November 26, 2012
Understanding the OSI Model The Open Systems Interconnection (OSI) Model is a reference tool for understanding data communications between any two networked systems (Simoneau, 2012). The OSI Model dissects the communication process down to seven layers, where each layer performs specific functions. It helps break a network down to controllable pieces; without this OSI Model networks would be difficult to comprehend. The OSI Models’ seven-layers consist of: physical, data link, network, transport, session, presentation, and application. Within the lower layers (layers 1-3) are based upon mostly hardware, where as the upper layers (layers 5-7) rely typically on software. Between the upper and lower layers resides layer 4, which acts as a divider.
The physical layer concentrates on the transmission of data on the network. One of its fundamentals is how bits are represented on the medium. Binary expression is a stream of 1s and 0s that represent data on a computer network. These streams of 1s and 0s can also be represented through the copper wiring in electrical voltage or the light that is carried through fiber-optic cabling. There are two types of approach: current state modulation and state transition modulation. Current state modulation is the presence or absence of voltage or light that can represent a binary 1 or 0. The other approach, state transition modulation, also represents binary data; this modulation is the transition between voltage or the presence of light that helps indicate a binary value. Layer 1, the physical layer, obviously uses physical topology. Within the physical topology are bus, ring, and star topologies. Asynchronous and synchronous are two basic approaches to bit synchronization. Synchronizing bits is used for two networked devices to communicate effectively in the physical layer. This is so both networked devices can agree upon when one bit stops and another starts. With the asynchronous approach a sender signals that it is about to start transmitting. This is by sending a start bit to the receiver. The receiver then picks up the start bit and starts its own internal clock to measure the subsequent bits. Once the sender transmits its data, it then sends a stop bit to signify that it has finished its transmission. With synchronous approach the networks synchronize the internal clocks of the sender and receiver to guarantee they agree with when the bits begin and end. An external clock, provided by a service provider, is used to make this synchronization happen. This is indited by both sender and receiver. Also with the physical layer, layer 1, is bandwidth usage. Other than bits and bytes and their multiples, probably the second most significant concept to understand about computer measurements is bandwidth, also known as data transfer rate (Mueller, Soper, & Prowse, 2011). Bandwidth usage includes two basic fundamental approaches: broadband and baseband. Broadband technologies divide the bandwidth available on a medium (for example, copper or fiber-optic cabling) into different channels (Wallace, 2012). After dividing the available bandwidth, different communication streams will then convey over the various channels. An example of this is Frequency-Division Multiplexing, or FDM, used by a cable modem that uses specific ranges of frequencies on the cable that comes into a home from a local company to carry incoming data, outgoing data, and other frequency ranges for television stations. Unlike broadband, baseband uses all available frequencies on a medium to transmit data. An example of networking technology using baseband is Ethernet. Following layer 1 is the data link layer, layer 2. The data link layer pertains with packaging data into frames and sending those frames on to the network, performing error detection and correction, identifies network devices with different addresses, and managing flow control. The data link layer has two sub layers: MAC and LLC. MAC stands for Media Access Control. MAC addressing is physical addressing, which has a 48-bit address deputed to a device’s network interface card. MAC addresses are usually written in hexadecimal notation. Of the 48-bit address, the first 24 bits are commonly known as the vendor code. Vendor codes determine the manufacturer of a network device. This determination is based on the first half of the device’s MAC address. In the last 24 bits each vendor is accountable for using their own unique values, so that no two MAC addresses should have the same value. Layer 2 devices consider a network as a logical topology. Logical topology regards bus and ring topologies. When a network is connected with several devices it has allowance to transmit on the media. If not, multiple devices may transfer at the same time and hinder one another’s transmission. Another sub layer to the data link layer is LLC. LLC stands for Logical Link Control. Connection services are used for when a device on a network receives a message from a different device on the network. The receiving device can give feedback to the sender in the form of a message. The two functions provided by messages are flow control and error control. Flow control restricts how much data senders are able to send simultaneously. This is so the receiver is not overwhelmed with more information than it can handle. Error control permits the data receiver to give the sender acknowledgement of the data frame, whether it was received, or if the data was corrupted when received. The network layer, layer 3, is first and foremost concerned with