Skip to content

Read: Class 01 Network Traffic Analysis with Wireshark

Sérgio Charruadas edited this page Feb 16, 2023 · 7 revisions

OSI Model and Data Communication

Source: Shardeum.org

Why does the OSI Model matter?

The OSI model is a framework that provides a perspective of how data is transmitted between different devices and applications. The model breaks down the data into smaller packets, which facilitates transmission across networks. In turn, this guarantees reliable and efficient data transmission, even in the most complicated network environments.

In the context of cybersecurity, comprehension of network data delivery is indispensable for safeguarding networks and devices from potential cyber threats. If cybersecurity professionals have a thorough understanding of how data is transmitted and received, they can then identify vulnerabilities in the network, develop a strategy to secure them as well as implementing the correct security measures to each individual situation.

Also, the OSI model serves as a reference point for network architecture and protocol design. It offers a standardized language for network engineers and developers, facilitating effective communication and collaboration on projects. This leads to the development of efficient and secure network systems that enable organizations to achieve their business objectives.

Analogy with my previous work experience

As a previous restaurant manager, you are responsible for ensuring that the customer's order is delivered to the table accurately and on time. The OSI model can be compared to the process of taking and fulfilling a customer's order.

At the physical layer (Layer 1), you have the raw materials and ingredients that are used to prepare the customer's meal. This layer is analogous to the physical medium, such as cables or wireless signals, that are used to transmit data.

At the data link layer (Layer 2), the ingredients are prepared and assembled into the dish that the customer has ordered. This layer is responsible for ensuring that the data packets are correctly sequenced and transmitted without errors.

At the network layer (Layer 3), the dish is prepared for delivery to the customer's table. This layer is responsible for routing the dish to the correct table and ensuring that it arrives in the correct order.

At the transport layer (Layer 4), the dish is ready to be served to the customer. This layer is responsible for ensuring that the dish is delivered reliably and that all components are present and accounted for.

Finally, at the application layer (Layer 5-7), the customer receives and enjoys the meal that they have ordered. This layer is responsible for the actual application or service that is using the data, just as the customer is receiving the meal that they have ordered.

By understanding the OSI model in this way, you can see how the different layers of data communication work together to ensure that the customer's order is fulfilled accurately and efficiently, just as a restaurant manager ensures that the customer's meal is prepared and delivered to their table on time.

Wireshark

Wireshark is a network protocol analyser that captures network packets in real-time, decoding and interpreting their contents. At this moment, it supports over 1,000 network protocols, it helps its user to detect network anomalies and security breaches, as well as troubleshooting and fault analysis.

Wireshark can also be extended with various plugins, enabling users to add custom functionality to the tool. This makes it possible to create custom protocol dissectors, capture interfaces, and more.

Things I want to know more about