Free Essay

Checkpoint Osi Model

In: Computers and Technology

Submitted By freebird2969
Words 609
Pages 3
CheckPoint: OSI Model Due Week 1 Day 4

Describe the OSI model and how it relates to a network in 200 to 300 words. Your response should include answers to the following:

- On which layers of the OSI model do WAN protocols operate? - What are some of these protocols? - On which OSI layers do switches and routers operate? - If routers reside at more than one layer, what is the difference between the OSI layers?

• On which layers of the OSI model do WAN protocols operate?

WAN protocols function at the lower three layers of the OSI reference model: the physical layer, the data-link layer, and the network layer.

• What are some of these protocols?

Frame Relay- is a high performance WAN protocol that operates at the physical and data-link layers of the OSI model. The Frame Relay allows for use across ISDN (Integrated Services Digital Network) interfaces. It is a good example of a packet-switched technology.

LAPB, which stands for, “Link Access Procedure Balanced” – is a data-link layer protocol that manages communication and packet framing between devices. It shares the same frame format, types and field functions as SDLC and HDLC. However, unlike either of those, LAPB is restricted to the ABM transfer mode and is appropriate only for combined stations. LAPB, circuits can be established by either the data terminal equipment, or the data circuit-terminating equipment. The station initiating the call is determined to be the primary, and the responding station is the secondary.

HDLC – High-Level Data Link Control, specifies a method to encapsulate data over synchronous serial links using frame characters and checksums. No authentication can be used with HDLC. The reason each vendor has a proprietary encapsulation of HDLC is that they each have a different way for the HDLC protocol to communicate with the Network layer protocols, and the ISO standard doesn't allow for multiple protocols on a single link. Since, they needed a way for HDLC to communicate with layer-3 protocols the HDLC can carry more than one type of protocol.

PPP- Point-to-Point protocol is a datalink-layer protocol that can be used over asynchronous serial, which is dial-up and synchronous serial, which is Integrated Service Digital Network media and uses the Link Control Protocol to build and maintain data-link connections. The basic purpose of PPP is to transport layer-3 packets over a Data Link layer point-to-point link. PPP consists of two main components, the Link Control Protocol and a family of Network Control Protocols. The PPP allows for the simultaneous use of multiple Network layer protocols.

ATM (Asynchronous Transfer Mode) - It encodes data into small fixed-sized cells and provides data link layer services that run over the OSI physical layer. ATM allows properties from both circuit switched and small packet switched networking, making it suitable for wide area data networking as well as real-time media transport.

• On which OSI layers do switches and routers operate?

A Network Switch's main purpose is to provide connectivity between LAN clients. Any switch that provides this 'basic functionality operates at the second OSI layer also known as the Datalink Layer. Routers operate on the third layer of the OSI Model, the Network-Control Layer.

• If routers reside at more than one layer, what is the difference between OSI layers?

Since routers are identified as Layer-3 devices, because they process logical addressing information in the Network header of a packet, such as IP addresses. Therefore, I do not believe they can operate on more than one layer and if they did, there would not be a difference between the layers.

Similar Documents

Premium Essay

It 240 Week 2 Checkpoint Osi Model Key

...Axia College Material Appendix C OSI Model Key Terms Table Use the table to define the key terms related to the OSI Model. Describe the functions of any hardware connectivity devices and tools listed. . | | |Function | |Term |Definition |(if applicable) | |Physical layer |This is the first and lowest layer in the |This is when the data is sent on the | | |seven-layer OSI model. |network media by the NIC. | |Data link layer |This is layer two of the OSI model and |The Data link layer is responsible for | | |resides above the Physical Layer and below |communications between adjacent network | | |the Network Layer. |nodes. | |Network layer |The Network Layer is layer three of the OSI|The Network Layer is responsible for | | |model and resides above the Data Link Layer|establishing paths for data transfer | | |and below the Transport......

Words: 590 - Pages: 3

Premium Essay

Richman Investments Remote Access Control Policy

...SHAUN PARE 4/9/12 ESSAY 2/ 500 WORD What is the OSI model the 7 layers The Open Systems Interconnection or (OSI model) “Is an architectural model that represents networking communication. It was introduced in 1978 by the International Organization for Standards to standardize the level of services and types of interactions for computers communicating over a network” (Emdad). The OSI is the standard that sets the path that data must travel through from one computer to another through a network. The OSI does this by the sending the through seven different layers almost like sending the data through checkpoints and at each checkpoint the data must be cleared so it is able to move on to the next stop. This is what the seven layers of OSI do. The data must go each layer, each layer performs a specific task in order to pass the data through to the next layer, and these layers also communicate to the layer above and below to make sure that everything in order. There are seven layers and each one has a specific function that prepares it for next layer the data must pass through all seven layers. The layers are separated into two sets the first is the application set • Application layer 7- This is the layer that provides the interface between the network protocol and the software running on the computer. This layer handles anything that communicates with the internet; this layer also handles any network related activity such as file transfers or reading and sending email.......