forwarding data based on logical addresses. There are many routed protocols that have their own logical addressing design. Though the most commonly distributed routed protocol is Internet Protocol. At layer 3, switching is making decisions about how data should be forwarded. Packet switching, circuit switching, and message switching are all switching methods. Packet switching has a data stream that is divided into individual packets. Each individual packet contains a Layer 3 header that has a source and a Layer 3 destination address. Circuit switching has a vigorously devoted communication link among two parties in order for them to communicate. A simpler explanation of circuit switching is when two lines open and close at the same time. Message switching is different than packet switching and circuit switching. The data stream in message switching is divided into messages, where the individual messages are tagged with a destination address. On the way to their destination the messages travel from one network device to another. Message switching within a network is sometimes referred to as a store-and-forward network, for the simple fact that some devices may temporarily store messages before forwarding them. Layer 4, the transport layer, serves as a divider between the upper and lower layers. There are two transport layer protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is a connection based transport protocol that provides dependable transports; if a segment is dropped the sender can distinguish it and retransmit it. Windowing is used in TCP connections when one or more segments are sent at the same time. The receiver will acknowledge the receipt of all segments in the window with a single accommodation. The UDP is not a connection based protocol. These connectionless protocols do not provide reliable transports; if a segment drops the sender will not be aware of this. Therefore, no retransmission will arise. Internet Control Message Protocol (ICMP) is another transport layer protocol that may be experienced in this layer. Utilities like ping and traceroute are used with ICMP. The fifth layer, the session layer, is accountable for setting up, maintaining, and tearing down of a session. A session is like a dialogue that should be treated independently from other sessions to avoid crossfire of data from other dialogues. When setting up a session the user’s credentials should be checked, numbers should be assigned to the sessions’ communication flow, and figuring which services are going to be needed during the session and which devices should start the transmission of data. To maintain a session one must transfer data, restoration of a disconnected session, and to allow receipt of data. An example of tearing down a session would be when two networkers are communicating through dial-up and one loses connection. The loss of connection tears down the session.
The presentation layer is the sixth layer. The presentation layer is responsible for formatting of data being exchanged and securing that data with encryption (Wallace, CompTIA Network + N10-005, 2012). The presentation layer handles data formatting with the same techniques as formatting text. Data formatting consists in the presentation layer consists of text, graphics, and even multimedia. Encryption is used to disguise personal data so a malicious user cannot intercept the personal data such as social security numbers or confidential documents. The application layer is the final layer, layer seven. This layer supplies application services within a network. End-user applications, such as Microsoft Word, do not dwell within this layer. E-mail, however, is an application layer service that inhabits the seventh layer. Another basic of layer seven is advertising services that are available. Some of these services send out advertisements to publicize their services to other networked devices. In all, the OSI Model is beneficiary in the aspect that it organizes thoughts of a network and gives network explorers a computer networking language. The main purpose for the OSI Model is to easily comprehend the computer communication of networking.
References
Mueller, S., Soper, M. E., & Prowse, D. L. (2011). CompTIA A+ 220-701 and 220-702. In S. Mueller, M. E. Soper, & D. L. Prowse, CompTIA A+ 220-701 and 220-702 (p. 14). Indianapolis: Pearson Education, Inc.
Simoneau, P. (2012, December 1). Global Knowledge Training LLC. Retrieved from Global Knowledge Web site: http://faculty.spokanefalls.edu/Rudlock/files/WP_Simoneau_OSIModel.pdf
Wallace, K. (2012). CompTIA Network + N10-005. In K. Wallace, CompTIA Network + N10-005 (p. 45). Indianapolis: Pearson Education, Inc.
Wallace, K. (2012). CompTIA Network + N10-005 Authorized Cert Guide. In K. Wallace, CompTIA Network + N10-005 Authorized Cert Guide (p. 35). Indianapolis: Pearson Education, Inc.
References: Mueller, S., Soper, M. E., & Prowse, D. L. (2011). CompTIA A+ 220-701 and 220-702. In S. Mueller, M. E. Soper, & D. L. Prowse, CompTIA A+ 220-701 and 220-702 (p. 14). Indianapolis: Pearson Education, Inc. Simoneau, P. (2012, December 1). Global Knowledge Training LLC. Retrieved from Global Knowledge Web site: http://faculty.spokanefalls.edu/Rudlock/files/WP_Simoneau_OSIModel.pdf Wallace, K. (2012). CompTIA Network + N10-005. In K. Wallace, CompTIA Network + N10-005 (p. 45). Indianapolis: Pearson Education, Inc. Wallace, K. (2012). CompTIA Network + N10-005 Authorized Cert Guide. In K. Wallace, CompTIA Network + N10-005 Authorized Cert Guide (p. 35). Indianapolis: Pearson Education, Inc.
