...Axia College Material Appendix C OSI Model Key Terms Table Use the table to define the key terms related to the OSI Model. Describe the functions of any hardware connectivity devices and tools listed. . | | |Function | |Term |Definition |(if applicable) | |Physical layer |This is the first and lowest layer in the |This is when the data is sent on the | | |seven-layer OSI model. |network media by the NIC. | |Data link layer |This is layer two of the OSI model and |The Data link layer is responsible for | | |resides above the Physical Layer and below |communications between adjacent network | | |the Network Layer. |nodes. | |Network layer |The Network Layer is layer three of the OSI|The Network Layer is responsible for | | |model and resides above the Data Link Layer|establishing paths for data transfer | | |and below the Transport Layer...
Words: 590 - Pages: 3
...SHAUN PARE 4/9/12 ESSAY 2/ 500 WORD What is the OSI model the 7 layers The Open Systems Interconnection or (OSI model) “Is an architectural model that represents networking communication. It was introduced in 1978 by the International Organization for Standards to standardize the level of services and types of interactions for computers communicating over a network” (Emdad). The OSI is the standard that sets the path that data must travel through from one computer to another through a network. The OSI does this by the sending the through seven different layers almost like sending the data through checkpoints and at each checkpoint the data must be cleared so it is able to move on to the next stop. This is what the seven layers of OSI do. The data must go each layer, each layer performs a specific task in order to pass the data through to the next layer, and these layers also communicate to the layer above and below to make sure that everything in order. There are seven layers and each one has a specific function that prepares it for next layer the data must pass through all seven layers. The layers are separated into two sets the first is the application set • Application layer 7- This is the layer that provides the interface between the network protocol and the software running on the computer. This layer handles anything that communicates with the internet; this layer also handles any network related activity such as file transfers or reading and sending email. This...
Words: 606 - Pages: 3
...Checkpoint: Week 1 Day 5 OSI Model When we breakdown the OSI model you will see that in the seven layers of the design, a decision is made in the third layer, which WAN protocols operate on is known as the network layer. This layer carries out regular tasks such as pinpointing routings diagrams and end to end addressing. Some layers associate a unit also known as a brouter that works like a bridge and a router. Now on layers two thru four routers and switches work on these layers which are commonly known as the data link layer and the transport layer. As stated earlier on the network layer, which is layer two on the OSI model, is where the routing and addressing are carried out. In the OSI model during the transport layer is where we see the mistake handling and the flow control at work. Finally, synchronizations and assemblies are finished on the fourth layer of the OSI model. Configured of various parts every layer conducts a unique role inside the network. Additionally, each layer incorporates everything to the data which is then transmitted point to point. Protocols at work during this time are known as the frame relay protocol, HDLC, and PPP. The protocol that works as a data link layer is known as the frame relay protocol in the OSI model. The HDLC means high level data link in the model, and the PPP is an additional protocol which works on different layers of the OSI...
Words: 253 - Pages: 2
...Week Four Individual Assignment Kevin M. Gattas University of Phoenix IS Concepts Richard Bohn Purpose The importance of the OSI (open systems interconnection) model is for networks to communicate within the system. It is a system formed to allow a network administrator to perform trouble shooting in a way that is logical and step by step within the OSI model Scope The purpose of this essay is to break down the seven layers of the OSI model. The seven layer model defines a standard by which to computer share data over a network space starting with application layer. It will break each modeling section to lay out a more detailed explanation of how each layer is operated and how they all work together. Also, it will discuss which level this packet filtering routers and firewalls reside at, how packet filtering routers and firewalls protect the network and the concepts of cryptography. The seven layers of the OSI model are: 1. Physical layer 2. Data link layer 3. Network layer 4. Transport layer 5. Session layer 6. Presentation layer 7. Application layer Application Layer (Layer 7) The application layer is the most directly related to computer user because it is the top of the layer hierarchy. This layer provides several application services such as file transfer, resource allocation and whether the identification and verification of the computer is available. This layer is most familiar to us because it is what we commonly...