Words: 606 - Pages: 3

Premium Essay

Osi Model

...Checkpoint: Week 1 Day 5 OSI Model When we breakdown the OSI model you will see that in the seven layers of the design, a decision is made in the third layer, which WAN protocols operate on is known as the network layer. This layer carries out regular tasks such as pinpointing routings diagrams and end to end addressing. Some layers associate a unit also known as a brouter that works like a bridge and a router. Now on layers two thru four routers and switches work on these layers which are commonly known as the data link layer and the transport layer. As stated earlier on the network layer, which is layer two on the OSI model, is where the routing and addressing are carried out. In the OSI model during the transport layer is where we see the mistake handling and the flow control at work. Finally, synchronizations and assemblies are finished on the fourth layer of the OSI model. Configured of various parts every layer conducts a unique role inside the network. Additionally, each layer incorporates everything to the data which is then transmitted point to point. Protocols at work during this time are known as the frame relay protocol, HDLC, and PPP. The protocol that works as a data link layer is known as the frame relay protocol in the OSI model. The HDLC means high level data link in the model, and the PPP is an additional protocol which works on different layers of the OSI model....

Words: 253 - Pages: 2

Premium Essay


... | | |College of Information Systems & Technology | | |IT/240 Version 4 | | |Intro to LAN Technologies | Copyright © 2012, 2009, 2007 by University of Phoenix. All rights reserved. Course Description This foundational course covers local area network topics including rationale for networking, the open systems interconnection (OSI) model, common network topologies and architecture, client/server concepts, basic hardware devices and usage, and basic networking security concepts. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your......

Words: 2355 - Pages: 10

Premium Essay

Network & Telecommunication Concepts

... Individual Assignment; TCP/IP Architecture and OSI Layers TCP/IP Architecture and OSI Layers [your name here] NTC360 Network and Telecommunications Concept Associate Professor Anthony Bruno January 04, 2011 The purpose of this paper is to describe an OSI (Open Systems Interconnection) Model with details about each of the seven layers. The OSI reference model adopts a layered approach, where a communication subsystem is broken down into seven layers, each one of which performs a well-defined function. Additionally it is important to understand the purpose of the OSI model in the overall networking architecture especially as it relates to the TCP/IP (Transmission Control Protocol/Internet Protocol) Architecture, which also consists of layers each playing a particular role in the networking design. Generally speaking, the network protocol layer, which is similar to the data and network layer of the OSI model includes the protocols that allow clients and applications to send data over the network. This includes TCP/IP, NWLink (IPX/SPX), NetBEUI, Infrared Data Association (IrDA). However, the purpose of this document is to focus on the relationships between the OSI model and the TCP/IP architectures, and how they may interact together. Finally, as demonstration of this relationship a visual diagram has been provided to depicts how the TCP/IP layers correspond to the OSI model and layers. To begin with, it is important......

Words: 1573 - Pages: 7

Premium Essay


...packet to locate any available DHCP server in order to request DHCP IP address information. 2. c DHCP operates at the Application Layer of the OSI model. 3. a The TFTP protocol is a lightweight alternative to FTP. It is capable of this level of efficiency because it uses the connectionless User Datagram Protocol (UDP) for communication rather than the acknowledgement-based Transmission Control Protocol (TCP). 4. b T1 is a time indicator that corresponds to 50% of the DHCP lease time; T2 corresponds to 87.5% of the total DHCP lease time. 5. b A DHCP server will hand out IP addresses to requesting clients from its available address pool, which consists of the total address range less any IP addresses that have been configured as exclusions from the available range. 6. c The TFTP protocol was used by BOOTP, the predecessor to DHCP, which was used to provide automatic IP addressing information to diskless workstations. 7. c When you reconcile a server or a scope, the DHCP service uses both the summary information in the registry and the detailed information in the DHCP database to reconstruct the most current view of the DHCP service. 8. c Superscopes contain only a list of member scopes or child scopes that can be activated together; they are not used to configure other details about scope use. 9. c The checkpoint file is used to indicate the last successful write to the database file, such as in cases in which a server is shut down unexpectedly......

