100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
Previously searched by you
Summary Network Security Analysis .docx Network Security Analysis NTC/362: Fundamentals of Networking April 25,2020 1.OSI Model discussion he OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a netwo$7.49
Add to cart
Summary Network Security Analysis .docx Network Security Analysis NTC/362: Fundamentals of Networking April 25,2020 1.OSI Model discussion he OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a netwo
11 views 0 purchase
Course
University Of Phoenix UoP
Institution
University Of Phoenix
Network Security Analysis .docx Network Security Analysis NTC/362: Fundamentals of Networking April 25,2020 1.OSI Model discussion he OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes com...
network security analysis docx network security analysis ntc362 fundamentals of networking april 25
2020 1osi model discussion he osi model open systems interconnection model is a conceptu
Written for
University Of Phoenix
University Of Phoenix UoP
All documents for this subject (3706)
Seller
Follow
helperatsof1
Reviews received
Content preview
Network Security Analysis
NTC/362: Fundamentals of Networking
April 25,2020
, 1. OSI Model discussion
he OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe
the functions of a networking system. The OSI model characterizes computing functions into a
universal set of rules and requirements in order to support interoperability between different
products and software. In the OSI reference model, the communications between a computing
system are split into seven different abstraction layers: Physical, Data Link, Network, Transport,
Session, Presentation, and Application.
1. Physical Layer
The lowest layer of the OSI Model is concerned with electrically or optically transmitting raw
unstructured data bits across the network from the physical layer of the sending device to the
physical layer of the receiving device. It can include specifications such as voltages, pin layout,
cabling, and radio frequencies. At the physical layer, one might find “physical” resources such as
network hubs, cabling, repeaters, network adapters or modems.
2. Data Link Layer
At the data link layer, directly connected nodes are used to perform node-to-node data transfer
where data is packaged into frames. The data link layer also corrects errors that may have occurred
at the physical layer. The data link layer encompasses two sub-layers of its own. The first, media
access control (MAC), provides flow control and multiplexing for device transmissions over a
network. The second, the logical link control (LLC), provides flow and error control over the
physical medium as well as identifies line protocols.
3. Network Layer
, The network layer is responsible for receiving frames from the data link layer and delivering them
to their intended destinations among based on the addresses contained inside the frame. The
network layer finds the destination by using logical addresses, such as IP (internet protocol). At
this layer, routers are a crucial component used to quite literally route information where it needs
to go between networks.
4. Transport Layer
The transport layer manages the delivery and error checking of data packets. It regulates the size,
sequencing, and ultimately the transfer of data between systems and hosts. One of the most
common examples of the transport layer is TCP or the Transmission Control Protocol.
5. Session Layer
The session layer controls the conversations between different computers. A session or connection
between machines is set up, managed, and termed at layer 5. Session layer services also include
authentication and reconnections.
6. Presentation Layer
The presentation layer formats or translates data for the application layer based on the syntax or
semantics that the application accepts. Because of this, it at times also called the syntax layer. This
layer can also handle the encryption and decryption required by the application layer.
7. Application Layer
At this layer, both the end user and the application layer interact directly with the software
application. This layer sees network services provided to end-user applications such as a web
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller helperatsof1. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.49. You're not tied to anything after your purchase.