Words: 1254 - Pages: 6
... Individual Assignment; TCP/IP Architecture and OSI Layers TCP/IP Architecture and OSI Layers [your name here] NTC360 Network and Telecommunications Concept Associate Professor Anthony Bruno January 04, 2011 The purpose of this paper is to describe an OSI (Open Systems Interconnection) Model with details about each of the seven layers. The OSI reference model adopts a layered approach, where a communication subsystem is broken down into seven layers, each one of which performs a well-defined function. Additionally it is important to understand the purpose of the OSI model in the overall networking architecture especially as it relates to the TCP/IP (Transmission Control Protocol/Internet Protocol) Architecture, which also consists of layers each playing a particular role in the networking design. Generally speaking, the network protocol layer, which is similar to the data and network layer of the OSI model includes the protocols that allow clients and applications to send data over the network. This includes TCP/IP, NWLink (IPX/SPX), NetBEUI, Infrared Data Association (IrDA). However, the purpose of this document is to focus on the relationships between the OSI model and the TCP/IP architectures, and how they may interact together. Finally, as demonstration of this relationship a visual diagram has been provided to depicts how the TCP/IP layers correspond to the OSI model and layers. To begin with, it is important to...
Words: 1573 - Pages: 7
...Associate Level Material Appendix C OSI Model Key Terms Table Use the following table to define the key terms related to the OSI model. Describe the functions of any hardware connectivity devices and tools listed. |Term |Definition |Function | | | |(if applicable) | |Physical layer |Will convert bits into signals for outgoing|This will change the data packets to | | |messages and signals into bits for incoming|physical signals which symbolize 1’s and | | |messages.. |0’s and then later will send the physical | | | |signal to the destination. | |Data link layer |Will work with frames and is intermediary |The layer splits data that is obtained from| | |between Network layer and Physical Layer. |the network later to the frames and the | | | |physical layer can transmit. It will also | | | ...
Words: 794 - Pages: 4
...Week 3 Team Assignment NTC/362 November 24, 2014 OSI Model The Open Systems Interconnection (OSI) has been a reference for model network protocols since the mid-1990s. The OSI is formally known as the Open Systems Interconnection (OSI) model ISO/IEC 7498-1. The International Organization for Standardization (ISO), is a global standards-settings group that is comprised of members from various national standards groups. International Electrotechnical Commission (IEC) is another global standards-settings group; however, it focuses on electrical, electronic, and related technologies. (Foundational Focus: OSI Model-Breaking Down the Seven Layers, 2013) The OSI model is comprised of seven layers, with layer one positioned at the bottom of the layer stack and layer seven at the top. The layers have assigned names as well as number references. Layer 7, the application layer, is the interface between the protocol stack and application software. The software might be client or utilities or server services. It is the ability of software to communicate with the standardized interface of application layer protocols that makes network communications possible. Layer 6, the presentation layer, establishes the context between disparate application layer protocols. Effectively, the presentation layer adjusts syntax, semantics, data types, data formats, etc. This layer ensures that data sent by the application is compatible with the lower layers of network communication and that data...
Words: 2317 - Pages: 10
... Assignment 01 | Advanced Network and Security | | ICT/12/0121 WMIL Wasalage | 9/23/2013 | | Abstract This document contains a detailed explanation about the ISO OSI Reference Model used in networking and it also contains details about the networking devices used in setting up LANs & WANs. Abstract This document contains a detailed explanation about the ISO OSI Reference Model used in networking and it also contains details about the networking devices used in setting up LANs & WANs. Acknowledgement I would like to express my special thanks of gratitude to Mrs. Punsisi Premaratne who gave me this opportunity to do this project in the networking field. Secondly i would like to thank my parents and friends who helped me a lot in finalizing this project within the limited time frame. Acknowledgement I would like to express my special thanks of gratitude to Mrs. Punsisi Premaratne who gave me this opportunity to do this project in the networking field. Secondly i would like to thank my parents and friends who helped me a lot in finalizing this project within the limited time frame. Table of Contents Abstract 01 Acknowledgement 02 Table of Content 03 List of Figures 04 1.0 Introduction to ISO OSI Reference Model 05 1.1 Physical Layer 07 1.2 Data Link Layer 08 1.3 Network Layer 10 1.4 Transport Layer 11 1.5 Session Layer 12 1.6 Presentation Layer...
