Layer 8 is a term used to refer to ''user'' or ''political'' layer on top of the 7-layer
OSI model
The Open Systems Interconnection model (OSI model) is a conceptual model that 'provides a common basis for the coordination of SOstandards development for the purpose of systems interconnection'. In the OSI reference model, the communications ...
of computer networking.
The OSI model is a 7-layer abstract model that describes an architecture of data communications for networked computers. The layers build upon each other, allowing for the abstraction of specific functions in each one. The top (7th) layer is the
Application Layer
An application layer is an abstraction layer that specifies the shared communications protocols and interface methods used by hosts in a communications network. An ''application layer'' abstraction is specified in both the Internet Protocol ...
describing methods and protocols of software applications. It is then held that the user is the 8th layer.
Layers, defined
According to
Bruce Schneier
Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is a Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman Klein Ce ...
and
RSA
RSA may refer to:
Organizations Academia and education
* Rabbinical Seminary of America, a yeshiva in New York City
*Regional Science Association International (formerly the Regional Science Association), a US-based learned society
*Renaissance S ...
:
* Layer 8: The individual person.
* Layer 9: The organization.
* Layer 10: Government or legal compliance
Network World readers humorously report:
* Layer 8: Money - Provides network corruption by inspiring increased interference from the upper layer.
* Layer 9: Politics - Consists of technically ignorant management that negatively impacts network performance and development.
and:
* Layer 9: Politics. "Where the most difficult problems live."
* Layer 8: The user factor. "It turned out to be another Layer-8 problem."
* 7 through 1: The usual OSI layers
* Layer 0: Funding. "Because we should always start troubleshooting from the lowest layer, and nothing can exist before the funding."
Since the OSI layer numbers are commonly used to discuss networking topics, a troubleshooter may describe an issue caused by a user to be a ''layer 8'' issue, similar to the
PEBKAC acronym, the
ID-Ten-T Error
A user error is an error made by the human user of a complex system, usually a computer system, in interacting with it. Although the term is sometimes used by human–computer interaction practitioners, the more formal human error term is used i ...
and also
PICNIC
A picnic is a meal taken outdoors ( ''al fresco'') as part of an excursion, especially in scenic surroundings, such as a park, lakeside, or other place affording an interesting view, or else in conjunction with a public event such as precedi ...
.
Political economic theory holds that the 8th layer is important to understanding the OSI Model. Political policies such as
network neutrality
Network neutrality, often referred to as net neutrality, is the principle that Internet service providers (ISPs) must treat all Internet communications equally, offering users and online content providers consistent rates irrespective of c ...
,
spectrum management
Spectrum management is the process of regulating the use of radio frequencies to promote efficient use and gain a net social benefit.Martin Cave, Chris Doyle, William Webb, ''Modern Spectrum Management'', Cambridge University Press, 2007 The ter ...
, and
digital inclusion all shape the technologies comprising layers 1–7 of the OSI Model.
An 8th layer has also been referenced to physical (real-world) controllers containing an external hardware device which interacts with an
OSI model
The Open Systems Interconnection model (OSI model) is a conceptual model that 'provides a common basis for the coordination of SOstandards development for the purpose of systems interconnection'. In the OSI reference model, the communications ...
network. An example of this is ALI in
Profibus.
A network guru T-shirt from the 1980s shows Layer 8 as the "financial" layer, and Layer 9 as the "political" layer. The design was credited to
Evi Nemeth
Evi Nemeth (born June 7, 1940 – missing-at-sea June or July, 2013) was an engineer, author, and teacher known for her expertise in computer system administration and networks. She was the lead author of the "bibles" of system administration: '' ...
.
Similar pseudo-layers for TCP/IP
In the
TCP/IP model
The Internet protocol suite, commonly known as TCP/IP, is a framework for organizing the set of communication protocols used in the Internet and similar computer networks according to functional criteria. The foundational protocols in the suit ...
, the four-layer model of the
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a ''internetworking, network of networks'' that consists ...
, a fifth layer is sometimes analogously described as the ''political layer'', and the sixth as the ''religious layer''. This appears in a humorous
April Fools' Day RFC
April is the fourth month of the year in the Gregorian and Julian calendars. It is the first of four months to have a length of 30 days, and the second of five months to have a length of less than 31 days.
April is commonly associated with ...
, , published in 1998.
Other uses
*
Linux Gazette
''The Linux Gazette'' was a monthly self-published Linux computing webzine, published between July 1995 and June 2011. Its content was published under the Open Publication License.
History
It was started in July 1995 by John M. Fisk as a free s ...
carries a regular column called ''Layer 8 Linux Security''.
* Layers 8, 9, and 10 are sometimes used to represent individuals, organizations, and governments for the user layer of
service-oriented architecture
In software engineering, service-oriented architecture (SOA) is an architectural style that focuses on discrete services instead of a monolithic design. By consequence, it is also applied in the field of software design where services are provided ...
s. See OSI User Layers figure for details.
*
User-in-the-loop
User-in-the-Loop (UIL) refers to the notion that a technology (e.g., network) can improve a performance objective by engaging its human users (Layer 8). The idea can be applied in various technological fields. UIL assumes that human users of a ne ...
is a serious concept including Layer 8 as a system-level model.
* In 2016, a company shipped a product called ''Layer8'' to "bridge the universal divide between PC users and IT managers".
* Layer 8 Conference & Podcast is a professional conference focusing on social engineering and OSINT. The podcast features experts in the fields of social engineering and OSINT.
See also
*
IRL
IRL may refer to:
Places
* Republic of Ireland (ISO 3166-1 alpha-3 country code)
* Irlam railway station (National Rail station code IRL), England
Organizations
* International Rugby League, the governing body for the sport of rugby league
* Indu ...
*
Liveware
References
{{reflist
Network architecture