Two networking models describe the communication and transfer of data from one host to another, called
ISO/OSI modeland theTCP/IP model. This is a simplified representation of the so-calledlayersrepresenting transferred Bits in readable contents for us.

The
OSImodel, often referred to asISO/OSIlayer model, is a reference model that can be used to describe and define the communication between systems. The reference model hassevenindividual layers, each with clearly separated tasks.
The term
OSIstands forOpen Systems Interconnectionmodel, published by theInternational Telecommunication Union(ITU) and theInternational Organization for Standardization(ISO). Therefore, theOSImodel is often referred to as theISO/OSIlayer model.
TCP/IP(Transmission Control Protocol/Internet Protocol) is a generic term for many network protocols. The protocols are responsible for the switching and transport of data packets on the Internet. The Internet is entirely based on theTCP/IPprotocol family. However,TCP/IPdoes not only refer to these two protocols but is usually used as a generic term for an entire protocol family.
For example,
ICMP(Internet Control Message Protocol) orUDP(User Datagram Protocol) belongs to the protocol family. The protocol family provides the necessary functions for transporting and switching data packets in a private or public network.
TCP/IPis a communication protocol that allows hosts to connect to the Internet. It refers to theTransmission Control Protocolused in and by applications on the Internet. In contrast toOSI, it allows a lightening of the rules that must be followed, provided that general guidelines are followed.
OSI, on the other hand, is a communication gateway between the network and end-users. The OSI model is usually referred to as the reference model because it is newer and more widely used. It is also known for its strict protocol and limitations.
In a layered system, devices in a layer exchange data in a different format called a
protocol data unit(PDU). For example, when we want to browse a website on the computer, the remote server software first passes the requested data to the application layer. It is processed layer by layer, each layer performing its assigned functions. The data is then transferred through the network's physical layer until the destination server or another device receives it. The data is routed through the layers again, with each layer performing its assigned operations until the receiving software uses the data.

During the transmission, each layer adds a
headerto thePDUfrom the upper layer, which controls and identifies the packet. This process is calledencapsulation. The header and the data together form the PDU for the next layer. The process continues to thePhysical LayerorNetwork Layer, where the data is transmitted to the receiver. The receiver reverses the process and unpacks the data on each layer with the header information. After that, the application finally uses the data. This process continues until all data has been sent and received.
![]()
For us, as penetration testers, both reference models are useful. With
TCP/IP, we can quickly understand how the entire connection is established, and withISO, we can take it apart piece by piece and analyze it in detail. This often happens when we can listen to and intercept specific network traffic. We then have to analyze this traffic accordingly, going into more detail in theNetwork Traffic Analysismodule. Therefore, we should familiarize ourselves with both reference models and understand and internalize them in the best possible way.