OSI Model Cheat Sheet
OSI Model Cheat Sheet
Layer 7: Application
Provides an interface for users to
interact with the network.
i.e Operating Systems, Web
Browsers, Email Clients
Provides the capability for services to
operate on the network.
D
E Common Protocols: HTTP, DNS,
FTP, Telnet, POP3/IMAP
Devices: PCs, Firewalls, IDS
E
N
Layer 6: Presentation
Negotiates & prepares how the
data is presented to the user &
the network.
Handles encryption, decryption
N
C
& File Compression
Example: File Types, ASCII
Devices: PCs, Firewalls
Layer 5: Session
Oversees the setup, maintenance & C
A termination of Sessions.
Provides management of multiple
sessions (each client connection is
called a session).
Assigns session ID numbers to each
A
P
session to keep data streams separate.
Protocols: SIP, PPTP
Devices: Firewalls
P
S Layer 4: Transport
Provides a transition between the
upper & lower layers.
Determines if data delivery will be
reliable/connection-oriented (TCP) S
U or unreliable/connectionless (UDP)
delivery of data. Data transferred at
this layer is called Segments.
Protocols: TCP, UDP
Devices: Firewalls U
L Layer 3: Network
Responsible for routing data across
networks & on to the destination,
identifying hosts by their logical L
A address (IP Address), determine the
best path to send data. Data
transferred at this layer is called
A
Packets.
Protocols: IPv4, IPv6, EIGRP, OSPF
T
Devices: Routers
Layer 2: Data Link
Sends and receives traffic on the
same network segment (VLAN),
provides flow control, verifies data
to & from the Physical Layer is error-
T
I free. Devices are identified by their
physical address (MAC Address).
Data transferred at this layer is
called Frames.
Protocols: Ethernet, PPP, Frame I
O Relay
Devices: Switches, Modems
Layer 1: Physical
Converts data to electrical signals to
O
N send over the wire.
Data transferred at this layer is called
N
Bits.
Devices: Cables, Hubs, Repeaters
Encapsulation: De-encapsulation:
The process of adding additional The process of opening up
headers to data. This is done by the encapsulated data. This is done by the
sending host. receiving host.
@ccieby30