Nightmare Website 4 Learn Cyber Security

Cyber Security Networking Basics


Protocols and Networking

It is essential for Cyber Security Professionals to have a solid understanding of how computers communicate. There is much more happening behind the scenes of computer networks than what can be observed when using applications.

The OSI Model

The OSI ("Open Systems Interconnection") model represents an easy and intuitive way to standardize the different parts required to communicate across networks.

The model makes it clear what is required to communicate on a network by splitting the requirements into multiple layers.

This is what the OSI Model looks like:

Layer What it does
7 - Applications Where humans process data and information
6 - Presentation Ensures data is in a usable format
5 - Session Capable of maintaining connections
4 - Teansport Data is forwarded to a service capable of handling requests
3 - Network Layer Responsible for which path packets should travel on a network
2 - Data Link Responsible for which physical devices packets should go to
1 - Physical The physical infrastructure to transport data

The top 3 layers are typically implemented in software within the Operating System:

Layer Where it is Implemented
7 - Application Software
6 - Presentation Software
5 - Seesion Software

The bottom 3 layers are typically implemented in hardware within devices on the network, e.g. Switches, Routers and Firewalls:

Layer Where it is Implemented
3 - Network Layer Hardware
2 - Data Link Hardware
1 - Physical Hardware

Layer 4, the Transport layer, connects the software with the hardware layers.

SDN ("Software Defined Networking") is technology which allows more layers of the hardware to be implemented via software.


Layer 7 - Applications Layer

The business logic and functionality of the application lies here. This is what the users use to interact with services across a network. Most developers create applications on the Application Layer.

Most of the applications you use are on the Application Layer, with the complexity of the other layers hidden.

Examples of Layer 7 Applications: