REDLEGG BLOG

The 7-Layer Burrito Mode

Jan 16, 2018 12:55:21 PM  |  by Rocky Vyas

Food
A common thing that can bring even the most opposite parts of the world together to enjoy and celebrate each other’s wonderful cultures. With that being said, it is only right that the tech world uses food to bring those interested in technology, together to learn more and more. Ranging from bytes, cookies, spam, and apple; tech continues to provide “nourishment” or knowledge to those looking to devour it.

So to begin, we are going to dive into the layers of our burrito and understand more about the OSI Layer Model. What is it you might be wondering? Well, the model represents a hierarchy of how the inner workings of a computer communicates with one another. The layers within the CPU provides users with a delicious taste as well as functionality for the system holistically.

Next, let’s get into the ingredients of our TECH BURRITO!.

Ingredient 1
Tortilla also known as the PHYSICAL LAYER for which the burrito begins. As the name implies, this layer consists of the hardware components of a system or a network. This includes voltage levels, cable types, CPU, the wires etc. It is the tortilla that helps keep everything together, and if it gets cut or even broken, well, the entire burrito is going to collapse into a mush of toppings. The best way to limit things such as power outages that may harm business operations, thus breaking that “tortilla” there is a need to have redundancy for all critical hardware so that way if one fails, there is something in place to keep the inner parts running together smoothly.

Ingredient 2
Beans also known as the DATA LAYER. Whether you like black or pinto beans, they add texture and warmth that sets the tone for your burrito to welcome the next toppings you select. Similarly, data links function in the same manner. Each device is given a unique Media Access Control (MAC) address. These addresses ensure that communicating devices are effective in transporting the information to and from one another correctly. The MAC filtering method is also used to create a list that either permits access (whitelisted) or denies access (blacklisted), keeping your information safe and secure or keeping your toppings from getting to the physical, vulnerable layer.

Ingredient 3
Vegetables also known as the NETWORK LAYER. Yes people, eat your leafy greens and understand that vegetables or the network layer is very important. The network layers function is to transfer/route variable lengths of data sequences called datagrams from source to destination, a.k.a. packet forwarding. The layer responds to requests from the transport layer and issues service requests to the data link layer. The most common protocols used are either IPv4 and IPv6. In this layer there are multiple security protocols in place such as Internet Protocol Security (IPsec). IPsec protocols are implemented to ensure there is a mutual authentication from host to host, host to network, and network to network. Much like our vegetables, the network layer protocols provide a sense of security to the other areas within the physical and data layers.

Ingredient 4
Chicken, beef, chorizo, fish or tofu also known as the TRANSPORT LAYER.- Is the most important ingredient in a burrito, especially this one. Whatever your preference of meat, it provides nourishment for our bodies, and the same can be said for this burrito in regards to CPU’s. The transport layer is the dividing line between upper layers and lower layers of the model. Transmission Control Protocol (TCP) is used to establish and confirm there is connection between the host and/or host/network being connected.

Once a connection is confirmed, a tunnel is formed for transporting data segments. Acknowledgments are sent from the opposite side for each data received. If a data segment is lost, there is a detection that takes place so then that segment is resent. User Datagram Program (UDP) is used in the same manner except UDP doesn’t have the checking system that is used in TCP and its main purpose is just to be fast. Transport layer security (TLS) is a cryptographic protocol that provides secure communications over a network, so like mentioned all of this is important as it connects every aspect of the burrito to the other areas.

And alas, we come to the final ingredients. The pico de gallo, cheese, and guacamole.

Ingredient 5
Pico de gallo also known as the SESSION LAYER. This layer controls the dialogue between different computers. It establishes, manages, and even terminates those connections. Specifically, its sole purpose is to make sure sessions are gracefully closed, and session support such as login authentication is completed as well. Much like pico de gallo, this is plain to see and important as it adds yet another aspect to our burrito.

Ingredient 6
Queso or cheese also known as the PRESENTATION LAYER. The presentation layer is responsible for data formatting and translation. This data is translated and used for the application layer. Character translation, data conversion, compression, and encryption occur at this level. Best examples of this include changing the language into english and the asterisks we see when we enter passwords. While some may have to add cheese sparingly (sorry my lactose friends), it is evident that in this burrito we need all the cheese we can get to ensure we are able to access our information.

Ingredient 7
Guacamole also known as the APPLICATION LAYER. This layer, much like guacamole, adds a delicious taste and is used in EVERYTHING. Every application we use whether it’s Chrome, Firefox, Gmail, etc. is at this layer. In lack of better words, it’s the windows into the tech world for users and the networks. To maintain security at this level, an antivirus software does fine (at the minimum of course).

While this is only a short overview of the OSI model, it is important to note that implementation of security at these levels is essential to everyday technology. The physical, data link, network, transport, session, presentation, and application layers are all needed for a network/system to function. The OSI model may literally lack the delicious flavors of a burrito, it does fit well within the tech kitchen of ingredients and recipes needed to continue creating, revising, and implementing features for everyday users to enjoy.

Bon Appetit!

Rocky

Subscribe to Our Blog

Follow everything RedLegg as we provide comprehensive solutions for real-world data protection and security challenges.

Related Articles

6 Steps of Vulnerability Scanning Best Practices blog

6 Steps of Vulnerability Scanning Best Practices

Vulnerability scanning (vuln-scan) is the process of finding exploits, flaws, security holes, insecure access entry ...
How to Maximize your MSS Experience blog

How to Maximize your MSS Experience

Your Managed Security Services provider is a crucial player in your overall security posture, and our number one goal ...