Free Essay

Osi Model Protocol

In:

Submitted By keeshmac
Words 973
Pages 4
OSI Model Protocol
Keisha Bullock
NTC 361
December 9, 2013
University of Phoenix (Axia)
Bruce Yamashita

OSI Model Protocol Open System Interconnection (OSI) is a recommended suggestion for how messages should be transferred between any two users in a telecommunication network. The purpose of the OSI is to direct product implementers so that their items will regularly work with other items. The OSI model outlines seven layers of function that happens at each end of a message. The main purpose of the Open System Interconnection is that the communication procedure between two end points in telecommunication networks can be split up into different levels with each level having its own set of responsibilities ("OSI (open System Interconnection)", 2000-2013). The OSI slits the telecommunication into seven levels which is the application level, the presentation level, the session level, the transport level, the network level, the data link level, and the physical level ("OSI (open System Interconnection)", 2000-2013). The layers are broken up into two sets. The higher four levels are used when a message is transmitted from user to another user. The bottom three levels are exercised when any message passes through the main computer. Messages planned for this computer go through to the higher levels and messages intended for some other computer are not distributed up to the levels but are advanced to other host. The application level offers multiple services to the application level. The presentation layer changes the material. The session layer takes care of complications which are not related to communication problems. The transport level delivers one end to another end message control. The network layer directs the data in the system. The data link layer provides mistake control amid adjoining nodes. And the physical layer joins it to the communication of the media. The Open System Interconnection model explains the interacting outline for putting protocols into place. Control is distributed from level to level beginning with the application layer and works its way through all other layers until it gets the physical layer or level one. When this sequence is finished control then goes to the following position on the system and works its way up the ladder. The procedure starts on the top layer and supports the application and also helps the end user with the processes. Operator verification and confidentiality on the system is contemplated at this level. Additionally this is the level where file transfers happen. Once the application is finished control is forwarded to the presentation level or the sixth level. In this layer the data is converting into a form that the application level can receive. Also the encoded data is taken care of at this layer. This is the layer that designs and encodes data to be transmitted across a network. Control is now passed to the session layer which is the fifth level. The session layer transacts with multiple system periods and creates, manage, and end connections between multiple network sessions. This level also sets-up, organize, and end interactions and discussion amongst the applications on any end. The transport layer takes power here. This is the level that delivers transparent transfers of information between the end system and or host, and is also accountable for error recovery and flow control from end to end. The transport level guarantees complete information transmission. Now we move to the network layer. This layer delivers swapping and routing technologies and produces computer generated circuits. These computer generated circuits are used for transferring information from the node to another node. Steering and advancing are the purpose of this level as well as speaking, internetworking, mistake handling, jamming control and container sequencing. Now we are at the data link level where data is programmed and interpreted into bits. It supplies communication procedure information and management, and takes care of mistakes in the physical level, flow control and frame organization. This level is split into a couple of sub levels the (MAC) or Media Access Control and the (LLC) Logical Link Control level ("OSI (open System Interconnection)", 2000-2013). The Media Access Control sub level governs how the system gets admission to the information and approval for the transmission of the information. The Logical Link Control level regulates frame organization, movement control, and the examination of mistakes. Now we have reached the first level which is the physical level which transport the bit flow over the system at the electronic and powered layer. It delivers the hardware a measure of distributing and getting information plus essential cables, video/sound card, and other physical facets. ("OSI (Open System Interconnection)", 2000-2013). These protocols apply to health care organization because of the exchange of clinical data in the delivery of health care. The OSI will speed up the flow of the patient information from the provider’s office to the hospitals and outpatient facilities (Durkin, & Just, 2008). The OSI will also help struggling health care organizations establish an effective and sustainable models for the business as well as put in place privacy and security measures to help them better protect the information of the patients they service. The different types of network designs affect the transfer of medical data because information systems are the mainframe that allows the distribution of information to a group of users in different locations who are accessing the same application ("Role of Information System in an Organization", 1999-2013). Managers are able to control data, view data, and use different tools to get the necessary information recorded and transmitted.