Words: 1569 - Pages: 7

Premium Essay

Week Four Individual Assignment

...Week Four Individual Assignment Kevin M. Gattas University of Phoenix IS Concepts Richard Bohn Purpose The importance of the OSI (open systems interconnection) model is for networks to communicate within the system. It is a system formed to allow a network administrator to perform trouble shooting in a way that is logical and step by step within the OSI model Scope The purpose of this essay is to break down the seven layers of the OSI model. The seven layer model defines a standard by which to computer share data over a network space starting with application layer. It will break each modeling section to lay out a more detailed explanation of how each layer is operated and how they all work together. Also, it will discuss which level this packet filtering routers and firewalls reside at, how packet filtering routers and firewalls protect the network and the concepts of cryptography. The seven layers of the OSI model are: 1. Physical layer 2. Data link layer 3. Network layer 4. Transport layer 5. Session layer 6. Presentation layer 7. Application layer Application Layer (Layer 7) The application layer is the most directly related to computer user because it is the top of the layer hierarchy. This layer provides several application services such as file transfer, resource allocation and whether the identification and verification of the computer is available. This layer is most familiar to us because it is what we......

Words: 1254 - Pages: 6

Premium Essay

Week 3 Team

...Week 3 Team Assignment NTC/362 November 24, 2014 OSI Model The Open Systems Interconnection (OSI) has been a reference for model network protocols since the mid-1990s. The OSI is formally known as the Open Systems Interconnection (OSI) model ISO/IEC 7498-1. The International Organization for Standardization (ISO), is a global standards-settings group that is comprised of members from various national standards groups. International Electrotechnical Commission (IEC) is another global standards-settings group; however, it focuses on electrical, electronic, and related technologies. (Foundational Focus: OSI Model-Breaking Down the Seven Layers, 2013) The OSI model is comprised of seven layers, with layer one positioned at the bottom of the layer stack and layer seven at the top. The layers have assigned names as well as number references. Layer 7, the application layer, is the interface between the protocol stack and application software. The software might be client or utilities or server services. It is the ability of software to communicate with the standardized interface of application layer protocols that makes network communications possible. Layer 6, the presentation layer, establishes the context between disparate application layer protocols. Effectively, the presentation layer adjusts syntax, semantics, data types, data formats, etc. This layer ensures that data sent by the application is compatible with the lower layers of network communication and that......

Words: 2317 - Pages: 10

Free Essay

It 240

...Associate Level Material Appendix C OSI Model Key Terms Table Use the following table to define the key terms related to the OSI model. Describe the functions of any hardware connectivity devices and tools listed. |Term |Definition |Function | | | |(if applicable) | |Physical layer |Will convert bits into signals for outgoing|This will change the data packets to | | |messages and signals into bits for incoming|physical signals which symbolize 1’s and | | |messages.. |0’s and then later will send the physical | | | |signal to the destination. | |Data link layer |Will work with frames and is intermediary |The layer splits data that is obtained from| | |between Network layer and Physical Layer. |the network later to the frames and the | | | |physical layer can transmit. It will also | | | ...

Words: 794 - Pages: 4

Premium Essay


...Checkpoint: Firewalls IT/242 Your Name A firewall is one of the main software features that are in a computer system or a network. The job of a firewall is to prevent unauthorized access from the outside while authorizing access that is permitted. Firewalls are mainly used to keep outside intruders from accessing the private networks. There are several types of firewalls that are available for security. Firewall can be used for a home network, work network, and large business networks. The first level for a firewall is the packet filters. The packet filters can offer access and refuse access to any machines that are located within the network system and outside the network. It is also able to manage the direction of access the machine has. A firewall can control and allow incoming traffic as well as outgoing traffic. The second level is the application level gateway. The application level gateways are kept between the user that is on the Internet network and the service on the Internet. The next level of firewall is the circuit level gateway. The circuit level gateway functions on the transport level of the OSI model. The UDP and TCP are checked by the Circuit level gateways before attempting to make the connection. A proxy server is the last level of a firewall. This is used to intercept all of the messages that enter and leave the network system. The proxy server is able to conceal the true network addresses. When it comes down to choosing which firewall will best......

Words: 320 - Pages: 2

Premium Essay


...March 2013 04/19/2013 Assignment labels on Pages 43, 52, 61, 78, 87, 97, 106 and 132. Added labels to identify additional assignments in affected units Clarification of additional assignments March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport, and Application Layers 24 Unit 3: IP Subnetting and Basic Router Configuration 34 Unit 4: IP Routing with Connected, Static, and RIP-2 Routes 44 Unit 5: IP Troubleshooting and EIGRP 53 Unit 6: Subnet Design 62 Unit 7: Advanced IP Routing Topics and OSPF 69 Unit 8: Advanced IP Topics 79 Unit 9: LANs 88 Unit 10: WANs 98 Unit 11: Course Review and Final Examination 107 COURSE SUPPORT TOOLS AND ASSESSMENTS 108 MIDTERM AND FINAL EXAMINATION ANSWER KEYS 112 MIDTERM EXAM ANSWER KEYS 112 FINAL EXAM ANSWER KEYS 114 SUBNETTING LAB SOLUTIONS 116 Subnetting Lab 1 Solutions 116 Subnetting Lab 2 Solutions 117 Subnetting Lab 3 Solutions 118 Subnetting Lab 4......

