This website uses cookies to ensure you have the best experience. Learn more

Osi Model Essay

564 words - 3 pages

The OSI Model

The OSI Model
The OSI model describes how data flows in a network. From the top, highest level containing applications for the everyday user down to the bottom level of the physical connections, data and information passes through every layer which in turn can talk to the layers above and below it. Every layer is made up of complicated software. When that software and its components receive information, commonly called packets, from another source it checks it and then sends it back through if necessary (Breithaupt & Merkow, 2006, Chapter 12). The OSI Model is comprised of seven layers, each distinctly different but yet each function and communicate with the others.
Application layer
The application layer is the one most computer users are the most familiar with, whether it is known to them or not. This is where user forward software operates, such as ...view middle of the document...

This layer also handles any restart and recovery functions necessary.
Transport layer
The transport layer provides integrity for point-to-point data transmissions. The transmission control protocol lives in this layer, working to allow the connecting of two computers with each other. During this connection the computers will stream data to each other, the integrity and order of that data being maintained by the TCP.
Network layer
The network layer monitors and decides what path data will take. Controlling the operation of the subnet makes sure the data goes to the correct placed based on a variety of factors present and identified by the software.
Data link layer
The data link layer is responsible for establishing communication between devices, converting that transferred information to deliverable data to the lowest layer, the physical layer.
Physical Layer
The physical layer is the lowest of the OSI model. This layer manages the sending and receiving of a raw stream of data and information through a network. This layer consists of the various mechanical, optical, electrical, and functional interfaces that carry the information to all of the higher layers.
Packet-filtering routers and firewalls
Packet-filtering routers and firewalls control the flow of data at differing layers. The transport and network layers often come into play first, as this is where a firewall will ascertain if the packets are from a trusted source or not. Firewalls know little about the information contained in the packet at this level, but provide an amount of security nonetheless. Packet filtering looks more in-depth into the content of the packets. When the packets flow through the filter it is analyzed according to a pre-set standard. If information does not match or does not meet a certain quality the packet is denied, not going any further into the system.

Breithaupt, J., & Merkow, M. (2006). Information Security: Principles and Practicies. Retrieved from The University of Phoenix eBook Collection.

Other Papers Like Osi Model

Netw420 Week 2 Assignment

861 words - 4 pages . Simple Network Management Protocol (SNMP) is used by network management systems to manage an IP network’s devices (Schmidt, 2001). It contains the set of standards that a network management system uses. It operates at the application layer of the OSI model. The agent receives data on UDP port 161 while the manager receives data on UDP port 162 (Hardaker, 2011). SNMP doesn’t choose the type of information that a network management system

Patton-Fuller Community Hospital Networking Essay

1230 words - 5 pages local community. In order for the organization to function correctly, it must have a good IT infrastructure to support their organization in order to achieve their goals and potential growth. Lets do an analysis of Patton-Fuller Community Hospital network system t o see if changes can be made to enhances the wireless and check to see if their any changes that can be made to make the network more efficient? Analysis of Network System The OSI

Indp Phase 22

1165 words - 5 pages (converts the language of 1’s and 0’s into a readable language). Based on these procedures protocols are often defined by standards bodies. A protocol must be flawlessly designed in order to ensure efficient communication. Protocols are also described as hardware or software components that carry out the OSI model guidelines for transferring information on a network. Kudler Fine Foods intends to use Internet Protocol (IP) over a wide area network to

Ubuntu Dns Server

1296 words - 6 pages | 50% | 4 | Evaluate how a networking operating system uses the OSI model | Task 1 | 30 | 20% | 5 | Compare and contrast two network operating systems | Task 4 | 30 | 30% | Task Number | Marks allocated | Marks obtained | 1 | 30 | | 2 | 20 | | 3 | 20 | | 4 | 30 | | Total Marks | 100 | | Instructions: 1. You should attempt ALL the questions in this test. 2. Check all the tasks in the assessment 3. Task One

Open Source Software

3534 words - 15 pages 3- Anyone must be allowed to modify the source code 4- Modified versions can be redistributed 5- The license must not require the exclusion of other software or interfere with the operation of other software Here, in summary form, is the most recent version of the Open Source Definition (OSD) from the website of OSI. 1. Free Redistribution The license shall not restrict any party from selling or giving away the software as a