References
Durkin, S., & Just, B. (2008, January). An IT Primer for Health Information Exchange. Journal Of AHIMA, 79(1), 38-42.
OSI (Open System Interconnection). (2000-2013). Retrieved from http://searchnetworking.techtarget.com/definition/OSI
Role of Information System in an Organization. (1999-2013). Retrieved from http://www.ehow.com/about_6525978_role-information-systems-organization.html

Similar Documents

Premium Essay

Week 5 Osi Model Protocol

...OSI Model Protocol The OSI (Open Systems Interconnection) model is a logical plan that explains network interactions used by a system open to interconnection and communicate with other systems. The objective of the OSI model is to directly product implementers so that the items will frequently work with the other items. The OSI model is broken into seven layers, each of which presents a collection of services above and below it. The OSI is also of use in a training environment where a novice can use as a guide to source to understand how technologies communicate, where they reside, what functions they will perform and how protocol interacts with other protocols Briscoe, N. (2000). The primary objective of the OSI model is that the communication between the end points in networks can be separate into different levels with every level having its duties. An OSI determines how the data will flow down the seven layers at the sending end, and how it will move up through the layers at the location end of communication development. The seven layers of the OSI are the physical layer, data-link layer, network layer, transport layer, session layer, presentation layer and the application layer. A physical layer also uses bits as its PDU, which are e-signals represented in digit 1s and 0 Briscoe, N. (2000). The top four levels are used when a message is being transmitted from one user to another user. The lower three levels are practiced when a message is passing through...

Words: 783 - Pages: 4

Premium Essay

Web Sites - the Osi Model and Layer Protocols

...Sites - The OSI Model and Layer Protocols NTC/362 March 9, 2015 The building of a web site begins with considering the multilayered framework of the Open System Interconnection (OSI) model or the Transmission Control Protocol/Internet Protocol (TCP/IP) model. Network models are designed to categorize all the required functionality around computer communications as well as explain the relationship and flow of information from layer to layer. These models can also be thought of as the structure for interfacing human and data networks. It is also important to think of these models existing on both ends of the networked data transmission. The end to end process can be viewed as a six step process. In step 1 people create the communication. Step 2 the application layer prepares human communication for transmission over the data network. Step 3 software and hardware convert communication to a digital format. Step 5 the application layer services initiate the data transfer. Step 5 model layers play a role in encapsulating data down the stack. Encapsulated data travels across the media to the destination. Model layers then unencapsulate the data up the stack. Lastly in step 6 the application layer receives the data from the network and prepares it for human use. The seven layers of the OSI model are 1-Physical, 2-Dat Link, 3-Network, 4-Transport, 5-Session, 6-Presentation, and 7-Application. The TCP/IP model is a four layer model. The layers of the TCP/IP model are 1-Application...

Words: 1366 - Pages: 6

Free Essay

The Internet Protocol Suite and the Osi Reference Model

...Deserae Caldwell Ip troubleshooting The Internet Protocol Suite and the OSI Reference Model Traceroute The traceroute utility sends out either ICMP echo request (Windows) or UDP (most implementations) messages with gradually increasing IP TTL values to probe the path by which a packet traverses the network. The first packet with the TTL set to 1 will be discarded by the first hop, and the first hop will send back an ICMP TTL When the machine running the traceroute receives the ICMP TTL exceeded message, it can determine the hop via the source IP address. This continues until the destination is reached. The destination will return either an ICMP echo reply (Windows) or a ICMP port unreachable, indicating that the destination had been reached. Traceroute can return useful information about TCP/IP connectivity across your network Example of traceroute Return Codes | Code | Meaning | Possible Cause(s) | nnmsec | This gives, for each node, the round-trip time (in milliseconds) for the specified number of probes. | This is normal. | * | The probe timed out. | A device along the path either did not receive the probe or did not reply with an ICMP "packet life exceeded" message. | A | Administratively prohibited. | A device along the path, such as a firewall or router, may be blocking the probe and possibly other or all traffic; check access lists. | Q | Source quench. | A device along the path may be receiving to much traffic; check input queues. | H | An ICMP unreachable...

Words: 906 - Pages: 4

Premium Essay

Networking

...advantage with this is that we know everything works together without any issues. This also sets a bar for what is expected from the product. 2. In general, why would a layered architecture be viewed as beneficial? Clear separation of responsibilities, exposed workflow, also the ability to replace one or more layers with little effort and side effects. This helps keep things moving in order. Think of it kind of like a restaurant you have customer, waiter, and chef. You would not send the customer to the chef to order their food. (Bart, T.) 3. What is a protocol and why would one be used? Provide an example of a technological protocol or a society- based protocol. Protocol: the custom and regulations dealing with diplomatic formality, precedence, and etiquette. Computers: a set of rules governing the format of messages that are exchanged between computers. (Dicionary.com) IP is Internet Protocol, this tells your computer where to look on the web for the websites you go to. It works kind of like a map in a way. 4. What are the four different types of networks and what are the characteristics of each? LAN, MAN, WAN, and PAN. LAN is Local Area Network it covers a small...

