
Layer 8 is a term used to refer to ''user'' or ''political'' layer on top of the 7-layer
OSI model
The Open Systems Interconnection (OSI) model is a reference model developed by the International Organization for Standardization (ISO) that "provides a common basis for the coordination of standards development for the purpose of systems inter ...
of computer networking.
The OSI model is a 7-layer abstract model that describes an architecture of data communications for networked computers. The layers build upon each other, allowing for the abstraction of specific functions in each one. The top (7th) layer is the
Application Layer
An application layer is an abstraction layer that specifies the shared communication protocols and interface methods used by hosts in a communications network. An ''application layer'' abstraction is specified in both the Internet Protocol Su ...
describing methods and protocols of software applications. It is then held that the user is the 8th layer.
Layers, defined
According to
Bruce Schneier
Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is an Adjunct Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman ...
and
RSA:
* Layer 8: The individual person.
* Layer 9: The organization.
* Layer 10: Government or legal compliance
Network World readers humorously report:
* Layer 8: Money - Provides network corruption by inspiring increased interference from the upper layer.
* Layer 9: Politics - Consists of technically ignorant management that negatively impacts network performance and development.
and:
* Layer 9: Politics. "Where the most difficult problems live."
* Layer 8: The user factor. "It turned out to be another Layer-8 problem."
* 7 to 1: The usual OSI layers
* Layer 0: Funding. "Because we should always start troubleshooting from the lowest layer, and nothing can exist before the funding."
Since the OSI layer numbers are commonly used to discuss networking topics, a troubleshooter may describe an issue caused by a user to be a ''layer 8'' issue, similar to the
PEBKAC acronym, the
ID-Ten-T Error and also
PICNIC
A picnic is a meal taken outdoors (Al fresco dining, ''al fresco'') as part of an excursion, especially in scenic surroundings, such as a park, lakeside, or other place affording an interesting view, or else in conjunction with a public event su ...
.
Political economic theory holds that the 8th layer is important to understanding the OSI Model. Political policies such as
network neutrality,
spectrum management
Spectrum management is the process of regulating the use of radio frequencies to promote efficient use and gain a net social benefit.Martin Cave, Chris Doyle, William Webb, ''Modern Spectrum Management'', Cambridge University Press, 2007 The ter ...
, and
digital inclusion all shape the technologies comprising layers 1–7 of the OSI Model.
An 8th layer has also been referenced to physical (real-world) controllers containing an external hardware device which interacts with an
OSI model
The Open Systems Interconnection (OSI) model is a reference model developed by the International Organization for Standardization (ISO) that "provides a common basis for the coordination of standards development for the purpose of systems inter ...
network. An example of this is ALI in
Profibus.
A network guru T-shirt from the 1980s shows Layer 8 as the "financial" layer, and Layer 9 as the "political" layer. The design was credited to
Evi Nemeth.
Similar pseudo-layers for TCP/IP
In the
TCP/IP model
The Internet protocol suite, commonly known as TCP/IP, is a framework for organizing the communication protocols used in the Internet and similar computer networks according to functional criteria. The foundational protocols in the suite are ...
, the four-layer model of the
Internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
, a fifth layer is sometimes analogously described as the ''political layer'', and the sixth as the ''religious layer''. This appears in a humorous
April Fools' Day RFC, , published in 1998.
Other uses
*
Linux Gazette carries a regular column called ''Layer 8 Linux Security''.
* Layers 8, 9, and 10 are sometimes used to represent individuals, organizations, and governments for the user layer of
service-oriented architecture
In software engineering, service-oriented architecture (SOA) is an architectural style that focuses on discrete services instead of a monolithic design. SOA is a good choice for system integration. By consequence, it is also applied in the field ...
s. See OSI User Layers figure for details.
*
User-in-the-loop is a serious concept including Layer 8 as a system-level model.
* In 2016, a company shipped a product called ''Layer8'' to "bridge the universal divide between PC users and IT managers".
* Layer 8 Conference & Podcast is a professional conference focusing on social engineering and OSINT. The podcast features experts in the fields of social engineering and OSINT.
See also
*
IRL
*
Liveware
References
{{reflist
Network architecture
Computer humour