Premium Essay

Web Sites - the Osi Model and Layer Protocols

In:

Submitted By CatDadALad
Words 1366
Pages 6
Web Sites - The OSI Model and Layer Protocols

NTC/362

March 9, 2015

The building of a web site begins with considering the multilayered framework of the Open System Interconnection (OSI) model or the Transmission Control Protocol/Internet Protocol (TCP/IP) model. Network models are designed to categorize all the required functionality around computer communications as well as explain the relationship and flow of information from layer to layer. These models can also be thought of as the structure for interfacing human and data networks. It is also important to think of these models existing on both ends of the networked data transmission. The end to end process can be viewed as a six step process. In step 1 people create the communication. Step 2 the application layer prepares human communication for transmission over the data network. Step 3 software and hardware convert communication to a digital format. Step 5 the application layer services initiate the data transfer. Step 5 model layers play a role in encapsulating data down the stack. Encapsulated data travels across the media to the destination. Model layers then unencapsulate the data up the stack. Lastly in step 6 the application layer receives the data from the network and prepares it for human use.

The seven layers of the OSI model are 1-Physical, 2-Dat Link, 3-Network, 4-Transport, 5-Session, 6-Presentation, and 7-Application. The TCP/IP model is a four layer model. The layers of the TCP/IP model are 1-Application layer, 2-Transport layer, 3-Internet layer and 4-Network Interface layer. Each layer of the TCP/IP model corresponds to one or more layers of the seven layer OSI model. Each layer will be associated with one or more communication protocols according to the functionality it provides. A protocol is merely an established standard way of doing things. Web site development

Similar Documents

Premium Essay

Network

...Networking A network protocol is a set of rules and communication procedures used by all stations that exchange data networks. There are many network protocols, but they are not the same role, or the same approach. Some network protocols operate at multiple layers of the OSI model, others may specialize in the creation of a task with a single layer of the OSI model. A packet transmitted over the network comprises a plurality of information corresponding to each of the different processing of the protocol stack layers. Different protocol stacks can coexist on the same station, according to the model of communication. The packets are ordered so the transmission process tries first one then the other. A network with multiple segments should generally use a routable protocol. In a protocol stack, different protocols are organized, ordered, hierarchical, one after the other in order to accomplish a set of tasks corresponding to all or part of the OSI model. The operation of different protocols in the stack must be coordinated in order to prevent conflicts and unfinished operations. According to the OSI model, the process of transmitting data over a network is divided into several stages, in a fixed order. The OSI model distinguishes seven basic steps, and breaks down the process of data transmission in seven layers. The links are ranked them by priority. The binding order of the protocol stack determines the order in which the network operating system runs protocols. Thus, depending...

Words: 687 - Pages: 3

Premium Essay

Chapter 1

...Chapter 1 Introduction to Data Communications Outline Introduction Data Communication Networks Network Models Network Standards Future Trends Teaching Notes It is helpful spending some time at the start of the course helping students become familiar with the organizational format of the textbook. A quick overview of the Table of Contents and some comments on each chapter helps to establish the beginning, conclusion and terrain of the course. This is also a natural time to review the syllabus and talk about expectations. The text is well organized with an outline preceding each Chapter and good summaries at the conclusions. Teaching which follows these outlines and concentrates on the summary information is particularly effective. Students should also be advised about the online resources that are available to supplement the text. The resources for Instructors are also helpful. The PowerPoint presentation and Web resources can be easily incorporated into class. The testbank is also valuable. War Stories Microsoft Internet Explorer and HTML Standards (Objective: illustrate the importance of standards) In early 1996, when we were developing our Web-groupware software (now a commercial product called Consensus @nyWARE (www.softbicycle.com)) we discovered that Microsoft’s IE would not work with our software. IE did not support the full HTML 3.0 standard in forms processing. All the form information was returned in reverse order from the standard. Since...

Words: 3850 - Pages: 16

Premium Essay

Networking

...Project An OSI is a model made up for seven different layers starting from the top down, basically what an OSI does is it breaks down its seven layers and different components to make it easier to work with, it controls how network systems communicate to each other. This model is used to help determine what the problem is in a networking community. For example, each layer represents its own function. The physical layer is all of the physical things that connect with each other, like the wires. Layer 7 (The Application Layer): This layer is what the user interacts with, like Google Chrome, Safari, and Firefox. This application is how things look. Layer 6 (The Presentation Layer): This is the layer that the operating system works on. Layer 5 (The Session Layer): This layer deals with the communication that creates a session between the two computers. You’re computer has to create a session with the web server in order for it to work. Layer 4 (The Transport Layer): This layer decides the amount of information that is sent out at one time. If you are on a website it controls how much information you communicate to the website, and now much is communicated back. It goes back and forth to make sure there isn’t a over abundance of communication going on. Layer 3 (The Network Layer): This layer routers operator layout. This is the level that routers operate at. Every router uses this layer; this layer is where you can find you’re ip address. Layer 2 (The Data Link Layer): This is...

