Top-Rated Free Essay
Preview

Understanding the Osi Model

Better Essays
1670 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Understanding the Osi Model
Understanding the OSI Model

November 26, 2012
Understanding the OSI Model The Open Systems Interconnection (OSI) Model is a reference tool for understanding data communications between any two networked systems (Simoneau, 2012). The OSI Model dissects the communication process down to seven layers, where each layer performs specific functions. It helps break a network down to controllable pieces; without this OSI Model networks would be difficult to comprehend. The OSI Models’ seven-layers consist of: physical, data link, network, transport, session, presentation, and application. Within the lower layers (layers 1-3) are based upon mostly hardware, where as the upper layers (layers 5-7) rely typically on software. Between the upper and lower layers resides layer 4, which acts as a divider.

The physical layer concentrates on the transmission of data on the network. One of its fundamentals is how bits are represented on the medium. Binary expression is a stream of 1s and 0s that represent data on a computer network. These streams of 1s and 0s can also be represented through the copper wiring in electrical voltage or the light that is carried through fiber-optic cabling. There are two types of approach: current state modulation and state transition modulation. Current state modulation is the presence or absence of voltage or light that can represent a binary 1 or 0. The other approach, state transition modulation, also represents binary data; this modulation is the transition between voltage or the presence of light that helps indicate a binary value. Layer 1, the physical layer, obviously uses physical topology. Within the physical topology are bus, ring, and star topologies. Asynchronous and synchronous are two basic approaches to bit synchronization. Synchronizing bits is used for two networked devices to communicate effectively in the physical layer. This is so both networked devices can agree upon when one bit stops and another starts. With the asynchronous approach a sender signals that it is about to start transmitting. This is by sending a start bit to the receiver. The receiver then picks up the start bit and starts its own internal clock to measure the subsequent bits. Once the sender transmits its data, it then sends a stop bit to signify that it has finished its transmission. With synchronous approach the networks synchronize the internal clocks of the sender and receiver to guarantee they agree with when the bits begin and end. An external clock, provided by a service provider, is used to make this synchronization happen. This is indited by both sender and receiver. Also with the physical layer, layer 1, is bandwidth usage. Other than bits and bytes and their multiples, probably the second most significant concept to understand about computer measurements is bandwidth, also known as data transfer rate (Mueller, Soper, & Prowse, 2011). Bandwidth usage includes two basic fundamental approaches: broadband and baseband. Broadband technologies divide the bandwidth available on a medium (for example, copper or fiber-optic cabling) into different channels (Wallace, 2012). After dividing the available bandwidth, different communication streams will then convey over the various channels. An example of this is Frequency-Division Multiplexing, or FDM, used by a cable modem that uses specific ranges of frequencies on the cable that comes into a home from a local company to carry incoming data, outgoing data, and other frequency ranges for television stations. Unlike broadband, baseband uses all available frequencies on a medium to transmit data. An example of networking technology using baseband is Ethernet. Following layer 1 is the data link layer, layer 2. The data link layer pertains with packaging data into frames and sending those frames on to the network, performing error detection and correction, identifies network devices with different addresses, and managing flow control. The data link layer has two sub layers: MAC and LLC. MAC stands for Media Access Control. MAC addressing is physical addressing, which has a 48-bit address deputed to a device’s network interface card. MAC addresses are usually written in hexadecimal notation. Of the 48-bit address, the first 24 bits are commonly known as the vendor code. Vendor codes determine the manufacturer of a network device. This determination is based on the first half of the device’s MAC address. In the last 24 bits each vendor is accountable for using their own unique values, so that no two MAC addresses should have the same value. Layer 2 devices consider a network as a logical topology. Logical topology regards bus and ring topologies. When a network is connected with several devices it has allowance to transmit on the media. If not, multiple devices may transfer at the same time and hinder one another’s transmission. Another sub layer to the data link layer is LLC. LLC stands for Logical Link Control. Connection services are used for when a device on a network receives a message from a different device on the network. The receiving device can give feedback to the sender in the form of a message. The two functions provided by messages are flow control and error control. Flow control restricts how much data senders are able to send simultaneously. This is so the receiver is not overwhelmed with more information than it can handle. Error control permits the data receiver to give the sender acknowledgement of the data frame, whether it was received, or if the data was corrupted when received. The network layer, layer 3, is first and foremost concerned with forwarding data based on logical addresses. There are many routed protocols that have their own logical addressing design. Though the most commonly distributed routed protocol is Internet Protocol. At layer 3, switching is making decisions about how data should be forwarded. Packet switching, circuit switching, and message switching are all switching methods. Packet switching has a data stream that is divided into individual packets. Each individual packet contains a Layer 3 header that has a source and a Layer 3 destination address. Circuit switching has a vigorously devoted communication link among two parties in order for them to communicate. A simpler explanation of circuit switching is when two lines open and close at the same time. Message switching is different than packet switching and circuit switching. The data stream in message switching is divided into messages, where the individual messages are tagged with a destination address. On the way to their destination the messages travel from one network device to another. Message switching within a network is sometimes referred to as a store-and-forward network, for the simple fact that some devices may temporarily store messages before forwarding them. Layer 4, the transport layer, serves as a divider between the upper and lower layers. There are two transport layer protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is a connection based transport protocol that provides dependable transports; if a segment is dropped the sender can distinguish it and retransmit it. Windowing is used in TCP connections when one or more segments are sent at the same time. The receiver will acknowledge the receipt of all segments in the window with a single accommodation. The UDP is not a connection based protocol. These connectionless protocols do not provide reliable transports; if a segment drops the sender will not be aware of this. Therefore, no retransmission will arise. Internet Control Message Protocol (ICMP) is another transport layer protocol that may be experienced in this layer. Utilities like ping and traceroute are used with ICMP. The fifth layer, the session layer, is accountable for setting up, maintaining, and tearing down of a session. A session is like a dialogue that should be treated independently from other sessions to avoid crossfire of data from other dialogues. When setting up a session the user’s credentials should be checked, numbers should be assigned to the sessions’ communication flow, and figuring which services are going to be needed during the session and which devices should start the transmission of data. To maintain a session one must transfer data, restoration of a disconnected session, and to allow receipt of data. An example of tearing down a session would be when two networkers are communicating through dial-up and one loses connection. The loss of connection tears down the session.

