OSI Model Layers 5, 6, 7 and OSI Summary
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:05
after the network and the transport layer coming up the SC model. We're now at Layer five, which is the session layer.
00:12
The session layer is all about the setup, maintenance and tear down of the connection.
00:16
Quite honestly, it's about the setup, maintenance and tear down of a session that seems a little redundant.
00:22
So when I say session is about when your Web browser or client system uses a Web browser to connect to a Web server,
00:30
that's an application to application session.
00:33
You communicate throughout that session, you close out the session, you connect again 10 minutes later and you have a new session.
00:40
So that session layer is the setup, maintenance and tear down of the session between one application and another. It is a client peace and server piece.
00:51
There are a couple of protocols that work there.
00:53
RPC is referred to as remote procedure Call
00:57
when you're performing an operation that's actually happening on another system that's a remote procedure. Call
01:03
sip stands for a session initiation protocol.
01:07
This is used with VoIP, and as a matter of fact, it's this protocol that makes the VoIP phones ring.
01:12
If it makes sense, you dial a number, and that session has to be set up.
01:18
Receiving end has to have that ringing to say, Okay, we're connecting.
01:22
So that's it.
01:23
SQL, which is database language, but it's also is a protocol. It's Layer five base from the database client to the database server.
01:33
And as we continue to head them up when we go to Layer six, which is the presentation layer, three big things happen at the presentation layer
01:41
formatting, compression and encryption.
01:44
When we talk about formatting, we're talking about presenting the data and a universal format.
01:49
That's why you can sit at Mac and I can be in a Windows PC, and you send me a message that I can read perfectly.
01:55
That's because at some point in time, that message has to be translated to a universal format that regardless of where the message is going, it will present correctly when it arrives.
02:06
So formatting happens here at Layer six.
02:08
What compression does is remove redundancy from files
02:13
that allows the file to be smaller as it's being transported across the network so it doesn't take as long. It doesn't take as much space in order to transmit
02:22
and then of course we have encryption.
02:24
I'll mention encryption happens in many places on the OSI model.
02:29
At Layer one, there's hardware based encryption.
02:31
At Layer three, we have I P SEC, which secures I P. Traffic, in which we can use encryption
02:38
at later four through seven. We have SSL and TLS, which we haven't talked about yet, but that secures Web traffic
02:46
here at Layer six. The encryption that happens at this level is within the filing system.
02:51
So if you're using F s and you're going to send a file that's encrypted, that happens at this layer.
02:57
Or if you're going to store the file encrypted format summer within the filing system. That also happens here
03:05
for multimedia formatting, whether you have a Jeff J. P. G or an MP four or really any type of multimedia that formatting happens at this layer.
03:15
Interestingly enough, this is the only layer the entire OSI model that has no protocols.
03:21
So that's probably worth a look from a test taking perspective,
03:24
man. If you want to get to the layer where you get the most intelligence, it's here,
03:29
Remember, down at Layer one, we said that those were the devices that don't really know much. They don't know what data is traversing. A cable doesn't know what data is going across it, and a cable doesn't care.
03:39
But if you really want intelligence with your devices and go all the way up to the top, which is the application layer Layer seven.
03:47
Mhm.
03:49
These are the protocols that drive the applications users are using.
03:53
So these protocols have to be really smart because they have direct access to your data
03:59
when we're thinking about things that we can do it later. Seven. This is where you'll see certificate services.
04:04
To tell you the truth, a lot of these things we haven't talked about, so what I'm going to encourage you to do is later on. Come back and review this session on the OSI model after we've talked about what a Web application firewall is, what certificate services are
04:19
for now, we're just going to suffice to say that certificate services happen at this layer.
04:25
Certificates are used in order to provide authentication for individuals or for systems, so that's going to be important.
04:32
Proxy servers, which are high and deep packet inspection devices, give us a really good understanding and inspection of the content of traffic and other information.
04:43
A Web application firewall is specific to Web traffic
04:46
but provides a good degree of protection, specifically focusing in on http and https.
04:53
So when it comes to any attacks that are specifically geared towards Web servers, a waf is a really good defensive mechanism.
05:00
Your email applications are going to use digital signatures.
05:04
Digital signing happens up at layer seven. So there's a lot of really good, very important stuff that happens here and just a ton of protocols
05:15
S and m p Simple network management protocol ftp t f T p By the way, let me just mention you. See FTP and T f T P mentioned here.
05:25
Most people have heard of files transfer protocol,
05:28
but there's also a trivial fire away transfer protocol
05:31
the only difference between the two. If you remember earlier we talked about TCP and UDP and that upper layers services piggyback
05:39
ftp piggybacks on TCP
05:42
TFT be piggybacks on UDP.
05:45
So which one do you think is going to provide better performance?
05:48
T f d P. Because UDP is fast.
05:51
FTP is going to provide more reliable delivery.
05:56
Okay,
05:57
what are a key takeaways from the OSI model?
06:00
Well,
06:00
Oh, yes, I models Conceptual model that was brought to us from the International Organization for Standardization.
06:08
It essentially breaks down networking into seven categories called layers, and you see the layers in front of us here.
06:14
This is a really good chart, and I would certainly recommend screen shotting it and printing it out because this hits the gist of what is going on with the S. I model
06:23
gives you a look at network processes to the application layer seven data representation into host communication and to end path. Determination
06:31
down layer by layer gives you a quick view of what happens at each layer.
06:36
It also gives you some of the more important protocols, but you can go back and add to this.
06:42
You know that cable is at layer one. Switches and Mac addresses are at Layer two.
06:46
At Layer three. We have routers and layer three switches,
06:49
so if there's anything missing, you can go back and fill us in.
06:54
But no, your layers, no, that just of what happens at each layer. And no any protocols or any specific hardware devices because you can bet this is going to be on your exam.
Up Next
Similar Content