Words: 1399 - Pages: 6

Premium Essay

Osi Model

...Understanding The OSI Model The OSI is a useful model for understanding and developing computer-to-computer communications over a network. OSI stands for Open Systems Interconnection. This conceptual model groups network communication into seven layers of data: Application, Presentation, Session, Transport, Network, Data Link, and Physical. Today, we will be talking about: the history, the seven layers of data, the communication between two systems, and frame specifications of the OSI model. In the early 1980s, the ISO began working on the OSI model so that it would enable computer platforms across the world to communicate openly. The concept of the OSI model was provided by the work of Charles Bachman, Honeywell Information Services. Various aspects of OSI design evolved from experiences with the ARPANET, the fledging Internet, NPLNET, EIN, CYCLADES network and the work of IFIP WG6.1. The new design was documented in ISO 7498 and its various addenda. In the OSI, a networking system was divided into layers. Within each layer, one or more entities implement its functionality. Each entity interacted directly only with the layer immediately beneath it, and provided facilities for use by the layer above it. Protocols enabled an entity in one host to interact with a corresponding entity at the same layer in another host. Service definitions abstractly described the functionality provided to an (N)-layer by an (N-1) layer, where N was one of the seven layers of protocols operating in...

Words: 5379 - Pages: 22

Premium Essay

Introduction to Network Management

...Table of Contents Section 1: Target Organization 3 My Organization: 3 Section 2: Network Architecture 5 Section 3: Network Model 8 Section 4: Network Protocols 9 Section 5: Network Security 10 Section 6: Network Management 11 Section 7: Network+ Prep Toolkit 12 IP 2 Section 2 16 References: 17 Section 1: Target Organization My Organization: “The organization I am choosing is entirely made up. I’m going to call it Kritical Komputer Repair. (KKR) This isn’t just a small little computer repair shop we are talking about this is Kritical. Kritical has somewhere close to 100 employees; each one of these employee has to have a desktop that is capable of dual booting Linux and Windows 7 Enterprise. The company will have an in house server for file sharing and system maintenance. This company will have an outbound server as well that can speak with the in house server(s) in order to complete orders, and keep track of customer information. Both of these servers run Linux as well. I made this choice for a few different reasons it’s creative, it gives me a chance to learn by creating something new, and it gives me the flexibility that I need to succeed in this course. Kritical Computer was founded in 1991. Kritical Computer specializes in, computerization projects, security policies, consultation and selection of solutions, delivery of hardware and operating systems, installation and commissioning of computer networks, systems integration, implementation, training...

Words: 5964 - Pages: 24

Premium Essay

Osi Layer in Malaysia

... The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer Networks Paul Simoneau, Global Knowledge Course Director, Network+, CCNA, CTP Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding data communications between any two networked systems. It divides the communications processes into seven layers. Each layer both performs specific functions to support the layers above it and offers services to the layers below it. The three lowest layers focus on passing traffic through the network to an end system. The top four layers come into play in the end system to complete the process. This white paper will provide you with an understanding of each of the seven layers, including their functions and their relationships to each other. This will provide you with an overview of the network process, which can then act as a framework for understanding the details of computer networking. Since the discussion of networking often includes talk of “extra layers”, this paper will address these unofficial layers as well. Finally, this paper will draw comparisons between the theoretical OSI model and the functional TCP/IP model. Although TCP/IP has been used for network communications before the adoption of the OSI model, it supports the same functions and features in a differently layered arrangement. An Overview of the OSI Model Copyright...