Networks / Data Communications

3575 words - 15 pages as the translator needed to decipher between an English-speaking person and French-speaking person. They can translate between different applications, protocols or LAN technologies and they operate at all levels of the OSI model except the physical layer. Some examples include: ➢ SAP to PeopleSoft gateways, ➢ TCP/IP to Novell IPX gateways, and ➢ Token Ring to Ethernet gateways. Putting it all together All Information Technology (IT

Wireless Glossary

4427 words - 18 pages messages into packets, routing and transporting the packets over network connections, and then reassembling the packets at their destination. IP corresponds to the network layer in the ISO/OSI model. IP (Internet Protocol) ... Term Simple Definition A 32 -bit binary number that identifies the location of a specific computer on the Internet. Any computer directly IP address connected to the Internet must (Internet Protocol address) have

Lafarge S.A

2924 words - 12 pages NAME: IHEKANANDU KINGSLEY N. COURSE: MGMT 292 / F12 N01 TITLE: INDIVIDUAL CASE STUDY (LAFARGE S.A.) SUBMITTED: October 5, 2012 TABLE OF CONTENTS 2. INTRODUCTION 3 3. DESCRIPTION OF CASE 4 4. VALUES 4 4.1. Types of values 4 5. TEAMWORK 7 6. MOTIVATION 8 7. CREATIVITY 9 7.1. Components of creativity 9 8. CONCLUSION 12 9. BIBLIOGRAPHY 13 INTRODUCTION This report aims to provide an in-depth analysis of initiatives pursued by Lafarge as


665 words - 3 pages Financial statements are the most common tool used for making business decisions. They consist of the balance sheet, income statement and statement of cash flows. The analysis tools used affect all aspects of a company not just a few. A systematic review of the resources a company used to achieve its mission is cost control. Cash flow should be kept at necessary levels for operations is one of the major benefits of cost control. It is a very

Analysis Of Operation Blue Star And Its Effects On The Gandhi Dynasty

934 words - 4 pages The period of time including and following Operation Blue star is considered a dark time in India and black spot in Indian history. It is a time Indian would rather forget, yet still to this day debate about. Was Indihar Gandhi correct in instating operation Blue Star, inflicting damage to the Golden temple, and being responsible for the killing of anywhere from 492 (official reports) to 1500 (estimates run as high as) civilians, which lead to an

Regretful Decisions

930 words - 4 pages Regretful Decisions There are many individuals in a child’s life that helps mold them into a well-rounded adult. In most cases, this guidance comes from the child’s parents or other older, but in Sonny’s case, this guidance was expected from his older brother. In the short narrative, Sonny’s Blues, Sonny’s life was adversely affected by the decisions that his older brother made. The decisions that his brother made include leaving Sonny to stay

Related Essays

Isds409 Chapter8 Essay

395 words - 2 pages 1.Chapter 1, Question13: Describe the five layers in the Internet network model and what they do. Answer: Physical Layer : used by application program , transfer a series of electrical, radio, or light signals through the circuit. Data Link Layer : It performs the same three functions as the data link layer in the OSI model. First, it controls the physical layer by deciding when to transmit messages over the media. Second, it formats the

Week 5 Assignment

481 words - 2 pages travels in two directions, but in only one direction at a time, similar to a walkie-talkie. Traditional shared Ethernet uses half-duplex transmissions. Full-duplex Data travels in two directions simultaneously, similar to a phone conversation. Full-duplex Ethernet (or switched Ethernet) supports full- duplex transmissions in a switched environment. 2. List the seven layers of the OSI model, including both layer number and name for each

Crytographic Tunneling Essay

1193 words - 5 pages , 2011). The Opened Systems Interconnect (OSI) Model is a great example of tunneling. The OSI model is divided into seven layers and each layer provides a different task. The below chart is the OSI model (Petri, 2009). In the above chart data is transmitted and received. The user creates the data and now the user wants to send the data to another user or the desired destination. The data has to go through fourteen steps in order to

Ntc/362 Fundamentals Of Networking Team Paper

3457 words - 14 pages IT data center. The OSI, otherwise known as the Open Systems Interconnection protocol is the model that is of course standard at the seven layer framework utilized by the industry. These protocols are important because they establish the communication rules. Two devices that require each other to communicate on a network must follow a set of rules to ensure they are compatible to each other. The seven layers of the OSI specify the