Top-Rated Free Essay
Preview

The main benefits of the OSI model

Good Essays
578 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The main benefits of the OSI model
The main benefits of the OSI model include the following: • Helps users understand the big picture of networking • Helps users understand how hardware and software elements function together • Makes troubleshooting easier by separating networks into manageable pieces • Defines terms that networking professionals can use to compare basic functional relationships on different networks • Helps users understand new technologies as they are developed • Aids in interpreting vendor explanations of product functionality Layer 1 The physical layer of the OSI model defines connector and interface specifications as well as the required cables for the job. Electrical, mechanical, functional, and procedural specifications are provided for sending a bit stream on a computer network. Components of the physical layer include: • Cabling system components • Adapters that connect media to physical interfaces • Connector design and pin assignments • Hub, repeater, and patch panel specifications • Wireless system components • Parallel SCSI (Small Computer System Interface) • Network Interface Card (NIC) Layer 2 Layer 2 of the OSI model is the Data Link layer. In this layer it provides the function of: • Allowing a device to access the network to send and receive messages • Offers a physical address so a device's data can be sent on the network • Works with a device's networking software when sending and receiving messages • Provides error-detection capability Common components of this layer are NIC cards, Ethernet and Token ring switches and bridges. Layer 3 Layer 4 Layer 4 being the transport layer of the OSI model offers end-to-end communication between end devices through a network. Depending on the application, the transport layer either offers reliable, connection-oriented or connectionless, best-effort communications. Some of the functions offered by the transport layer include: • Application identification • Confirmation that the entire message arrived intact • Control of data flow to prevent memory overruns • Establishment and maintenance of both ends of virtual circuits • Transmission-error detection • Realignment of segmented data in the correct order on the receiving side The most common transport layer protocols are the connection-oriented TCP Transmission Control Protocol (TCP) and the connectionless UDP User Datagram Protocol (UDP). Layer 5 This is the session layer it provides various services that include tracking the number of bytes that each end of the session has acknowledged receiving from the other end of the session. The session layer allows applications to function on devices to establish, manage, and terminate a dialog through a network. Session layer functionality includes: • Virtual connection between application entities • Synchronization of data flow • Connection parameter negotiations • Acknowledgements of data received during a session • Retransmission of data if it is not received by a device Layer 6 Examples of presentation layer functionality include: • Encryption and decryption of a message for security • Compression and expansion of a message so that it travels efficiently • Graphics formatting • Content translation • System-specific translation Layer 7 The final layer of the OSI is the application layer. It provides an interface for the end user operating a device connected to a network. This layer is what the user sees, in terms of loading an application such as a web browser or email service.The application layer is the data the user views while using these applications. Examples of application layer functionality include: • Support for file transfers • Ability to print on a network • Electronic mail • Electronic messaging • Browsing the World Wide Web

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 4

    • 3225 Words
    • 13 Pages

    The value of layers in the OSI reference model is that it divides networking into a series of tasks, and then illustrates how those tasks relate to each other.…

    • 3225 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Mt1310 Unit 7 Essay

    • 1045 Words
    • 5 Pages

    The hardware and software functions of the SS7 protocol are divided into functional abstractions called "levels." These levels map loosely to the Open Systems Interconnect (OSI) 7-layer model defined by the International Standards Organization (ISO).…

    • 1045 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    The 7 layers can be split logically into two subgroups. Layers 7 thru 4 focus on the end to end communication of data source and destinations. Layers 3 thru 1 are provide consistent communication between the network devices. An easier way of looking at the OSI model is dividing the upper layers (7, 6, 5) from the lower layers (4, 3, 2, 1). The upper layers deal with application issues and are implemented only in software. The highest layer, the application layer, is the closest to the end user. The lower layers are responsible for the transportation of the data. The physical layer and the data link layer are implemented in hardware and software. The lowest layer, the physical layer, is closest to the physical network medium (the wires, for example) and is responsible for placing data on the medium.…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    2) Even though the OSI model is not directly implemented in networking, it still endures because it is basically a good “rule of thumb” and it sets a sort of idea on how things are supposed to run to keep things in standard.…

    • 648 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    3.1: Networking models Review: The two networking models are TCP/IP which had 5 different layers and the OSI model which has 7 layers. They mainly incorporate the same layers and the only difference is that the TCP/IP layer combines layers 5, 6 and 7 all into layer 5. Both models are along the same line of information and both explain how a network moves data.…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With OSI (Open Systems Interconnection) was developed to help standardize networking. The OSI model has been an element of computer network design since the early 1980’s. With the OSI model it shows how the network protocols and equipment should communicate and work together as one. With the OSI as a standard with in ISO (International Standards Organization) todays current technology does not always conform to the standard of the ISO, but it…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    The point when individuals discuss about OSI, they are typically alluding to what is formally known as the Basic Reference Model (BRM) for Open Systems Interconnection (OSI). The BRM…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Interconnection (OSI) Model - is a conceptual and logical layout that defines network communication used by systems open to interconnection and communication with other systems.…

    • 559 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 2 Lab 2.1

    • 374 Words
    • 2 Pages

    Almost all networks in use today are based in some fashion on the Open Systems Interconnection (OSI) standard. The core of this standard is the OSI Reference Model, a set of seven layers that define the different stages that data must go through to travel from one device to another over a network. But the OSI is just a guideline.…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1210

    • 831 Words
    • 4 Pages

    Define each layer of the OSI model in your own words and state what each layer provides. Use your textbook or internet research to support your answer.…

    • 831 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Dq 1 and 2 Week 4

    • 1894 Words
    • 8 Pages

    Here goes: When it comes to developing security protocols for your organization the OSI model will play a critical role in determining what risks are present to each area of the network, by evaluating each layer of the OSI model and protecting each vulnerability found. The physical layer shows us that the physical network and resources need to be protected. Doors to server rooms need to be kept under lock and key, and only authorized personnel need to have access to these resources. Another important part of the physical layer would be the actual data storage and recovery. It is important to have a source for information backup kept offsite, in the case of an environmental disaster on location. The next layer, the data-link layer, exposes a vulnerability in the exposure of datagrams on the network. At the data-link layer there are threats such as MAC flooding,, ARP and Spanning-Tree attacks, or MAC spoofing to gather traffic destined for a different machine. Hackers use these methods to grab data from the network which can include usernames and passwords to even more sensitive information. It is important to disable untrusted Layer 2 ports. This will limit traffic between hosts and close up any vulnerabilities. Layer 2 switches can also establish Virtual Local Area Networks, which separate networks logically on the same physical network. QoS protocols can also provide additional protection by providing better bandwidth utilization. At the network layer, which is responsible for addressing and routing frames, the best path is determined for…

    • 1894 Words
    • 8 Pages
    Good Essays
  • Good Essays

    It230 Wk1 Checkpoint

    • 576 Words
    • 3 Pages

    Within a network consists of a model that interlinks computers with one another by its methods and protocols, this model is known as the “Open Systems Interconnection (OSI) model”, (2010. PP.28). It is a framework that defines and dissects its methods protocols into another model consisting of seven different layers. Each different layer increases from one layer to the next, all in which rely on the services the lower level provides to the next until data becomes present upon viewing a computer screen. Seven layers defining the “seven-layer model”, (2010. PP.28), are: physical, data-link, network, transport, session, presentation, and application. Each consists of different functions and purposes.…

    • 576 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Networking basics

    • 519 Words
    • 3 Pages

    Describe what is meant by soft skills and explain why they are important in networking projects…

    • 519 Words
    • 3 Pages
    Satisfactory Essays