Words: 5991 - Pages: 24
...|Week Two Check Point: OSI Model Key Terms Table | | |Points Earned |Points Possible | | |Suggested response: | | | |Term | | | |Definition | |Function | |(if applicable) | | | |Physical layer...
Words: 556 - Pages: 3
...the Web, Web designing using HTML, CSS and Java Scripting Client side & server side processing, Cookies, Maintaining state in a stateless environment, two tier/ntier architecture Security issues on the internet, Firewalls, Proxy Server, Virtual Private Network Cryptography and Public key infrastructure (PKI), Certification Authorities and Digital Certificates, Digital signatures Technology Electronic Payment Systems – Virtual Pin payment system, Centralized account system, Electronic Check, E-Cash, SSL and SET based payment systems E-business– advantages/disadvantages, Paper and electronic catalogues Electronic Data Interchange (EDI) E-business models Internet marketing Data mining and knowledge discovery Process, OLAP, Types and business application of data mining E-business strategy, supply chain/value chain analysis and Porter’s model, role of e-commerce in competitive strategy E-banking, ERP Legal/policy issues in e-commerce –salient features of Electronic Transactions Ordinance, 2002 in Pakistan Territorial jurisdiction and conflict of laws, online contracts, online defamation, Copyright in Cyberspace Issue of ISP’s liability, domain-name and trade mark conflicts, privacy issue on the internet, Cyber crimes Suggested books Electronic Commerce (4th edition) by Gary P. Schneider Electronic Commerce : Security, Risk Management and Control by Greenstein & Feinman Electronic commerce – A Managerial Perspective by Turban et al. Absolute Beginner’s Guide to Networking (3rd edition)...
Words: 9120 - Pages: 37
...ITS3103: Week 5– Assignment 2 18 March 2014 Tim Williams Professor Afzal South University ITS3103: Week 5– Assignment 2 18 March 2014 Tim Williams Professor Afzal South University Network Design Blue Print: PaintisDead.com (Vehicle Vinyl Wrapping Design Company). The company designs vehicle graphics for commercial and private vehicles and buildings. PaintisDead.com is headquarters is located in Miami, Florida (75 employees to include corporate management). Telecommunication Network Design needs to accommodate the headquarters and 5 satellite cities with at least 35 employees to include general manager in each store. Store locations are in Savannah Georgia, Fayetteville North Carolina, Richmond Virginia, Jacksonville Florida, and Dover Delaware. The company needs to have a telecommunication system that is efficient and cut down on business trips between all the stores to include the headquarters. Video conferencing, VoiP, push to talk cell phones for sales and design, computer network to protect design ideas when they are being transferred to other stores or when accessed on the server. * Does the client already have an established network and do they want to improve on it? Update vs. full network installation. * Does the client have a network? * What is the client’s budget? * What are the clients plans for growth? (Scalability of network to accommodate the rise in business 5yr vs. 10yr. * Security Considerations. * Used, non-used/free...
