works and some of the ways hackers attack it, including exploiti... 

  • OSI: Securing the Stack, Layer 6 -- Encryption

    SSL or TLS encryption takes place at the presentation layer, Layer 6 of the OSI model. In this tip, learn why encryption is so important and how certain hacker attacks can still circumvent SSL or TLS and threaten your networks. 

  • Network security -- Taking the layered approach

    Network security is tricky business. In his new book Hack the Stack, author and security expert Michael Gregg outlines how to secure the network using the OSI model.