Select Page

OSI layer with Protocols

CISSP

OSI LayerLayer NumberProtocols/TechnologiesTCP/IP Model Layer
ApplicationLayer 7HTTP, FTP, SMTP, SNMP, DNS, Telnet, SSH, POP3, IMAP, NTP, DHCPApplication
PresentationLayer 6SSL/TLS, JPEG, MPEG, GIF, TIFF, ASCII, EBCDICApplication
SessionLayer 5NetBIOS, RPC, PPTP, PAP, NFS, SQL, SMBApplication
TransportLayer 4TCP, UDP, SCTP, DCCPHost-to-Host
NetworkLayer 3IP, ICMP, ARP, RARP, BGP, OSPF, RIP, IPsec, IGMPInternet
Data LinkLayer 2Ethernet, PPP, HDLC, Frame Relay, ATM, MPLS, L2TP, ARPNetwork Access
PhysicalLayer 1USB, DSL, ISDN, Bluetooth, 802.11, Ethernet (Cabling), FDDINetwork Access

This table shows how different protocols function within specific layers of the OSI and TCP/IP models, providing a clear overview of network communication processes.

Layer Details:

  • Application (OSI Layer 7 / TCP/IP Application Layer): Handles network applications and end-user processes.
  • Presentation (OSI Layer 6 / TCP/IP Application Layer): Translates data formats, encryption, and compression.
  • Session (OSI Layer 5 / TCP/IP Application Layer): Manages sessions between applications.
  • Transport (OSI Layer 4 / TCP/IP Host-to-Host Layer): Ensures reliable data transfer and error correction.
  • Network (OSI Layer 3 / TCP/IP Internet Layer): Manages logical addressing and routing.
  • Data Link (OSI Layer 2 / TCP/IP Network Access Layer): Handles physical addressing and error detection.
  • Physical (OSI Layer 1 / TCP/IP Network Access Layer): Manages the physical transmission of data.

These protocols are crucial for maintaining secure communication channels in various networked environments, especially when managing remote systems.

  1. TELNET
    • Function: Provides remote terminal access, allowing users to log in to remote servers and control them via a command line.
    • Security: Originally not secure, but secure versions of Telnet are available that enhance security by encrypting the communication.
  2. Remote Procedure Call (RPC)
    • Function: Enables programs to execute procedures on other machines in a network as if they were local.
    • Security: Secure Remote Procedure Call (SRA) is used to secure the communication by ensuring that the data exchanged during the procedure calls is protected.
  3. SSH (Secure Shell)
    • Function: A secure alternative to Telnet, SSH provides encrypted communication for remote server administration via the command line.
    • Security: SSH encrypts the session, ensuring that both authentication and data exchange are secure.

Latest Post:

Pin It on Pinterest