...OSI Model Protocol The OSI (Open Systems Interconnection) model is a logical plan that explains network interactions used by a system open to interconnection and communicate with other systems. The objective of the OSI model is to directly product implementers so that the items will frequently work with the other items. The OSI model is broken into seven layers, each of which presents a collection of services above and below it. The OSI is also of use in a training environment where a novice can use as a guide to source to understand how technologies communicate, where they reside, what functions they will perform and how protocol interacts with other protocols Briscoe, N. (2000). The primary objective of the OSI model is that the communication between the end points in networks can be separate into different levels with every level having its duties. An OSI determines how the data will flow down the seven layers at the sending end, and how it will move up through the layers at the location end of communication development. The seven layers of the OSI are the physical layer, data-link layer, network layer, transport layer, session layer, presentation layer and the application layer. A physical layer also uses bits as its PDU, which are e-signals represented in digit 1s and 0 Briscoe, N. (2000). The top four levels are used when a message is being transmitted from one user to another user. The lower three levels are practiced when a message is passing through...
Words: 783 - Pages: 4
...Sites - The OSI Model and Layer Protocols NTC/362 March 9, 2015 The building of a web site begins with considering the multilayered framework of the Open System Interconnection (OSI) model or the Transmission Control Protocol/Internet Protocol (TCP/IP) model. Network models are designed to categorize all the required functionality around computer communications as well as explain the relationship and flow of information from layer to layer. These models can also be thought of as the structure for interfacing human and data networks. It is also important to think of these models existing on both ends of the networked data transmission. The end to end process can be viewed as a six step process. In step 1 people create the communication. Step 2 the application layer prepares human communication for transmission over the data network. Step 3 software and hardware convert communication to a digital format. Step 5 the application layer services initiate the data transfer. Step 5 model layers play a role in encapsulating data down the stack. Encapsulated data travels across the media to the destination. Model layers then unencapsulate the data up the stack. Lastly in step 6 the application layer receives the data from the network and prepares it for human use. The seven layers of the OSI model are 1-Physical, 2-Dat Link, 3-Network, 4-Transport, 5-Session, 6-Presentation, and 7-Application. The TCP/IP model is a four layer model. The layers of the TCP/IP model are 1-Application...
Words: 1366 - Pages: 6
...Deserae Caldwell Ip troubleshooting The Internet Protocol Suite and the OSI Reference Model Traceroute The traceroute utility sends out either ICMP echo request (Windows) or UDP (most implementations) messages with gradually increasing IP TTL values to probe the path by which a packet traverses the network. The first packet with the TTL set to 1 will be discarded by the first hop, and the first hop will send back an ICMP TTL When the machine running the traceroute receives the ICMP TTL exceeded message, it can determine the hop via the source IP address. This continues until the destination is reached. The destination will return either an ICMP echo reply (Windows) or a ICMP port unreachable, indicating that the destination had been reached. Traceroute can return useful information about TCP/IP connectivity across your network Example of traceroute Return Codes | Code | Meaning | Possible Cause(s) | nnmsec | This gives, for each node, the round-trip time (in milliseconds) for the specified number of probes. | This is normal. | * | The probe timed out. | A device along the path either did not receive the probe or did not reply with an ICMP "packet life exceeded" message. | A | Administratively prohibited. | A device along the path, such as a firewall or router, may be blocking the probe and possibly other or all traffic; check access lists. | Q | Source quench. | A device along the path may be receiving to much traffic; check input queues. | H | An ICMP unreachable...
Words: 906 - Pages: 4
...advantage with this is that we know everything works together without any issues. This also sets a bar for what is expected from the product. 2. In general, why would a layered architecture be viewed as beneficial? Clear separation of responsibilities, exposed workflow, also the ability to replace one or more layers with little effort and side effects. This helps keep things moving in order. Think of it kind of like a restaurant you have customer, waiter, and chef. You would not send the customer to the chef to order their food. (Bart, T.) 3. What is a protocol and why would one be used? Provide an example of a technological protocol or a society- based protocol. Protocol: the custom and regulations dealing with diplomatic formality, precedence, and etiquette. Computers: a set of rules governing the format of messages that are exchanged between computers. (Dicionary.com) IP is Internet Protocol, this tells your computer where to look on the web for the websites you go to. It works kind of like a map in a way. 4. What are the four different types of networks and what are the characteristics of each? LAN, MAN, WAN, and PAN. LAN is Local Area Network it covers a small...
