Trevor Crews
Strayer University
The OSI model is the model developed for computer-to-computer communications over a network. This model breaks down all the functions that occur into seven distinct layers. These layers are, application, presentation, session, transport, network, data link, and the physical layer. Each one encompasses a specific part of the process that occurs during the communication. In order to simplify this think of it like sending a package through the post office. It can be broken down into seven stages or layers for this example. We start with bringing an item or letter to the post office that is to be sent to a determined destination. This is essentially what happens in the application layer. This is the interface between the communication and the entire process as it is in how a computer works. Next the item is packaged and put into a box or envelope. This is similar to how the presentation layer functions. In this layer the communication is formatted, encrypted, and compressed; basically prepared for sending. Our package is then tagged with tracking information and tagging information that allows us to track it and verify if there are any other packages and if needed what order they go in. This is similar to the session layer. Next our package is put into a sorting device of some kind that sorts things based on size to see if it is able to be sent with other shipments or broken down to be sent different ways if it is to large. This is similar to the transport layer of the OSI model. The similarities go on over the next few layers as well. After packages are sorted they couriers inspect the packages and are given the specific routes they are to take in order to deliver the correct packages to the correct recipients. This represents the network layer in that the connections are established between the computers and the routing is also established. Next the packages are loaded onto the means of their transportation. This can include both truck and plane or whatever other method is needed to ensure delivery. This is how the data link layer works. The information is packaged generally in frames and sent via the proper transmission method via the designated route. The first of this process ends with the drivers getting into to their vehicles and driving towards the destinations with the packages. This is the physical layer in which the transmission takes place. After all this takes place it goes back through the same layers in the reverse order to ensure that everything that has happened was in the correct order and method. For example a package arrives at its destination, it’s then unloaded, inspected to make sure its intact and not damaged, signed for to verify the correct address and recipient, unpacked, and finally read. While the process as a whole can be overwhelmingly complex if it is broken down into layers as the OSI model does it can be viewed a little more simplistically and compared to modern day processes. Such as the post office as I have described. There are also many other similarities that if one looked they could make connections to.
Works Cited
Dean, T. (2010). CIS 175: Network + Guide to Networks: 2010 Custom Edition (5th Edition). Boston: Cengage Learning.
Cited: Dean, T. (2010). CIS 175: Network + Guide to Networks: 2010 Custom Edition (5th Edition). Boston: Cengage Learning.
You May Also Find These Documents Helpful
-
Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…
- 254 Words
- 1 Page
Satisfactory Essays -
The value of layers in the OSI reference model is that it divides networking into a series of tasks, and then illustrates how those tasks relate to each other.…
- 3225 Words
- 13 Pages
Powerful Essays -
Cited: Solomon, M., & Kim, D. (2013). Fundamentals of Communications and Networking. Burlington: Jones & Bartlett Learning.…
- 304 Words
- 1 Page
Satisfactory Essays -
The hardware and software functions of the SS7 protocol are divided into functional abstractions called "levels." These levels map loosely to the Open Systems Interconnect (OSI) 7-layer model defined by the International Standards Organization (ISO).…
- 1045 Words
- 5 Pages
Powerful Essays -
The 7 layers can be split logically into two subgroups. Layers 7 thru 4 focus on the end to end communication of data source and destinations. Layers 3 thru 1 are provide consistent communication between the network devices. An easier way of looking at the OSI model is dividing the upper layers (7, 6, 5) from the lower layers (4, 3, 2, 1). The upper layers deal with application issues and are implemented only in software. The highest layer, the application layer, is the closest to the end user. The lower layers are responsible for the transportation of the data. The physical layer and the data link layer are implemented in hardware and software. The lowest layer, the physical layer, is closest to the physical network medium (the wires, for example) and is responsible for placing data on the medium.…
- 1266 Words
- 6 Pages
Powerful Essays -
Layer 3: The network layer...This layer handles the routing of the data (sending it in the right direction to the right destination on outgoing transmissions and receiving incoming transmissions at the packet level). The network layer does routing and…
- 987 Words
- 4 Pages
Good Essays -
Newman, M.E.J., (2003).”The Structure and Function of Complex Networks.” In Slam Review Vol. 45.2, Pp. 167-256…
- 1489 Words
- 5 Pages
Best Essays -
Identify each of the blocks commonly employed and utilize an analogy to sending a physical package to explain what each block does.…
- 593 Words
- 3 Pages
Satisfactory Essays -
2) Even though the OSI model is not directly implemented in networking, it still endures because it is basically a good “rule of thumb” and it sets a sort of idea on how things are supposed to run to keep things in standard.…
- 648 Words
- 3 Pages
Satisfactory Essays -
With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…
- 3788 Words
- 16 Pages
Better Essays -
The point when individuals discuss about OSI, they are typically alluding to what is formally known as the Basic Reference Model (BRM) for Open Systems Interconnection (OSI). The BRM…
- 1263 Words
- 5 Pages
Powerful Essays -
5. What are the seven layers of the OSI model (in order)? What is the role of each layer?…
- 2452 Words
- 10 Pages
Powerful Essays -
Define each layer of the OSI model in your own words and state what each layer provides. Use your textbook or internet research to support your answer.…
- 831 Words
- 4 Pages
Satisfactory Essays -
Here goes: When it comes to developing security protocols for your organization the OSI model will play a critical role in determining what risks are present to each area of the network, by evaluating each layer of the OSI model and protecting each vulnerability found. The physical layer shows us that the physical network and resources need to be protected. Doors to server rooms need to be kept under lock and key, and only authorized personnel need to have access to these resources. Another important part of the physical layer would be the actual data storage and recovery. It is important to have a source for information backup kept offsite, in the case of an environmental disaster on location. The next layer, the data-link layer, exposes a vulnerability in the exposure of datagrams on the network. At the data-link layer there are threats such as MAC flooding,, ARP and Spanning-Tree attacks, or MAC spoofing to gather traffic destined for a different machine. Hackers use these methods to grab data from the network which can include usernames and passwords to even more sensitive information. It is important to disable untrusted Layer 2 ports. This will limit traffic between hosts and close up any vulnerabilities. Layer 2 switches can also establish Virtual Local Area Networks, which separate networks logically on the same physical network. QoS protocols can also provide additional protection by providing better bandwidth utilization. At the network layer, which is responsible for addressing and routing frames, the best path is determined for…
- 1894 Words
- 8 Pages
Good Essays -
The Oss was made by President Roosevelt in 1942. The leader of the OSS, Gen. William j. Donovan, did not first intend it to be an organization of spies. He first wanted it to support operations in the fields. Later Gen. Donovan realized the value of human reporting, and it was made into a spy organization. Gen. Donovan and President Roosevelt created the OSS based off of British intelligence organization which had three branches, it is the secret intelligence (SI) Branch, The special operations (so) branch, and the Morale operations (mo) brach.…
- 456 Words
- 2 Pages
Good Essays