Words: 2594 - Pages: 11

Premium Essay

Network + Chapter 2 Case Project

...lab computers run only the TCP/IP protocol on the Ethernet network and all the computers use 3Com NICs. This is actually good information because as we know some manufacturers have several different OUIs (Organizationally Unique Identifier). In this particular case 3Com Corporation uses its own OUI and standards for their NICs. Ethernet frames are different from token ring frames and the two will not interact with each other on a network. Although we can conceivably transmit both token ring and Ethernet frames on a network. Ethernet interfaces cannot interpret token ring frames and vice versa. By changing the frame type (in our case student changed it) which workstation's NIC was using to transmit data from Ethernet to token ring, obviously the connection between these two networking technologies was gone. I would explain the students that this kind of changes in network settings is not recommended and restricted in the lab. I would also impose such restrictions because of safety and security reasons to protect the network settings. It is very important to know what frame type or types each network require. This information is very useful for installing network operating systems, configuring servers and client workstations, installing NICs, troubleshooting network problems and purchasing network equipment. Case Project 2-2 When we choose to open a web page, for example Firefox, the seventh layer of the OSI model - called Application layer-will help to do that. What happens...

Words: 762 - Pages: 4

Premium Essay

Nt1310 Unit 7

...Information Systems Security Professional 2 Professor Laurent Boucard 6/13/18 1) What is a common implementation for the IPSec protocol? The best and commonly used implementation for the IPSec is VPN that uses the Cisco routers to protect the system against risk vulnerabilities. There are four major basic steps applied in utilizing IPSec VPN protocol that ensures the system is same and free from external attacks. The four steps include the encryption of data transmission, validation of data integrity, authentication of data source, as well as ensuring data integrity (International Council of E-Commerce Consultants, 2010). 2). which command should you use?...

Words: 921 - Pages: 4

Free Essay

Hi Everyone!

...wide area network (WAN) it spans city, state, or national boundaries. Finally coming to back bone network it is a large network that connects almost everything on a single company site. 8. What is a circuit? A circuit is the pathway through which the messages travel. 9. What is a client? The client is the input-output hardware device at the user’s end of a communication circuit. It typically provides users with access to the network and the data and software on the server. 10. What is a host or server? The server (or host computer) stores data or software that can be accessed by the clients. 13. Describe the five layers in the internet network model and what they do. Five layers in the internet network model are the physical layer, data link layer, network layer, transport layer and the application layer. The application layer is the application software used by the network user. The transport layer takes the message generated by the application layer and, if necessary, breaks it into several smaller messages. The network layer addresses the message and determines its route...

Words: 843 - Pages: 4

Premium Essay

Studyguide for Nt1210 Mid Term

...Client server Topics • Transmission Control Protocol (TCP)/Internet Protocol (IP) for Wired and Wireless Networks • The Open Systems Interconnections (OSI) Model • IP Addressing • Firewalls TCP/IP for Wired and Wireless Networks[1] TCP/IP is an open-standard communications protocol suite that is the standard for communicating on the Internet • TCP and IP (two different protocols) contain all the fundamental mechanisms needed to support any and all types of networked communications • TCP/IP was developed as part of the ARPAnet project in the 1960’s (the early development of the current Internet) • TCP/IP became a unifying and reliable element that enabled interoperability across incompatible systems • One of TCP/IP's most basic yet critical functions is its preparation of application data for transmission across a network. • TCP/IP accepts data of virtually any size from applications (typically in the form of a file) and chops it up into smaller, more manageable chunks called segments (segmentation) • In communicating, TCP handles flow control, IP handles addressing • Being a suite of different protocols, TCP/IP includes such protocols as DNS, DHCP, http, ftp, POP3, SMTP and TELNET. Other TCP protocols may be found at http://www.protocols.com/pbook/tcpip1.htm The Open Systems Interconnections (OSI) Model The most common way to illustrate the communication...

Words: 1931 - Pages: 8

Premium Essay

Business

...Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com Pg2Pg2 The OSI Model: Understanding the Seven Layers of Computer Networks Paul Simoneau, Global Knowledge Course Director, Network+, CCNA, CTP Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding data communications between any two networked systems. It divides the communications processes into seven layers. Each layer both performs specific functions to support the layers above it and offers services to the layers below it. The three lowest layers focus on passing traffic through the network to an end system. The top four layers come into play in the end system to complete the process. This white paper will provide you with an understanding of each of the seven layers, including their functions and their relationships to each other. This will provide you with an overview of the network process, which can then act as a framework for understanding the details of computer networking. Since the discussion of networking often includes talk of “?extra layers”?, this paper will address these unofficial layers as well. Finally, this paper will draw comparisons between the theoretical OSI model and the functional TCP/IP model. Although TCP/IP has been used for network communications...