Words: 711 - Pages: 3
...OSI Model Open System Interconnection แบบจำลองเครือข่าย ( Network Model ) เสนอ อาจารย์ ปริญญา น้อยดอนไพร จัดทำโดย 1. นางสาวกนกอร ไกรนรา รหัสนักศึกษา 5240410501 2. นางสาวกมลชนก บัวหยาด รหัสนักศึกษา 5240410502 1. จุฑามาศ ฤทธิมนตรี 5240410516 3. นางสาวจุฑามาศ ฤทธิมนตรี รหัสนักศึกษา 5240410516 4. นายเชาวนัส นวลรัตน์ รหัสนักศึกษา 5240410521 5. นายทิชากร ศรีอาวุธ รหัสนักศึกษา 5240410530 6. นางสาวปิยะธิดา ศรีส่วน รหัสนักศึกษา 5240410549 7. นายวราพล แช่ตั้ง รหัสนักศึกษา 5240410565 8. นางสาววินิตา เพชรทอง รหัสนักศึกษา 5240410569 9. นางสาว สิริมา เพชรรัตน์ รหัสนักศึกษา 5240410578 10. นางสาวสุชากรณ์ หนูชู รหัสนักศึกษา 5240410579 8. จุฑามาศ ฤทธิมนตรี 5240410516 9. สุชากรณ์ หนูชู 5240410579 10. จุฑามาศ ฤทธิมนตรี 5240410516 11. สุชากรณ์ หนูชู 5240410579 รายงานฉบับนี้เป็นส่วนหนึ่งของรายวิชา 928-202 การสื่อสารข้อมูลและเครือข่าย มหาวิทยาลัยสงลานครินทร์ วิทยาเขตสุราษฎร์ธานี ภาคการศึกษาที่ 2 ปีการศึกษา 2553 คำนำ ในโลกปัจจุบัน คอมพิวเตอร์ ได้ก้าวเข้ามามีบทบาทในชีวิตประจำวันอย่างกว้างขวาง ทั้งในส่วนของการใช้งานโดยตรง เช่น การใช้ในองค์กรธุรกิจต่าง ๆ การควบคุมระบบการเจรจาทั้งทางบก ทางน้ำ และทางอากาศ การติดต่อสื่อสารแลกเปลี่ยนข้อมูลทั้งในระยะใกล้ไปจนถึงระยะไกล ข้ามโลก รวมไปถึงการใช้ในด้านความบันเทิงทั้งเกมส์คอมพิวเตอร์หรือภาพยน ตร์ที่สร้างด้วยคอมพิวเตอร์กราฟิก เป็นต้น ดังนั้น กลุ่มของข้าพเจ้าจึงได้จัดทำรายงาน...
Words: 686 - Pages: 3
...Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction Protocol (Protocols.com) * Security Layer Protocols * WTLS or Wireless Transport Layer Security...
Words: 278 - Pages: 2
... Individual Assignment; TCP/IP Architecture and OSI Layers TCP/IP Architecture and OSI Layers [your name here] NTC360 Network and Telecommunications Concept Associate Professor Anthony Bruno January 04, 2011 The purpose of this paper is to describe an OSI (Open Systems Interconnection) Model with details about each of the seven layers. The OSI reference model adopts a layered approach, where a communication subsystem is broken down into seven layers, each one of which performs a well-defined function. Additionally it is important to understand the purpose of the OSI model in the overall networking architecture especially as it relates to the TCP/IP (Transmission Control Protocol/Internet Protocol) Architecture, which also consists of layers each playing a particular role in the networking design. Generally speaking, the network protocol layer, which is similar to the data and network layer of the OSI model includes the protocols that allow clients and applications to send data over the network. This includes TCP/IP, NWLink (IPX/SPX), NetBEUI, Infrared Data Association (IrDA). However, the purpose of this document is to focus on the relationships between the OSI model and the TCP/IP architectures, and how they may interact together. Finally, as demonstration of this relationship a visual diagram has been provided to depicts how the TCP/IP layers correspond to the OSI model and layers. To begin with, it is important to...