You May Also Find These Documents Helpful
-
Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…
- 254 Words
- 1 Page
Satisfactory Essays -
References: Russell P, Hertz PE, McMillan B, Fenton B, Addy H, Maxwell D, Haffie T, Milsom B. 2014.…
- 1032 Words
- 4 Pages
Good Essays -
The 7 layers can be split logically into two subgroups. Layers 7 thru 4 focus on the end to end communication of data source and destinations. Layers 3 thru 1 are provide consistent communication between the network devices. An easier way of looking at the OSI model is dividing the upper layers (7, 6, 5) from the lower layers (4, 3, 2, 1). The upper layers deal with application issues and are implemented only in software. The highest layer, the application layer, is the closest to the end user. The lower layers are responsible for the transportation of the data. The physical layer and the data link layer are implemented in hardware and software. The lowest layer, the physical layer, is closest to the physical network medium (the wires, for example) and is responsible for placing data on the medium.…
- 1266 Words
- 6 Pages
Powerful Essays -
With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…
- 3788 Words
- 16 Pages
Better Essays -
8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI…
- 1325 Words
- 5 Pages
Good Essays -
Javvin.com, (n.d.). OSI 7 Layers Reference Model For Network Communication. Retrieved on Wednesday, October 20, 2010, from http://www.javvin.com/osimodel.html…
- 1324 Words
- 6 Pages
Powerful Essays -
Interconnection (OSI) Model - is a conceptual and logical layout that defines network communication used by systems open to interconnection and communication with other systems.…
- 559 Words
- 3 Pages
Powerful Essays -
Almost all networks in use today are based in some fashion on the Open Systems Interconnection (OSI) standard. The core of this standard is the OSI Reference Model, a set of seven layers that define the different stages that data must go through to travel from one device to another over a network. But the OSI is just a guideline.…
- 374 Words
- 2 Pages
Satisfactory Essays -
Within a network consists of a model that interlinks computers with one another by its methods and protocols, this model is known as the “Open Systems Interconnection (OSI) model”, (2010. PP.28). It is a framework that defines and dissects its methods protocols into another model consisting of seven different layers. Each different layer increases from one layer to the next, all in which rely on the services the lower level provides to the next until data becomes present upon viewing a computer screen. Seven layers defining the “seven-layer model”, (2010. PP.28), are: physical, data-link, network, transport, session, presentation, and application. Each consists of different functions and purposes.…
- 576 Words
- 3 Pages
Good Essays -
Reilly, J.S., Bates, E.A. and Marchman, V.A. (1998), cited in Mareschal et al (2004) p.140-142.…
- 2494 Words
- 10 Pages
Powerful Essays -
For phase 3 discussion board we are ask to describe and compare the Open Systems Interconnection (OSI) model with another network model. For this assignment I will use the Transmission Control Protocol / Internet Protocol (TCP/IP) model. These models divide the communication process of the network into smaller parts. This helps with design, development, and troubling shooting. The OSI model has 7 layers- 1) Physical, 2) Data Link, 3) Network, 4) Transport, 5) Session, 6) Presentation, 7) Application. The TCP/IP model has 4 layers.…
- 310 Words
- 1 Page
Satisfactory Essays -
Bennett-Alexander, D., & Hartman, L. P. (2007). [University of Phoenix Custom Edition eBook]. : McGraw Hill. Retrieved from University of Phoenix, MGT/434 website…
- 1070 Words
- 5 Pages
Good Essays -
References: Black, R., Allen, L., Bhutta, Z., Caulfield, L., de Onis, M., Ezzati, M., & ... Rivera, J. (2008).…
- 1347 Words
- 6 Pages
Powerful Essays -
Throughout the history of networking, one model has stood the test of time for providing not only insight, but also a foundation by which all networking systems utilize in some form or fashion. The seven layers of the OSI model, which stands for Open System Interconnect, are: Application, Presentation, Session, Transport, Network, Data link, and Physical. These layers are the framework for networking, because they represent the roadmap, rules, and process that every message must adhere to when it is sent across networks. Just as a package is sent from UPS or Fed-Ex with a routing number, a sender, a receiver, an address, and many other things that are involved with the delivery of the package, the same principles can be applied to networking messages or packets by using the OSI model. The Session layer of the OSI Model, “Provides the control functions necessary to establish, manage, and terminate the connections as required to satisfy the user requests,” (Beasley 123). This layer is in direct contact with the user through the different interfaces and the connections can be managed and manipulated in many different ways. For instance if I wanted to terminate my connection because of a severe thunderstorm there are a bunch of ways I could do that. I could pull the plugs; I could disable the router then power it down and power down my switch and then power down the rest of my network. If I operated ITT-Tech’s network and in order to control the employees’ use of the internet and to keep them working, I could put a filter using barracuda on all websites that wouldn’t pertain to work related subjects. It would manage their use of the network and keep them focused on their work. These are just several examples of the Session layer of the OSI Model in action.…
- 1514 Words
- 7 Pages
Best Essays -
References: 1. ^ McCarter, Robert (2005). Louis I. Kahn. London: Phaidon Press. p. 258,270. ISBN 0714840459.…
- 2292 Words
- 10 Pages
Best Essays