Words: 2617 - Pages: 11

Premium Essay

Chapter 9- 12 Review

...connects one network to another is called a __________________. router 4. The most common method for illustrating the operations of a networking stack is the __________________, which consists of __________________ layers. Open Systems Interconnection (OSI) reference model, seven 5. Protocols that do not guarantee delivery of their data, but do operate with a very low overhead that conserve network bandwidth are called __________________. connectionless protocols 6. The Windows 7 command-line utility that can tell you if the TCP/IP stack of another system on the network is functioning normally is called __________________. Ping.exe 7. The Windows 7 command-line utility that enables you to generate DNS request messages and then transmit them to specific DNS servers on the network is called __________________. Nslookup.exe 8. Most networks use __________________ to dynamically assign addresses and configure computers to use them. Dynamic Host Configuration Protocol (DHCP) 9. The Windows 7 utility that displays a list of the routers currently forwarding packets to a particular destination is called __________________. Tracert.exe 10. The top and bottom layers of the OSI model are called the __________________ and ________________ layers. application and physical True / False Circle T if the statement is true or F if the statement is...

Words: 2707 - Pages: 11

Premium Essay

School Netwok

...SECTION 1 - WIDE AREA NETWORK The Washington School District Wide Area Network (WAN) will connect all school and administrative offices with the district office for the purpose of delivering data. The WAN will be based on a two-layer hierarchical model. Three (3) regional Hubs will be established at the District Office/Data Center, Service Center and Shaw Butte Elementary School for the purpose of forming a fast WAN core network. School locations will be connected into the WAN core Hub locations based on proximity to the Hub. TCP/IP and Novell IPX will be the only networking protocols that will be acceptable to traverse the district WAN. All other protocols will be filtered at the individual school sites using access routers. High-end, powerful routers will also be installed at each WAN core location. Access to the Internet or any other outside network connections will be provided through the District Office/Data Center through a Frame Relay WAN link. For security purposes, no other connections will be permitted. SECTION 2 - LOCAL AREA NETWORK & WIRING SCHEME Two Local Area Network (LAN) segments will be implemented in each school and the District Office. The transport speeds will be Ethernet 10BASE-T, 100BASE-TX, and 100BASE-FX. Horizontal cabling shall be Category 5 Unshielded Twisted Pair (CAT5 UTP) and will have the capacity (be tested) to accommodate 100 Mbps. Vertical (Backbone) cabling shall be CAT5 UTP or fiber optic multi-mode cable. The cabling infrastructure...

Words: 1723 - Pages: 7

Premium Essay

Indp 2

...Transmission Control Protocols or TCP is among the key methods utilized in Internet Protocol Suites. TCP has got two end systems, a web browser and a web server from which it operates. TCP provides delivery of a stream of bytes from a program on one computer system to another. Internet Protocols operate at a lower level compared to TCP. An IP is used for data transmission across a packet switched internetwork. In X on and X off signals, the X means transmitter. These types of signals are used to manage the movement of data between computer systems on an asynchronous serial connection. In X on, the bit configuration is the keyboard blend of Ctrl-Q and the Ctrl-S combination is for X off. There are two kinds of transmissions, parallel as well as serial. In parallel transmissions, several bits are transmitted on the same radio path at the same time, and are synchronized to a clock. Parallel devices can transfer much more data at a time because they have bigger data buses, instead of the one wire used in serial transmissions. Kudler Fine Foods Network Overview Introduction One of the considered “best fine food stores” around is the Kudler FineFoods. However, Kudler is in serious need of a network infrastructure upgradeof their old one. To introduce the latest technologies in data collection; company communication; and information protection while providing the bestdata speeds and network access; are the main goals of the enterprisenetwork. This huge step is significant as this...

Words: 1083 - Pages: 5

Premium Essay

Class

...You should have the following skills before studying for the Network Pro certification: * Knowledge of PC hardware installation and configuration * Knowledge of using and administering a Windows client computer You can gain these skills through the TestOut PC Pro certification. After finishing this section, you should be able to complete the following tasks: * Read simulated component documentation and view components to make appropriate choices to meet the scenario. * Add and remove simulated computer components. * Change views to view and add simulated components. * Use the zoom feature to view additional image details. * Attach simulated cables. * Use the simulation interface to identify where simulated cables connect to the computer. You have been hired as a network technician for a small corporate network. Today is your first day on the job and you need to familiarize yourself with the network. A new employee will work in Office 2 and you need to complete the workstation in the office. Complete the following tasks in Office 2: * Add the monitor to the office (next to the computer). * Use the DVI-D cable to connect the monitor to the computer. * Connect the power cord to the monitor and plug in the monitor. * Add the mouse to the office, and connect the mouse's USB cable to a USB port on the computer. * Add the keyboard to the office, and connect the keyboard's USB cable to a USB port on the computer. *...

Words: 11760 - Pages: 48