Words: 1573 - Pages: 7
...IT331-CNS Capstone 6/28/12 OSI Model 1. Explain in detail the functions of each layer of the 7-layer OSI model. a. Layer 1 – Physical Layer – To establish and terminate the connection to a media source, it also does the conversions of data from one form to another. b. Layer 2 – Data-Link Layer – Transmits data from one point to another. c. Layer 3 – Network Layer – Transmits data from one host to another on another network. d. Layer 4 – Transport Layer – Controls the end-to-end connections, reliability, flow control of data in a network. e. Layer 5 – Session Layer – Controls connections between computers and manages application sessions in a network. f. Layer 6 – Presentation layer – This layer controls data representation and the encryption and decryption of data in a network. g. Layer 7 – Application Layer – This layer interacts with software applications that implement a communicating component. The application layer decides whether sufficient network or the requested communication exists. 2. Using the OSI model as a reference, describe how you would troubleshoot connectivity problems. h. To troubleshoot connectivity problems using the OSI model you should answer the following questions: i. Is your network cable plugged in? ii. Is there a link light on the Ethernet switch and Ethernet NIC? iii. Do you have an IP address? iv. Can you ping your default gateway? ...
Words: 693 - Pages: 3
...Wireless Protocols Analysis of Wireless Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction Protocol (Protocols...
Words: 285 - Pages: 2
...SHAUN PARE 4/9/12 ESSAY 2/ 500 WORD What is the OSI model the 7 layers The Open Systems Interconnection or (OSI model) “Is an architectural model that represents networking communication. It was introduced in 1978 by the International Organization for Standards to standardize the level of services and types of interactions for computers communicating over a network” (Emdad). The OSI is the standard that sets the path that data must travel through from one computer to another through a network. The OSI does this by the sending the through seven different layers almost like sending the data through checkpoints and at each checkpoint the data must be cleared so it is able to move on to the next stop. This is what the seven layers of OSI do. The data must go each layer, each layer performs a specific task in order to pass the data through to the next layer, and these layers also communicate to the layer above and below to make sure that everything in order. There are seven layers and each one has a specific function that prepares it for next layer the data must pass through all seven layers. The layers are separated into two sets the first is the application set • Application layer 7- This is the layer that provides the interface between the network protocol and the software running on the computer. This layer handles anything that communicates with the internet; this layer also handles any network related activity such as file transfers or reading and sending email. This...
Words: 606 - Pages: 3
...Question: Write a 2-3 page paper describing the OSI model and how it relates to a network. Your response should include answers to the following: • On which layers of the OSI model do WAN protocols operate? • What are some of these protocols? • On which OSI layers do switches and routers operate? • If routers reside at more than one layer, what is the difference between the OSI layers? Introduction: The OSI model was introduced in 1984. Although it was designed to be an abstract model, the OSI model remains a practical framework for today's key network technologies like Ethernet and protocols like IP. The OSI model defines internetworking in terms of a vertical stack of seven layers. The upper layers of the OSI model represent software that implements network services like encryption and connection management. The lower layers of the OSI model implement more primitive, hardware-oriented functions like routing, addressing, and flow control. In the OSI model, data communication starts with the top layer at the sending side, travels down the OSI model stack to the bottom layer, then traverses the network connection to the bottom layer on the receiving side, and up its OSI model stack. How OSI model relates to a network: Information being transferred from a software application in one computer system to a software application in another must pass through the OSI layers. For example, if a software application in System A has information to transmit to a software application...