Words: 711 - Pages: 3

Premium Essay

Open System Interconnection 7 - Layer Reference Model

...OSI Model Open System Interconnection แบบจำลองเครือข่าย ( Network Model ) เสนอ อาจารย์ ปริญญา น้อยดอนไพร จัดทำโดย 1. นางสาวกนกอร ไกรนรา รหัสนักศึกษา 5240410501 2. นางสาวกมลชนก บัวหยาด รหัสนักศึกษา 5240410502 1. จุฑามาศ ฤทธิมนตรี 5240410516 3. นางสาวจุฑามาศ ฤทธิมนตรี รหัสนักศึกษา 5240410516 4. นายเชาวนัส นวลรัตน์ รหัสนักศึกษา 5240410521 5. นายทิชากร ศรีอาวุธ รหัสนักศึกษา 5240410530 6. นางสาวปิยะธิดา ศรีส่วน รหัสนักศึกษา 5240410549 7. นายวราพล แช่ตั้ง รหัสนักศึกษา 5240410565 8. นางสาววินิตา เพชรทอง รหัสนักศึกษา 5240410569 9. นางสาว สิริมา เพชรรัตน์ รหัสนักศึกษา 5240410578 10. นางสาวสุชากรณ์ หนูชู รหัสนักศึกษา 5240410579 8. จุฑามาศ ฤทธิมนตรี 5240410516 9. สุชากรณ์ หนูชู 5240410579 10. จุฑามาศ ฤทธิมนตรี 5240410516 11. สุชากรณ์ หนูชู 5240410579 รายงานฉบับนี้เป็นส่วนหนึ่งของรายวิชา 928-202 การสื่อสารข้อมูลและเครือข่าย มหาวิทยาลัยสงลานครินทร์ วิทยาเขตสุราษฎร์ธานี ภาคการศึกษาที่ 2 ปีการศึกษา 2553 คำนำ ในโลกปัจจุบัน คอมพิวเตอร์ ได้ก้าวเข้ามามีบทบาทในชีวิตประจำวันอย่างกว้างขวาง ทั้งในส่วนของการใช้งานโดยตรง เช่น การใช้ในองค์กรธุรกิจต่าง ๆ การควบคุมระบบการเจรจาทั้งทางบก ทางน้ำ และทางอากาศ การติดต่อสื่อสารแลกเปลี่ยนข้อมูลทั้งในระยะใกล้ไปจนถึงระยะไกล ข้ามโลก รวมไปถึงการใช้ในด้านความบันเทิงทั้งเกมส์คอมพิวเตอร์หรือภาพยน ตร์ที่สร้างด้วยคอมพิวเตอร์กราฟิก เป็นต้น ดังนั้น กลุ่มของข้าพเจ้าจึงได้จัดทำรายงาน...

Words: 686 - Pages: 3

Premium Essay

Protocols

...Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction Protocol (Protocols.com) * Security Layer Protocols * WTLS or Wireless Transport Layer Security...

Words: 278 - Pages: 2

Premium Essay

Network & Telecommunication Concepts

... Individual Assignment; TCP/IP Architecture and OSI Layers TCP/IP Architecture and OSI Layers [your name here] NTC360 Network and Telecommunications Concept Associate Professor Anthony Bruno January 04, 2011 The purpose of this paper is to describe an OSI (Open Systems Interconnection) Model with details about each of the seven layers. The OSI reference model adopts a layered approach, where a communication subsystem is broken down into seven layers, each one of which performs a well-defined function. Additionally it is important to understand the purpose of the OSI model in the overall networking architecture especially as it relates to the TCP/IP (Transmission Control Protocol/Internet Protocol) Architecture, which also consists of layers each playing a particular role in the networking design. Generally speaking, the network protocol layer, which is similar to the data and network layer of the OSI model includes the protocols that allow clients and applications to send data over the network. This includes TCP/IP, NWLink (IPX/SPX), NetBEUI, Infrared Data Association (IrDA). However, the purpose of this document is to focus on the relationships between the OSI model and the TCP/IP architectures, and how they may interact together. Finally, as demonstration of this relationship a visual diagram has been provided to depicts how the TCP/IP layers correspond to the OSI model and layers. To begin with, it is important to...

