Preview

Network Security at OSI Layer

Good Essays
Open Document
Open Document
7615 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Security at OSI Layer
Network Security at OSI Layers
Muhammad Muzammil
Syed Zeeshan Nasir
Department of computer science FUUAST, Islamabad

1-OSI Model:
In 1983, the International Organization for
Standardization (ISO) and the International
Telegraph and Telephone Consultative
Committee (CCITT) merged documents and developed the OSI model, which is based on a specific hierarchy where each layer builds on the output of each adjacent layer.
The OSI model is a protocol stack where the lower layers deal primarily with hardware, and the upper layers deal primarily with software. The OSI model’s seven layers are designed so that control is passed down from layer to layer. The seven layers of the
OSI model are shown:
Layers
Functionality
Application
Application support such as
File Transfer Protocol (FTP),
Telnet, and
Hypertext Transfer Protocol
(HTTP)
Presentation Encryption, Server Message
Block (SMB), American
Standard Code for Information Interchange
(ASCII), and formatting
Session
Data flow control, startup, shutdown, and error detection/
Correction
Transport
End-to-end
communications, UDP and
TCP services

Network

Data link

Physical

Routing and routable protocols such as IP and
Open Shortest Path
First (OSPF). Path control and best effort at delivery
Network interface cards,
Media Access Control (MAC) addresses, framing, formatting, and organizing data
Transmission media such as twisted-pair cabling, wireless systems, and fiber-optic cable

1.2-Functions of OSI Model:
The OSI model functions as follows:
1. Information is introduced into the application layer and passed down until it ends up at the physical layer.
2. Next, it is transmitted over the physical medium (i.e., wire, coax, or wireless) and sent to the target device.
3. Once at the target device, it proceeds back up the stack to the application layer.

1.3-Explanation of Layers:
The Application Layer:
Layer 7 is known as the application layer.

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 4

    • 3225 Words
    • 13 Pages

    The value of layers in the OSI reference model is that it divides networking into a series of tasks, and then illustrates how those tasks relate to each other.…

    • 3225 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Mt1310 Unit 7 Essay

    • 1045 Words
    • 5 Pages

    The hardware and software functions of the SS7 protocol are divided into functional abstractions called "levels." These levels map loosely to the Open Systems Interconnect (OSI) 7-layer model defined by the International Standards Organization (ISO).…

    • 1045 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    The 7 layers can be split logically into two subgroups. Layers 7 thru 4 focus on the end to end communication of data source and destinations. Layers 3 thru 1 are provide consistent communication between the network devices. An easier way of looking at the OSI model is dividing the upper layers (7, 6, 5) from the lower layers (4, 3, 2, 1). The upper layers deal with application issues and are implemented only in software. The highest layer, the application layer, is the closest to the end user. The lower layers are responsible for the transportation of the data. The physical layer and the data link layer are implemented in hardware and software. The lowest layer, the physical layer, is closest to the physical network medium (the wires, for example) and is responsible for placing data on the medium.…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    If the user can access the file server using an IP address but not a name, then the most likely reason for failure to connect is a name resolution problem. Name resolution can fail for NetBIOS or DNS host names. If the client operating system is NetBIOS dependent, the VPN clients should be assigned a WINS server address by the VPN server. If the client operating system uses DNS preferentially, VPN clients should be assigned an internal DNS server that can resolve internal network host names.…

    • 1528 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    2) Even though the OSI model is not directly implemented in networking, it still endures because it is basically a good “rule of thumb” and it sets a sort of idea on how things are supposed to run to keep things in standard.…

    • 648 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Essay

    • 418 Words
    • 2 Pages

    The Application Layer is launched when an application operation starts. It starts the communication with another computer when an application starts. It is in software packages that use client-server software. Examples of services within this layer are DNS, web browser, and NFS.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The first characteristic in the LAN architecture is the physical arrangement of the network. This is how the nodes connect. The topology of an LAN is the design pattern of interconnections between the computers and network sectors. The second component is the method of access for the nodes. Specifically, how the nodes connect to the transmission medium. A network interface card is a device that permits computers to be joined together in a network. The NIC acts as the translator; it allows the devices to direct data on the LAN. The NIC has a port to insert a cable that allows the device to be connected the network.…

    • 620 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Internal controls for Information Technology are important as they help protect the company’s assets. Internal controls are necessary to comply with the security of the company’s information. Internal controls will be reviewed in this document as well as how can the company review its security over their internal controls.…

    • 643 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Operating System Security

    • 642 Words
    • 3 Pages

    Security is the most important part of an operating system when it comes to keeping the system and its information safe. There are various aspects to the security piece in an operating system; which are protocols, kernel and encryption. The UNIX/LINIX, Apple and Windows Server 2008 all have protocol, kernel and encryption features. These features need to be enabled to the highest level in order to have the most security for each of these operating systems. Even though some of these features are already enabled to some level by default, the security level still can be raised for more protection. Starting with the UNIX/LINUX versus Apple operating systems, the most secured versions of these operating systems will be used to demonstrate which is more secured. There are two aspects of these operating systems, desktop and server, however we will stay with the desktop versions of these operating systems. This will allow a more forward approach, so that it will be more understandable for the end user. The LINUX Red Hat Enterprise edition offers the most security of any of the other editions of UNIX/LINUX desktop versions. The protocols of this operating system offer some level of security but there are no new approved security measures built into the security stack. This allows hackers/attacker to be able to gain access easier than newer security measures. One of the newest measures of security in LINUX is SELinux this includes enhancements to the kernel in the LINUX operating system. It provides a security measures that enables access control security policies. This level of security also includes MAC (mandatory access controls) which is a government style level of security measure. This kernel security measure is the highest level of security that this operating system has to offer. When looking into the Apple operating system, OS X offers the most protection of any version of Apple operating system. One of the main security…

    • 642 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Network Architecture

    • 588 Words
    • 3 Pages

    Network architecture is a combination of topology and protocols. In this paper, I will discuss topology, which is the defined as the shape of a network or how a network is laid out. Topology also consists of how the different components or nodes of a network are connected and how they communicate with each other. Topologies are either logical or physical. In addition, in the sections of this paper, I will compare and contrast some different conventional architecture and what types of topologies and protocols they use. Examples of some of these architectures are Ethernet, Token Ring, and FDDI, just to name a few.…

    • 588 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system.…

    • 5714 Words
    • 23 Pages
    Satisfactory Essays
  • Good Essays

    - A proposed standard is elevated to draft standard status after atleast two successful independent and interoperable implementations.…

    • 524 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Note : This paper contains fifty (50) objective type questions, each question carrying two (2) marks.…

    • 1496 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    revised NETWORKING

    • 1075 Words
    • 7 Pages

    Tomas Claudio Memorial College aspires to be a community-based institution of learning dedicated to academic excellence, employing democratic and ideal leadership to deliver educational services geared towards the attainment of quality life among its clientele.…

    • 1075 Words
    • 7 Pages
    Satisfactory Essays
  • Better Essays

    System Security

    • 1174 Words
    • 5 Pages

    a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.…

    • 1174 Words
    • 5 Pages
    Better Essays