Words: 845 - Pages: 4
...Introductory Network Concepts, Network Standards, and the OSI Model 1. There are many reasons for a company to network its computers, some are as follows; Share software, information with others on networks, cheaper than buying individual software and hardware for each standalone especially if the software often offers deals for amount being purchased, e-mail between network users, and flexible access from any computer on the network. 2. Two fundamental network models are peer-to-peer(P2P) or Client/Server. In a P2P network, every computer can communicate directly with every other computer, and no computer on this network has more authority than another. On a client/server network every computer acts as a client or a server. 3. There are 3 types of networks depending on how much territory they cover, they are LANs, MANs, and WAN networks. LAN networks cover a small area like one building or one office. MANs cover multiple buildings like a handful of government offices surrounding a state capital. A WAN network is one that connects two or more geographically distinct LANs and MANs. 4. A server is a computer on the network that manages shared resources. 5. A client is a computer on the network that requests resources or services from another computer on a network. 6. A NIC or Network Interface Card is the device that enables a workstation to connect to the network and communicate with other computers. 7. A NOS or Network Operating System is the...
Words: 845 - Pages: 4
...This paper will discuss the Open System Interconnections (OSI). “The OSI was developed by the international Organization for Standardization (ISO) as a Model for a computer protocol architecture and as a framework for developing protocol standards. The OSI model consists of seven Layers: Application, Presentation, Session, Transport, Network, Data Link, and Physical.” (University of Phoenix) The Application layer supports application and end user processes, also it provides application services for file transfer, e-mail, and other network software service. Telnet and FTP are applications that exist completely in the application level. The Presentation layer provides self-rule from differences in data representation by translating from application to network format and vice versa. This layer works to convert data into the form that the application layer can accept. It formats and encrypts data to be sent across a network, providing lack of restrictions from compatibility problem. The Session layer launch manages and come to an end connection between applications. This layer sets up, brings together, and terminates conversations, exchanges, and dialogues between the applications at each end. The Transport layer provides crystal clear transfer of data between end systems, or hosts, and is responsible for end to end error recovery and flow control. This layer guarantee complete data transfer. The Network layer offers switching and routing technologies, creating logical paths...
Words: 483 - Pages: 2
...Fundamentals of Networking IT205-1304B-01 Phase 2 Discussion Board December 1, 2013 In this discussion board, I am going to define and describe the OSI and the TCP/IP models including a discussion on where and how they overlap. I will discuss why I think the TCP/IP model is use and the OSI model is not, and finally what my definition of the steps of OSI and TCP/IP are and their implementation. I am going to start with the OSI model. The OSI model is made up of 7 different layer, each with their own functions. Each of the layers are defined as: 1. Physical Layer: The physical layer is responsible of delivering row bit stream over the physical cable. Its functions are physical medium transmission, transmission technique and data encoding. (Khani, 2012) 2. Data Link Layer: The data link layer is responsible for controlling the error between adjacent nodes and transfer the frames to the other computer via the physical Layer. Its functions are Link establishment and termination, frame traffic control and frame acknowledgement. (Khani, 2012) 3. Network Layer: The network layer is responsible for the translating of the logical network address and names into their physical address. Its functions are subnet traffic control, logical and physical address mapping and frame fragmentation. (Khani, 2012) 4. Transport Layer: The transport layer is responsible for the end-to-end deliveries of messages between the networked hosts. Its functions are message segmentation...
Words: 730 - Pages: 3
...Seven Layers of the OSI Model The OSI is an open networking model developed by ISO over the same time frame as TCP/IP. The Open Systems Interconnection (OSI) model has seven layers. The layers are stacked beginning with the 'lowest' (the physical) and proceeding to the 'highest' (the application). A layer serves the layer above it and is served by the layer below it. PHYSICAL LAYER The physical layer, the lowest layer of the OSI model, provides the path through which data moves among devices on the network (it specifies how a device sends and receives). Other functions of the physical layer include the conversion of signals into something that another layer can use (referred to as a bit), and adjusting the signal to allow for multiple users to use the same connection. The physical layer receives data from the data link layer, and transmits it to the wire. DATA LINK LAYER Layer two of the OSI model is the Data Link which provides a system through which network devices can share the communication channel. The data link layer provides error-free transfer of data frames from one node to another over the physical layer, allowing layers above it to assume virtually error-free transmission over the data. NETWORK LAYER Layer three, the network layer controls the operation of the subnet, deciding which physical path the data should take based on network conditions, priority of service, and other factors. This layer also handles aspects of Routing Protocols, finding the available...
Words: 618 - Pages: 3