FROM: Student
SUBJECT: Security and the OSI Model
The Open Systems Interconnect (OSI) Model is the basis on which network communications function. Every network application more or less adheres to the standards of the OSI Model. Each layer of the OSI model represents a level of network functionality. For each layer, there are different types of security to protect the network at that layer. The physical layer is the actual medium in which the data travels. This is usually a wire, hub, or over the air. The physical layer can be secured by protecting access to network cables and ports. Data transmitted over fiber optics is much harder to intercept than data being transmitted over copper wire. The data link layer establishes the connection for the physical layer and turns the data from higher layers into the bits that will be transmitted across the medium. Security for the data link layer can be accomplished with port security, MAC address filtering, and wireless encryption. The network layer is the layer that most people think of when it comes to network security. Network firewalls operate by blocking IP addresses which are network layer characteristics. Routers are configured to provide network layer security as well. Any security feature that allows or denies access based on IP address is a level 3 security device. For the top 4 layers of the OSI model security and protocols don't always fall under a single layer. The transport layer plays a major part with SSL and of course TLS (Transport Layer Security). These protocols use encryption and keys to ensure private connections. Communication sessions between hosts are established and terminated at the session layer. There is no security feature directly associated with the session layer exclusively. The protocols for FTP, SMTP, and HTTP take place at the session layer. TCP port numbers are assigned at the session layer and some routers and firewalls may block traffic based on port number. Encryption and decryption take place at the presentation layer. This layer deals with ASCII character representation and the interpretation of characters into readable or usable information. Transmitted data is encrypted by the sender and then decrypted by the receiver at this layer. The final layer is the application layer. Here is where the end application sends the data or receives it from another application. The most common security feature of the application layer is password authentication.
Signed Student, NTC410
You May Also Find These Documents Helpful
-
Being made up of various parts each layer has a unique function in the network. Additionally, each layer incorporates things to the data which is transmitted from one point to the other. The protocols which work on this layer are HDLC, PPP as well as the frame relay protocol. HDLC protocol means High-Level Data Link Control protocol. An additional protocol which works on layers of the OSI model is the Point-to-Point protocol (PPP) that is just like HDLS protocol. The frame relay protocol works at the data links layer of the OSI model (Cisco, 2008).…
- 254 Words
- 1 Page
Satisfactory Essays -
The value of layers in the OSI reference model is that it divides networking into a series of tasks, and then illustrates how those tasks relate to each other.…
- 3225 Words
- 13 Pages
Powerful Essays -
The 7 layers can be split logically into two subgroups. Layers 7 thru 4 focus on the end to end communication of data source and destinations. Layers 3 thru 1 are provide consistent communication between the network devices. An easier way of looking at the OSI model is dividing the upper layers (7, 6, 5) from the lower layers (4, 3, 2, 1). The upper layers deal with application issues and are implemented only in software. The highest layer, the application layer, is the closest to the end user. The lower layers are responsible for the transportation of the data. The physical layer and the data link layer are implemented in hardware and software. The lowest layer, the physical layer, is closest to the physical network medium (the wires, for example) and is responsible for placing data on the medium.…
- 1266 Words
- 6 Pages
Powerful Essays -
Layer 3: The network layer...This layer handles the routing of the data (sending it in the right direction to the right destination on outgoing transmissions and receiving incoming transmissions at the packet level). The network layer does routing and…
- 987 Words
- 4 Pages
Good Essays -
4. The data link layer strips the data-link header and trailer, and then passes the remaining data up to the network layer.…
- 648 Words
- 3 Pages
Satisfactory Essays -
3.1: Networking models Review: The two networking models are TCP/IP which had 5 different layers and the OSI model which has 7 layers. They mainly incorporate the same layers and the only difference is that the TCP/IP layer combines layers 5, 6 and 7 all into layer 5. Both models are along the same line of information and both explain how a network moves data.…
- 324 Words
- 2 Pages
Satisfactory Essays -
With OSI (Open Systems Interconnection) was developed to help standardize networking. The OSI model has been an element of computer network design since the early 1980’s. With the OSI model it shows how the network protocols and equipment should communicate and work together as one. With the OSI as a standard with in ISO (International Standards Organization) todays current technology does not always conform to the standard of the ISO, but it…
- 3788 Words
- 16 Pages
Better Essays -
Answer: C. The physical layer sits just below the data link layer. D. The physical layer sits just below the data link layer.…
- 1325 Words
- 5 Pages
Good Essays -
This layer holds whatever IP will run above, e.g., Ethernet, token-ring, and Fiber Distributed Digital Interface (FDDI) systems. Distinct network protocols, e.g., Ethernet, exertion at this level.…
- 1263 Words
- 5 Pages
Powerful Essays -
Interconnection (OSI) Model - is a conceptual and logical layout that defines network communication used by systems open to interconnection and communication with other systems.…
- 559 Words
- 3 Pages
Powerful Essays -
Each computer in the network has software that operates at each of the layers and performs the functions required by those layers. Each layer in the network uses a formal…
- 943 Words
- 4 Pages
Good Essays -
Almost all networks in use today are based in some fashion on the Open Systems Interconnection (OSI) standard. The core of this standard is the OSI Reference Model, a set of seven layers that define the different stages that data must go through to travel from one device to another over a network. But the OSI is just a guideline.…
- 374 Words
- 2 Pages
Satisfactory Essays -
Here goes: When it comes to developing security protocols for your organization the OSI model will play a critical role in determining what risks are present to each area of the network, by evaluating each layer of the OSI model and protecting each vulnerability found. The physical layer shows us that the physical network and resources need to be protected. Doors to server rooms need to be kept under lock and key, and only authorized personnel need to have access to these resources. Another important part of the physical layer would be the actual data storage and recovery. It is important to have a source for information backup kept offsite, in the case of an environmental disaster on location. The next layer, the data-link layer, exposes a vulnerability in the exposure of datagrams on the network. At the data-link layer there are threats such as MAC flooding,, ARP and Spanning-Tree attacks, or MAC spoofing to gather traffic destined for a different machine. Hackers use these methods to grab data from the network which can include usernames and passwords to even more sensitive information. It is important to disable untrusted Layer 2 ports. This will limit traffic between hosts and close up any vulnerabilities. Layer 2 switches can also establish Virtual Local Area Networks, which separate networks logically on the same physical network. QoS protocols can also provide additional protection by providing better bandwidth utilization. At the network layer, which is responsible for addressing and routing frames, the best path is determined for…
- 1894 Words
- 8 Pages
Good Essays -
In contrast to Beatty, Montage is a character who went through from a literary darkness to self-enlightenment. At first, Montage was ignorant as shown that he enjoyed burning books. But as he met Clarisse, his curiosity has led him to question things in ways he has never done before. Clarisse sparked his curiosity to question things when she asked him whether he was happy. Later on, he was confronted by knowledge as he sees the old lady willing to sacrifice for books. This has led him to reflect on their importance. Montage was eventually determined to gain more knowledge and find greater significance in his life. “Do you know why books such as this are so important? Because they have quality. And what does the word quality mean? To me it means…
- 180 Words
- 1 Page
Good Essays -
PLEASE NOTE: WE DO NOT ENDORSE CHEATING AND ENCOURAGE YOU DO GAIN KNOWLEDGE BY OWN…
- 1828 Words
- 8 Pages
Good Essays