Layer 8
   HOME

TheInfoList



OR:

Layer 8 is a term used to refer to ''user'' or ''political'' layer on top of the 7-layer
OSI model The Open Systems Interconnection model (OSI model) is a conceptual model that 'provides a common basis for the coordination of SOstandards development for the purpose of systems interconnection'. In the OSI reference model, the communications ...
of computer networking. The OSI model is a 7-layer abstract model that describes an architecture of data communications for networked computers. The layers build upon each other, allowing for the abstraction of specific functions in each one. The top (7th) layer is the
Application Layer An application layer is an abstraction layer that specifies the shared communications protocols and Interface (computing), interface methods used by Host (network), hosts in a communications network. An ''application layer'' abstraction is speci ...
describing methods and protocols of software applications. It is then held that the user is the 8th layer.


Layers, defined

According to
Bruce Schneier Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is a Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman Klein Cente ...
and RSA: * Layer 8: The individual person. * Layer 9: The organization. * Layer 10: Government or legal compliance Network World readers humorously report: * Layer 8: Money - Provides network corruption by inspiring increased interference from the upper layer. * Layer 9: Politics - Consists of technically ignorant management that negatively impacts network performance and development. and: * Layer 9: Politics. "Where the most difficult problems live." * Layer 8: The user factor. "It turned out to be another Layer-8 problem." * 7 through 1: The usual OSI layers * Layer 0: Funding. "Because we should always start troubleshooting from the lowest layer, and nothing can exist before the funding." Since the OSI layer numbers are commonly used to discuss networking topics, a troubleshooter may describe an issue caused by a user to be a ''layer 8'' issue, similar to the
PEBKAC A user error is an error made by the human user of a complex system, usually a computer system, in interacting with it. Although the term is sometimes used by human–computer interaction practitioners, the more formal human error term is used in ...
acronym, the ID-Ten-T Error and also
PICNIC A picnic is a meal taken outdoors ( ''al fresco'') as part of an excursion, especially in scenic surroundings, such as a park, lakeside, or other place affording an interesting view, or else in conjunction with a public event such as preceding ...
. Political economic theory holds that the 8th layer is important to understanding the OSI Model. Political policies such as
network neutrality Network neutrality, often referred to as net neutrality, is the principle that Internet service providers (ISPs) must treat all Internet communications equally, offering users and online content providers consistent rates irrespective of co ...
,
spectrum management Spectrum management is the process of regulating the use of radio frequencies to promote efficient use and gain a net social benefit.Martin Cave, Chris Doyle, William Webb, ''Modern Spectrum Management'', Cambridge University Press, 2007 The term ...
, and
digital inclusion Digital inclusion involves the activities necessary to ensure equitable access to and use of Information and communications technology, information and communication technologies for participation in social and economic life including for education ...
all shape the technologies comprising layers 1–7 of the OSI Model. An 8th layer has also been referenced to physical (real-world) controllers containing an external hardware device which interacts with an
OSI model The Open Systems Interconnection model (OSI model) is a conceptual model that 'provides a common basis for the coordination of SOstandards development for the purpose of systems interconnection'. In the OSI reference model, the communications ...
network. An example of this is ALI in Profibus. A network guru T-shirt from the 1980s shows Layer 8 as the "financial" layer, and Layer 9 as the "political" layer. The design was credited to
Evi Nemeth Evi Nemeth (born June 7, 1940 – missing-at-sea June or July, 2013) was an engineer, author, and teacher known for her expertise in computer system administration and networks. She was the lead author of the "bibles" of system administration: ' ...
.


Similar pseudo-layers for TCP/IP

In the
TCP/IP model The Internet protocol suite, commonly known as TCP/IP, is a framework for organizing the set of communication protocols used in the Internet and similar computer networks according to functional criteria. The foundational protocols in the suit ...
, the four-layer model of the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
, a fifth layer is sometimes analogously described as the ''political layer'', and the sixth as the ''religious layer''. This appears in a humorous
April Fools' Day RFC April is the fourth month of the year in the Gregorian and Julian calendars. It is the first of four months to have a length of 30 days, and the second of five months to have a length of less than 31 days. April is commonly associated with ...
, , published in 1998.


Other uses

*
Linux Gazette ''The Linux Gazette'' was a monthly self-published Linux computing webzine, published between July 1995 and June 2011. Its content was published under the Open Publication License. History It was started in July 1995 by John M. Fisk as a free ser ...
carries a regular column called ''Layer 8 Linux Security''. * Layers 8, 9, and 10 are sometimes used to represent individuals, organizations, and governments for the user layer of
service-oriented architecture In software engineering, service-oriented architecture (SOA) is an architectural style that focuses on discrete services instead of a monolithic design. By consequence, it is also applied in the field of software design where services are provide ...
s. See OSI User Layers figure for details. *
User-in-the-loop User-in-the-Loop (UIL) refers to the notion that a technology (e.g., network) can improve a performance objective by engaging its human users (Layer 8). The idea can be applied in various technological fields. UIL assumes that human users of a ne ...
is a serious concept including Layer 8 as a system-level model. * In 2016, a company shipped a product called ''Layer8'' to "bridge the universal divide between PC users and IT managers". * Layer 8 Conference & Podcast is a professional conference focusing on social engineering and OSINT. The podcast features experts in the fields of social engineering and OSINT.


See also

*
IRL IRL may refer to: Places * Republic of Ireland (ISO 3166-1 alpha-3 country code) * Irlam railway station (National Rail station code IRL), England Organizations * International Rugby League, the governing body for the sport of rugby league * I ...
*
Liveware Liveware was used in the computer industry as early as 1966 to refer to computer users, often in humorous contexts, by analogy with computer hardware, hardware and software. It is a slang term used to denote people using (attached to) computers, an ...


References

{{reflist Network architecture