Words: 1573 - Pages: 7

Premium Essay

Captone Paper

...IT331-CNS Capstone 6/28/12 OSI Model 1. Explain in detail the functions of each layer of the 7-layer OSI model. a. Layer 1 – Physical Layer – To establish and terminate the connection to a media source, it also does the conversions of data from one form to another. b. Layer 2 – Data-Link Layer – Transmits data from one point to another. c. Layer 3 – Network Layer – Transmits data from one host to another on another network. d. Layer 4 – Transport Layer – Controls the end-to-end connections, reliability, flow control of data in a network. e. Layer 5 – Session Layer – Controls connections between computers and manages application sessions in a network. f. Layer 6 – Presentation layer – This layer controls data representation and the encryption and decryption of data in a network. g. Layer 7 – Application Layer – This layer interacts with software applications that implement a communicating component. The application layer decides whether sufficient network or the requested communication exists. 2. Using the OSI model as a reference, describe how you would troubleshoot connectivity problems. h. To troubleshoot connectivity problems using the OSI model you should answer the following questions: i. Is your network cable plugged in? ii. Is there a link light on the Ethernet switch and Ethernet NIC? iii. Do you have an IP address? iv. Can you ping your default gateway? ...

Words: 693 - Pages: 3

Premium Essay

Analysis of Wireless Protocols

...Wireless Protocols Analysis of Wireless Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction Protocol (Protocols...

Words: 285 - Pages: 2

Premium Essay

Richman Investments Remote Access Control Policy

...SHAUN PARE 4/9/12 ESSAY 2/ 500 WORD What is the OSI model the 7 layers The Open Systems Interconnection or (OSI model) “Is an architectural model that represents networking communication. It was introduced in 1978 by the International Organization for Standards to standardize the level of services and types of interactions for computers communicating over a network” (Emdad). The OSI is the standard that sets the path that data must travel through from one computer to another through a network. The OSI does this by the sending the through seven different layers almost like sending the data through checkpoints and at each checkpoint the data must be cleared so it is able to move on to the next stop. This is what the seven layers of OSI do. The data must go each layer, each layer performs a specific task in order to pass the data through to the next layer, and these layers also communicate to the layer above and below to make sure that everything in order. There are seven layers and each one has a specific function that prepares it for next layer the data must pass through all seven layers. The layers are separated into two sets the first is the application set • Application layer 7- This is the layer that provides the interface between the network protocol and the software running on the computer. This layer handles anything that communicates with the internet; this layer also handles any network related activity such as file transfers or reading and sending email. This...

Words: 606 - Pages: 3

Premium Essay

Osi Model and How It Relates to a Network

...Question: Write a 2-3 page paper describing the OSI model and how it relates to a network. Your response should include answers to the following: • On which layers of the OSI model do WAN protocols operate? • What are some of these protocols? • On which OSI layers do switches and routers operate? • If routers reside at more than one layer, what is the difference between the OSI layers? Introduction: The OSI model was introduced in 1984. Although it was designed to be an abstract model, the OSI model remains a practical framework for today's key network technologies like Ethernet and protocols like IP. The OSI model defines internetworking in terms of a vertical stack of seven layers. The upper layers of the OSI model represent software that implements network services like encryption and connection management. The lower layers of the OSI model implement more primitive, hardware-oriented functions like routing, addressing, and flow control. In the OSI model, data communication starts with the top layer at the sending side, travels down the OSI model stack to the bottom layer, then traverses the network connection to the bottom layer on the receiving side, and up its OSI model stack. How OSI model relates to a network: Information being transferred from a software application in one computer system to a software application in another must pass through the OSI layers. For example, if a software application in System A has information to transmit to a software application...

