Layer 8 Explained

Layer 8 is a term used to refer to user or political layer on top of the 7-layer OSI model of computer networking.[1]

The OSI model is a 7-layer abstract model that describes an architecture of data communications for networked computers. The layers build upon each other, allowing for the abstraction of specific functions in each one. The top (7th) layer is the Application Layer describing methods and protocols of software applications. It is then held that the user is the 8th layer.

Layers, defined

According to Bruce Schneier and RSA:

Network World readers[3] humorously report:

and:

Since the OSI layer numbers are commonly used to discuss networking topics, a troubleshooter may describe an issue caused by a user to be a layer 8 issue, similar to the PEBKAC acronym, the ID-Ten-T Error and also PICNIC.[4]

Political economic theory[5] holds that the 8th layer is important to understanding the OSI Model. Political policies such as network neutrality, spectrum management, and digital inclusion all shape the technologies comprising layers 1–7 of the OSI Model.

An 8th layer has also been referenced to physical (real-world) controllers containing an external hardware device which interacts with an OSI model network. An example of this is ALI in Profibus.

A network guru T-shirt from the 1980s shows Layer 8 as the "financial" layer, and Layer 9 as the "political" layer.[6] The design was credited to Evi Nemeth.

Similar pseudo-layers for TCP/IP

In the TCP/IP model, the four-layer model of the Internet, a fifth layer is sometimes analogously described as the political layer, and the sixth as the religious layer. This appears in a humorous April Fools' Day RFC,, published in 1998.

Other uses

See also

Notes and References

  1. Web site: The Layer 8* Initiative. 2005-01-05. North Carolina State University, Information Technology Division. https://web.archive.org/web/20131029200727/http://www.ncsu.edu/it/cmptplans/layer8/. 2013-10-29. dead. 2018-05-10.
  2. Web site: Engineering Security Solutions at Layer 8 and Above. 2010-12-07. Ian. Farquhar. https://web.archive.org/web/20130524214239/http://blogs.rsa.com/engineering-security-solutions-at-layer-8-and-above/. 2013-05-24. dead. 2018-05-10.
  3. Web site: Wexler. Steve Taylor and Joanie. 2003-02-13. Mailbag: OSI Layer 8 - money and politics. 2021-11-19. Network World. en.
  4. Web site: Layer 8 Performance Issues. Apposite Tech. 2017-10-30. 2018-05-10.
  5. .
  6. Web site: 2015-01-14 . ISC 9-Layer OSI Model Cotton T-Shirt . 2024-06-11 . ISC.
  7. Layer 8 Linux Security: OPSEC for Linux Common Users, Developers and Systems Administrators. Lisa. Kachold. 164. Linux Gazette. July 2009.
  8. Web site: OctoInsight's Layer8 technology helps rebranded company surge. 2016-06-09. Prnewswire. 2018-05-10.