The presentation layer is the sixth layer. The presentation layer is responsible for formatting of data being exchanged and securing that data with encryption (Wallace, CompTIA Network + N10-005, 2012). The presentation layer handles data formatting with the same techniques as formatting text. Data formatting consists in the presentation layer consists of text, graphics, and even multimedia. Encryption is used to disguise personal data so a malicious user cannot intercept the personal data such as social security numbers or confidential documents. The application layer is the final layer, layer seven. This layer supplies application services within a network. End-user applications, such as Microsoft Word, do not dwell within this layer. E-mail, however, is an application layer service that inhabits the seventh layer. Another basic of layer seven is advertising services that are available. Some of these services send out advertisements to publicize their services to other networked devices. In all, the OSI Model is beneficiary in the aspect that it organizes thoughts of a network and gives network explorers a computer networking language. The main purpose for the OSI Model is to easily comprehend the computer communication of networking.
References

Mueller, S., Soper, M. E., & Prowse, D. L. (2011). CompTIA A+ 220-701 and 220-702. In S. Mueller, M. E. Soper, & D. L. Prowse, CompTIA A+ 220-701 and 220-702 (p. 14). Indianapolis: Pearson Education, Inc.
Simoneau, P. (2012, December 1). Global Knowledge Training LLC. Retrieved from Global Knowledge Web site: http://faculty.spokanefalls.edu/Rudlock/files/WP_Simoneau_OSIModel.pdf
Wallace, K. (2012). CompTIA Network + N10-005. In K. Wallace, CompTIA Network + N10-005 (p. 45). Indianapolis: Pearson Education, Inc.
Wallace, K. (2012). CompTIA Network + N10-005 Authorized Cert Guide. In K. Wallace, CompTIA Network + N10-005 Authorized Cert Guide (p. 35). Indianapolis: Pearson Education, Inc.

References: Mueller, S., Soper, M. E., & Prowse, D. L. (2011). CompTIA A+ 220-701 and 220-702. In S. Mueller, M. E. Soper, & D. L. Prowse, CompTIA A+ 220-701 and 220-702 (p. 14). Indianapolis: Pearson Education, Inc. Simoneau, P. (2012, December 1). Global Knowledge Training LLC. Retrieved from Global Knowledge Web site: http://faculty.spokanefalls.edu/Rudlock/files/WP_Simoneau_OSIModel.pdf Wallace, K. (2012). CompTIA Network + N10-005. In K. Wallace, CompTIA Network + N10-005 (p. 45). Indianapolis: Pearson Education, Inc. Wallace, K. (2012). CompTIA Network + N10-005 Authorized Cert Guide. In K. Wallace, CompTIA Network + N10-005 Authorized Cert Guide (p. 35). Indianapolis: Pearson Education, Inc.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    References: Russell P, Hertz PE, McMillan B, Fenton B, Addy H, Maxwell D, Haffie T, Milsom B. 2014.…

