100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
Summary Network Security Analysis .docx Network Security Analysis NTC/362: Fundamentals of Networking April 25,2020 1.OSI Model discussion he OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a netwo €7,09   In winkelwagen

Samenvatting

Summary Network Security Analysis .docx Network Security Analysis NTC/362: Fundamentals of Networking April 25,2020 1.OSI Model discussion he OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a netwo

 11 keer bekeken  0 keer verkocht
  • Vak
  • Instelling

Network Security Analysis .docx Network Security Analysis NTC/362: Fundamentals of Networking April 25,2020 1.OSI Model discussion he OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes com...

[Meer zien]

Voorbeeld 3 van de 16  pagina's

  • 10 januari 2021
  • 16
  • 2020/2021
  • Samenvatting
avatar-seller
Network Security Analysis

NTC/362: Fundamentals of Networking

April 25,2020

, 1. OSI Model discussion

he OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe

the functions of a networking system. The OSI model characterizes computing functions into a

universal set of rules and requirements in order to support interoperability between different

products and software. In the OSI reference model, the communications between a computing

system are split into seven different abstraction layers: Physical, Data Link, Network, Transport,

Session, Presentation, and Application.


1. Physical Layer


The lowest layer of the OSI Model is concerned with electrically or optically transmitting raw

unstructured data bits across the network from the physical layer of the sending device to the

physical layer of the receiving device. It can include specifications such as voltages, pin layout,

cabling, and radio frequencies. At the physical layer, one might find “physical” resources such as

network hubs, cabling, repeaters, network adapters or modems.


2. Data Link Layer


At the data link layer, directly connected nodes are used to perform node-to-node data transfer

where data is packaged into frames. The data link layer also corrects errors that may have occurred

at the physical layer. The data link layer encompasses two sub-layers of its own. The first, media

access control (MAC), provides flow control and multiplexing for device transmissions over a

network. The second, the logical link control (LLC), provides flow and error control over the

physical medium as well as identifies line protocols.


3. Network Layer

, The network layer is responsible for receiving frames from the data link layer and delivering them

to their intended destinations among based on the addresses contained inside the frame. The

network layer finds the destination by using logical addresses, such as IP (internet protocol). At

this layer, routers are a crucial component used to quite literally route information where it needs

to go between networks.


4. Transport Layer


The transport layer manages the delivery and error checking of data packets. It regulates the size,

sequencing, and ultimately the transfer of data between systems and hosts. One of the most

common examples of the transport layer is TCP or the Transmission Control Protocol.


5. Session Layer


The session layer controls the conversations between different computers. A session or connection

between machines is set up, managed, and termed at layer 5. Session layer services also include

authentication and reconnections.


6. Presentation Layer


The presentation layer formats or translates data for the application layer based on the syntax or

semantics that the application accepts. Because of this, it at times also called the syntax layer. This

layer can also handle the encryption and decryption required by the application layer.


7. Application Layer


At this layer, both the end user and the application layer interact directly with the software

application. This layer sees network services provided to end-user applications such as a web

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper helperatsof1. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €7,09. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 84251 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€7,09
  • (0)
  Kopen