JANN VINCENT PAUL C. LAGMAY
BSIT-1A
Open System Interconnection (OSI)
The Open System Interconnection Reference Model or OSI Reference Model or OSI Model is essentially a conceptual description for layered communications and computer network protocol design. It was created as part of the Open Systems Interconnection or OSI initiative. In its most fundamental form, it separates network architecture into seven distinct layers: the Application, Presentation, Session, Transport, Network, Data-Link, and Physical Layers. As a result it is frequently referred to as the OSI Seven Layer Model. A layer is a collection of theoretically similar functions that provide services to the layer directly above it and obtains service from the layer beneath it. On each single layer an instance provides services to the instances at the layer above and requests service from the layer beneath. An example of this relates to a layer that provides error-free communications across a network which then provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that comprise the contents of the path.
SEVEN LAYERS OF OPEN SYSTEM INTERCONNECTION (OSI)
Layer 7: Application Layer
Defines interface to user processes for communication and data transfer in network
Provides standardized services such as virtual terminal, file and job transfer and operation
Layer 6: Presentation Layer
Masks the differences of data formats between dissimilar systems
Specifies architecture-independent data transfer format
Encodes and decodes data; Encrypts and decrypts data; Compresses and decompresses data Layer 5: Session Layer
Manages user sessions and dialogues
Controls establishment and termination of logic links between users
Reports upper layer errors Layer 4: Transport Layer
Manages end-to-end message delivery in network
Provides reliable and sequential packet delivery through error recovery and flow control mechanisms
Provides connectionless oriented packet delivery Layer 3: Network Layer
Determines how data are transferred between network devices
Routes packets according to unique network device addresses
Provides flow and congestion control to prevent network resource depletion Layer 2: Data Link Layer
Defines procedures for operating the communication links
Frames packets
Detects and corrects packets transmit errors Layer 1: Physical Layer
Defines physical means of sending data over network devices
Interfaces between network medium and devices
Defines optical, electrical and mechanical characteristics
Information Technology Fundamentals
You May Also Find These Documents Helpful
-
Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…
- 254 Words
- 1 Page
Satisfactory Essays -
The value of layers in the OSI reference model is that it divides networking into a series of tasks, and then illustrates how those tasks relate to each other.…
- 3225 Words
- 13 Pages
Powerful Essays -
The hardware and software functions of the SS7 protocol are divided into functional abstractions called "levels." These levels map loosely to the Open Systems Interconnect (OSI) 7-layer model defined by the International Standards Organization (ISO).…
- 1045 Words
- 5 Pages
Powerful Essays -
Layer 4: The transport layer...This layer manages the end-to-end control (for example, determining whether all packets have arrived) and error-checking. It ensures complete data transfer.…
- 987 Words
- 4 Pages
Good Essays -
With OSI (Open Systems Interconnection) was developed to help standardize networking. The OSI model has been an element of computer network design since the early 1980’s. With the OSI model it shows how the network protocols and equipment should communicate and work together as one. With the OSI as a standard with in ISO (International Standards Organization) todays current technology does not always conform to the standard of the ISO, but it…
- 3788 Words
- 16 Pages
Better Essays -
Interconnection (OSI) Model - is a conceptual and logical layout that defines network communication used by systems open to interconnection and communication with other systems.…
- 559 Words
- 3 Pages
Powerful Essays -
Each computer in the network has software that operates at each of the layers and performs the functions required by those layers. Each layer in the network uses a formal…
- 943 Words
- 4 Pages
Good Essays -
Almost all networks in use today are based in some fashion on the Open Systems Interconnection (OSI) standard. The core of this standard is the OSI Reference Model, a set of seven layers that define the different stages that data must go through to travel from one device to another over a network. But the OSI is just a guideline.…
- 374 Words
- 2 Pages
Satisfactory Essays -
The TCP/IP model organizes its standards into layers. The layers make TCP/IP easier for humans to understand what TCP/IP does. It also makes it easier to divide the work among different products. * - write protocols, - create standards, - how networks work*…
- 1243 Words
- 5 Pages
Powerful Essays -
Define each layer of the OSI model in your own words and state what each layer provides. Use your textbook or internet research to support your answer.…
- 831 Words
- 4 Pages
Satisfactory Essays -
Here goes: When it comes to developing security protocols for your organization the OSI model will play a critical role in determining what risks are present to each area of the network, by evaluating each layer of the OSI model and protecting each vulnerability found. The physical layer shows us that the physical network and resources need to be protected. Doors to server rooms need to be kept under lock and key, and only authorized personnel need to have access to these resources. Another important part of the physical layer would be the actual data storage and recovery. It is important to have a source for information backup kept offsite, in the case of an environmental disaster on location. The next layer, the data-link layer, exposes a vulnerability in the exposure of datagrams on the network. At the data-link layer there are threats such as MAC flooding,, ARP and Spanning-Tree attacks, or MAC spoofing to gather traffic destined for a different machine. Hackers use these methods to grab data from the network which can include usernames and passwords to even more sensitive information. It is important to disable untrusted Layer 2 ports. This will limit traffic between hosts and close up any vulnerabilities. Layer 2 switches can also establish Virtual Local Area Networks, which separate networks logically on the same physical network. QoS protocols can also provide additional protection by providing better bandwidth utilization. At the network layer, which is responsible for addressing and routing frames, the best path is determined for…
- 1894 Words
- 8 Pages
Good Essays -
8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI terms. Which of the following is a correctly phrased statement for how to use OSI terminology? B) IP is a…
- 854 Words
- 3 Pages
Satisfactory Essays -
Note: This study guild also include the material covered before midterm for completeness. You can focus on Chapter 4 and 5…
- 578 Words
- 3 Pages
Satisfactory Essays -
The Session layer is equipped to request retransmission of all erroneous or missing PDUs when reassembly is underway, so that it can guarantee reliable delivery of data from sender to receiver.…
- 694 Words
- 3 Pages
Powerful Essays -
4.A paradigm for electronic communications where a message is broken up into blocks of data of limited size which are then transmitted one by one across the network is called:…
- 3425 Words
- 14 Pages
Good Essays