    • 1032 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 Lab 2.1

    • 374 Words
    • 2 Pages

    Almost all networks in use today are based in some fashion on the Open Systems Interconnection (OSI) standard. The core of this standard is the OSI Reference Model, a set of seven layers that define the different stages that data must go through to travel from one device to another over a network. But the OSI is just a guideline.…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Javvin.com, (n.d.). OSI 7 Layers Reference Model For Network Communication. Retrieved on Wednesday, October 20, 2010, from http://www.javvin.com/osimodel.html…

    • 1324 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Interconnection (OSI) Model - is a conceptual and logical layout that defines network communication used by systems open to interconnection and communication with other systems.…

    • 559 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    It230 Wk1 Checkpoint

    • 576 Words
    • 3 Pages

    The first layer, physical, obtains a function that has the purpose of sending or receiving data by way of signals or voltages through physical aspects such as, cables or cards. With such data, signals, voltages, physical aspects of cables and cards, it is what is utilized in network connecting. The second layer, data-link, consists of encoded, decoded bits of data packets, which consists also of a management, knowledge transmission-protocol that works in connection with two additional internal layers, “media access control (MAC) layer and the logical link control (LLC) layer”, (2006. PP.S3). Both additional layers serve a function and purpose that determines how data is accessed from a network computer, gives it the data transmit permission, and controls in relation to checking for error(s), controls flow, and synchronization of the frame.…

    • 576 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IT245 PH3 DB1

    • 310 Words
    • 1 Page

    Layer 1 - The Network Access Layer combines functions from the three lower layers of the OSI model (Network Layer, Data Link Layer, and Physical Layer.) It defines the protocols for physical data transmission and mapping IP address to the hardware address (MAC address). Used on the network.…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Bennett-Alexander, D., & Hartman, L. P. (2007). [University of Phoenix Custom Edition eBook]. : McGraw Hill. Retrieved from University of Phoenix, MGT/434 website…

    • 1070 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    References: Black, R., Allen, L., Bhutta, Z., Caulfield, L., de Onis, M., Ezzati, M., & ... Rivera, J. (2008).…

    • 1347 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    - OSI Reference Model Network Reference Models A computer network connects two or more devices together to share information and services. Multiple networks connected together form an internetwork. Internetworking present challenges - interoperating between products from different manufacturers requires consistent standards. Network reference models were developed to address these challenges. A network reference model serves as a blueprint, detailing how communication between network devices should occur. The two most recognized network reference models are: • The Open Systems Interconnection (OSI) model • The Department of Defense (DoD) model Without the framework that network models provide, all network hardware and software would have been proprietary. Organizations would have been locked into a single vendor’s equipment, and global networks like the Internet would have been impractical, if not impossible. Network models are organized into layers, with each layer representing a specific networking function. These functions are controlled by protocols, which are rules that govern end-to-end communication between devices. Protocols on one layer will interact with protocols on the layer above and below it, forming a protocol suite or stack. The TCP/IP suite is the most prevalent protocol suite, and is the foundation of the Internet. A network model is not a physical entity – there is no OSI device. Manufacturers do not always strictly adhere to a reference model’s blueprint, and thus not every protocol fits perfectly within a single layer. Some protocols can function across multiple layers.…

    • 3074 Words
    • 13 Pages
    Satisfactory Essays
  • Best Essays

    Throughout the history of networking, one model has stood the test of time for providing not only insight, but also a foundation by which all networking systems utilize in some form or fashion. The seven layers of the OSI model, which stands for Open System Interconnect, are: Application, Presentation, Session, Transport, Network, Data link, and Physical. These layers are the framework for networking, because they represent the roadmap, rules, and process that every message must adhere to when it is sent across networks. Just as a package is sent from UPS or Fed-Ex with a routing number, a sender, a receiver, an address, and many other things that are involved with the delivery of the package, the same principles can be applied to networking messages or packets by using the OSI model. The Session layer of the OSI Model, “Provides the control functions necessary to establish, manage, and terminate the connections as required to satisfy the user requests,” (Beasley 123). This layer is in direct contact with the user through the different interfaces and the connections can be managed and manipulated in many different ways. For instance if I wanted to terminate my connection because of a severe thunderstorm there are a bunch of ways I could do that. I could pull the plugs; I could disable the router then power it down and power down my switch and then power down the rest of my network. If I operated ITT-Tech’s network and in order to control the employees’ use of the internet and to keep them working, I could put a filter using barracuda on all websites that wouldn’t pertain to work related subjects. It would manage their use of the network and keep them focused on their work. These are just several examples of the Session layer of the OSI Model in action.…

    • 1514 Words
    • 7 Pages
    Best Essays
  • Best Essays

    Term Paper

    • 2292 Words
    • 10 Pages

    References: 1. ^ McCarter, Robert (2005). Louis I. Kahn. London: Phaidon Press. p. 258,270. ISBN 0714840459.…

    • 2292 Words
    • 10 Pages
    Best Essays

Related Topics