Words: 845 - Pages: 4

Premium Essay

Introductory Network Concepts, Network Standards, and the Osi Model

...Introductory Network Concepts, Network Standards, and the OSI Model 1. There are many reasons for a company to network its computers, some are as follows; Share software, information with others on networks, cheaper than buying individual software and hardware for each standalone especially if the software often offers deals for amount being purchased, e-mail between network users, and flexible access from any computer on the network. 2. Two fundamental network models are peer-to-peer(P2P) or Client/Server. In a P2P network, every computer can communicate directly with every other computer, and no computer on this network has more authority than another. On a client/server network every computer acts as a client or a server. 3. There are 3 types of networks depending on how much territory they cover, they are LANs, MANs, and WAN networks. LAN networks cover a small area like one building or one office. MANs cover multiple buildings like a handful of government offices surrounding a state capital. A WAN network is one that connects two or more geographically distinct LANs and MANs. 4. A server is a computer on the network that manages shared resources. 5. A client is a computer on the network that requests resources or services from another computer on a network. 6. A NIC or Network Interface Card is the device that enables a workstation to connect to the network and communicate with other computers. 7. A NOS or Network Operating System is the...

Words: 845 - Pages: 4

Premium Essay

Osi Model

...This paper will discuss the Open System Interconnections (OSI). “The OSI was developed by the international Organization for Standardization (ISO) as a Model for a computer protocol architecture and as a framework for developing protocol standards. The OSI model consists of seven Layers: Application, Presentation, Session, Transport, Network, Data Link, and Physical.” (University of Phoenix) The Application layer supports application and end user processes, also it provides application services for file transfer, e-mail, and other network software service. Telnet and FTP are applications that exist completely in the application level. The Presentation layer provides self-rule from differences in data representation by translating from application to network format and vice versa. This layer works to convert data into the form that the application layer can accept. It formats and encrypts data to be sent across a network, providing lack of restrictions from compatibility problem. The Session layer launch manages and come to an end connection between applications. This layer sets up, brings together, and terminates conversations, exchanges, and dialogues between the applications at each end. The Transport layer provides crystal clear transfer of data between end systems, or hosts, and is responsible for end to end error recovery and flow control. This layer guarantee complete data transfer. The Network layer offers switching and routing technologies, creating logical paths...

Words: 483 - Pages: 2

Premium Essay

Fundamentals of Networking Phase 2

...Fundamentals of Networking IT205-1304B-01 Phase 2 Discussion Board December 1, 2013 In this discussion board, I am going to define and describe the OSI and the TCP/IP models including a discussion on where and how they overlap. I will discuss why I think the TCP/IP model is use and the OSI model is not, and finally what my definition of the steps of OSI and TCP/IP are and their implementation. I am going to start with the OSI model. The OSI model is made up of 7 different layer, each with their own functions. Each of the layers are defined as: 1. Physical Layer: The physical layer is responsible of delivering row bit stream over the physical cable. Its functions are physical medium transmission, transmission technique and data encoding. (Khani, 2012) 2. Data Link Layer: The data link layer is responsible for controlling the error between adjacent nodes and transfer the frames to the other computer via the physical Layer. Its functions are Link establishment and termination, frame traffic control and frame acknowledgement. (Khani, 2012) 3. Network Layer: The network layer is responsible for the translating of the logical network address and names into their physical address. Its functions are subnet traffic control, logical and physical address mapping and frame fragmentation. (Khani, 2012) 4. Transport Layer: The transport layer is responsible for the end-to-end deliveries of messages between the networked hosts. Its functions are message segmentation...

Words: 730 - Pages: 3

Premium Essay

Seven Layers of the Osi

...Seven Layers of the OSI Model The OSI is an open networking model developed by ISO over the same time frame as TCP/IP. The Open Systems Interconnection (OSI) model has seven layers. The layers are stacked beginning with the 'lowest' (the physical) and proceeding to the 'highest' (the application). A layer serves the layer above it and is served by the layer below it. PHYSICAL LAYER The physical layer, the lowest layer of the OSI model, provides the path through which data moves among devices on the network (it specifies how a device sends and receives). Other functions of the physical layer include the conversion of signals into something that another layer can use (referred to as a bit), and adjusting the signal to allow for multiple users to use the same connection. The physical layer receives data from the data link layer, and transmits it to the wire. DATA LINK LAYER Layer two of the OSI model is the Data Link which provides a system through which network devices can share the communication channel. The data link layer provides error-free transfer of data frames from one node to another over the physical layer, allowing layers above it to assume virtually error-free transmission over the data. NETWORK LAYER Layer three, the network layer controls the operation of the subnet, deciding which physical path the data should take based on network conditions, priority of service, and other factors. This layer also handles aspects of Routing Protocols, finding the available...

Words: 618 - Pages: 3