Words: 22068 - Pages: 89

Free Essay


... Assignment 01 | Advanced Network and Security | | ICT/12/0121 WMIL Wasalage | 9/23/2013 | | Abstract This document contains a detailed explanation about the ISO OSI Reference Model used in networking and it also contains details about the networking devices used in setting up LANs & WANs. Abstract This document contains a detailed explanation about the ISO OSI Reference Model used in networking and it also contains details about the networking devices used in setting up LANs & WANs. Acknowledgement I would like to express my special thanks of gratitude to Mrs. Punsisi Premaratne who gave me this opportunity to do this project in the networking field. Secondly i would like to thank my parents and friends who helped me a lot in finalizing this project within the limited time frame. Acknowledgement I would like to express my special thanks of gratitude to Mrs. Punsisi Premaratne who gave me this opportunity to do this project in the networking field. Secondly i would like to thank my parents and friends who helped me a lot in finalizing this project within the limited time frame. Table of Contents Abstract 01 Acknowledgement 02 Table of Content 03 List of Figures 04 1.0 Introduction to ISO OSI Reference Model 05 1.1 Physical Layer 07 1.2 Data Link Layer 08 1.3 Network Layer 10 1.4 Transport Layer 11 1.5 Session Layer 12 1.6 Presentation......

Words: 5991 - Pages: 24

Premium Essay

It240 Week 2 Osi

...|Week Two Check Point: OSI Model Key Terms Table | |  |Points Earned |Points Possible | | |Suggested response: | | | |Term | | | |Definition | |Function | |(if applicable) | | | |Physical layer...

Words: 556 - Pages: 3

Premium Essay

Knowledge Assessment

... 6. This is performed by a DHCP server when corruption is detected within the DHCP database. * G 7. The DHCP database is based on this database technology. * I 8. Authorizing DHCP servers in Active Directory is designed to prevent against these. * C 9. These provide DHCP parameters to DHCP clients based on vendor or user type. * J 10. This defaults to 87.5% of the total DHCP lease. Multiple Choice Select all answers that apply for the following questions. 1. Which of the following DHCP message types is sent first in the process of obtaining an address lease? * a. DHCPOFFER * b. DHCPACK * c. DHCPDISCOVER * d. DHCPREQUEST 2. At which layer of the OSI model does DHCP operate? * a. Session layer * b. Network layer * c. Application layer * d. Presentation layer 3. What protocol is used by the Trivial File Transfer Protocol (TFTP)? * a. User Datagram Protocol (UDP) * b. Transmission Control Protocol (TCP) * c. Internet Protocol (IP) * d. Internet Message Control Protocol (ICMP) 4. A DHCP client first attempts to reacquire its lease at half the lease time, which is known as: * a. DHCP reservation * b. T1 * c. T2 * d. DHCP lease 5. The _______ is composed of the remaining addresses within a DHCP scope once all exclusion ranges have been applied. * a. total address pool * b. available address pool * c. net address pool * d.......

Words: 758 - Pages: 4

Free Essay

Electronic Commerce

...the Web, Web designing using HTML, CSS and Java Scripting Client side & server side processing, Cookies, Maintaining state in a stateless environment, two tier/ntier architecture Security issues on the internet, Firewalls, Proxy Server, Virtual Private Network Cryptography and Public key infrastructure (PKI), Certification Authorities and Digital Certificates, Digital signatures Technology Electronic Payment Systems – Virtual Pin payment system, Centralized account system, Electronic Check, E-Cash, SSL and SET based payment systems E-business– advantages/disadvantages, Paper and electronic catalogues Electronic Data Interchange (EDI) E-business models Internet marketing Data mining and knowledge discovery Process, OLAP, Types and business application of data mining E-business strategy, supply chain/value chain analysis and Porter’s model, role of e-commerce in competitive strategy E-banking, ERP Legal/policy issues in e-commerce –salient features of Electronic Transactions Ordinance, 2002 in Pakistan Territorial jurisdiction and conflict of laws, online contracts, online defamation, Copyright in Cyberspace Issue of ISP’s liability, domain-name and trade mark conflicts, privacy issue on the internet, Cyber crimes Suggested books Electronic Commerce (4th edition) by Gary P. Schneider Electronic Commerce : Security, Risk Management and Control by Greenstein & Feinman Electronic commerce – A Managerial Perspective by Turban et al. Absolute Beginner’s Guide to Networking (3rd......

Words: 9120 - Pages: 37