Words: 5175 - Pages: 21
...Question: Write a 2-3 page paper describing the OSI model and how it relates to a network. Your response should include answers to the following: • On which layers of the OSI model do WAN protocols operate? • What are some of these protocols? • On which OSI layers do switches and routers operate? • If routers reside at more than one layer, what is the difference between the OSI layers? Introduction: The OSI model was introduced in 1984. Although it was designed to be an abstract model, the OSI model remains a practical framework for today's key network technologies like Ethernet and protocols like IP. The OSI model defines internetworking in terms of a vertical stack of seven layers. The upper layers of the OSI model represent software that implements network services like encryption and connection management. The lower layers of the OSI model implement more primitive, hardware-oriented functions like routing, addressing, and flow control. In the OSI model, data communication starts with the top layer at the sending side, travels down the OSI model stack to the bottom layer, then traverses the network connection to the bottom layer on the receiving side, and up its OSI model stack. How OSI model relates to a network: Information being transferred from a software application in one computer system to a software application in another must pass through the OSI layers. For example, if a software application in System A has information to transmit to a software application...
Words: 845 - Pages: 4
...Review Questions for Test-1 (with Answers): Chapter 1: Introduction to Data Communications Outline 1.1 Network Basics 1.2 Network Layer Model (most important) 1.3 Network Standards 1.4 Future Trends (least important) Answers to End-of-Chapter Questions 1. Describe the progression of communications systems from the 1800s to the present. Communications systems progression from the 1800s to the present: 1837 Invention of the telegraph 1876 Invention of the telephone 1877 Telephone system regulation begins in Canada 1878 Telephone system regulation begins in the United States 1879 Direct dialed long distance service begins 1880 Satellites begin to transmit international telephone calls 1881 Caterfone court decision permits non-Bell telephone equipment to be used 1970 Court permits MCI to provide long distance services 1984 Breakup of AT&T 1985 Cellular phones enter service 1996 Telecommunications Act of 1996 deregulates American telephone system 2. Why are network layers important? Communication networks are often broken into a series of layers, each of which can be defined separately, to enable vendors to develop software and hardware that can work together in the overall network. 3. Describe the four layers in the network model used in this book and what they do. • The application layer is the application software used by the user. • The network layer takes the message generated...
Words: 29622 - Pages: 119
...Open System Interconnection (OSI) The Open Systems Interconnection (OSI) model is considered a critical element regarding all computer network design since 1984. The OSI model is a basic model detailing the protocols a network and the related equipment illustrating how they work together through communication. The International Standards Organization (ISO) has created the technology for the OSI model to be maintained at high standards and helps today’s technology remain of constant use when studying network architecture. The OSI has created levels called: application, physical, network, data link, session, transport, and presentation. The layers are identified by 1 through 7, starting from the bottom to the top. Each of these levels is N+1 entity or N layers. They will request help another layer or N entity by communicating through protocols transmitted by data units. The physical layer’s majority functions are: defining the physical and electrical specifications of the data connection. The data link layer provides a link that can be relied upon to directly connect to the physical layer through the use of nodes. This connection will help in the detection and the possible correction of errors that could be found. The layers help provide procedures for transferring data in various sequences for functional purposes, or datagrams at various lengths from one node to another that node that is connected to a network at the same time. The next layer is transport. In this layer...
Words: 368 - Pages: 2
...This report was generated Using Two vulnerability scans Netwitness and Zenmap investigators. A list of the information will be listed below to be reviewed and analyzed with Company management department for further investigations, modifications and implementations if needed. Services: The scan shows the use of the following services: Services Use Msrpc A tool for running processes on a remote computer. netbios-ssn It provides services related to the session layer of the OSI model allowing the applications on a separate computer to communicate microsoft-ds This port replaces the notorious Windows NetBIOS trio (ports 137-139), for all versions of Windows after NT, as the preferred port for carrying Windows file sharing and numerous other services. ms-wbt-server Virtual data connection that can be used by programs to exchange data directly, instead of going through a file or other temporary storage location. wsdapi Used to develop client applications that find and access devices, and to develop device hosts and associated services that run on Windows Vista and Windows Server 2008. Unnecessary services and removing them: Ideally, a Web server should be on a dedicated, single-purpose host. When configuring the OS, disable everything except that which is expressly permitted—that is, disable all services and applications, re-enable only those required by the Web server, and then remove the unneeded services and applications. If possible, install the...
Words: 429 - Pages: 2