Top-Rated Free Essay
Preview

Osi Model Security Memo

Satisfactory Essays
407 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Osi Model Security Memo
MEMORANDUM TO: Network Group

FROM: Student

SUBJECT: Security and the OSI Model

The Open Systems Interconnect (OSI) Model is the basis on which network communications function. Every network application more or less adheres to the standards of the OSI Model. Each layer of the OSI model represents a level of network functionality. For each layer, there are different types of security to protect the network at that layer. The physical layer is the actual medium in which the data travels. This is usually a wire, hub, or over the air. The physical layer can be secured by protecting access to network cables and ports. Data transmitted over fiber optics is much harder to intercept than data being transmitted over copper wire. The data link layer establishes the connection for the physical layer and turns the data from higher layers into the bits that will be transmitted across the medium. Security for the data link layer can be accomplished with port security, MAC address filtering, and wireless encryption. The network layer is the layer that most people think of when it comes to network security. Network firewalls operate by blocking IP addresses which are network layer characteristics. Routers are configured to provide network layer security as well. Any security feature that allows or denies access based on IP address is a level 3 security device. For the top 4 layers of the OSI model security and protocols don't always fall under a single layer. The transport layer plays a major part with SSL and of course TLS (Transport Layer Security). These protocols use encryption and keys to ensure private connections. Communication sessions between hosts are established and terminated at the session layer. There is no security feature directly associated with the session layer exclusively. The protocols for FTP, SMTP, and HTTP take place at the session layer. TCP port numbers are assigned at the session layer and some routers and firewalls may block traffic based on port number. Encryption and decryption take place at the presentation layer. This layer deals with ASCII character representation and the interpretation of characters into readable or usable information. Transmitted data is encrypted by the sender and then decrypted by the receiver at this layer. The final layer is the application layer. Here is where the end application sends the data or receives it from another application. The most common security feature of the application layer is password authentication.

Signed Student, NTC410

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 4

    • 3225 Words
    • 13 Pages

    The value of layers in the OSI reference model is that it divides networking into a series of tasks, and then illustrates how those tasks relate to each other.…

    • 3225 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 1 Assignment

    • 987 Words
    • 4 Pages

    Layer 5: The session layer...This layer sets up, coordinates, and terminates conversations, exchanges, and dialogs between the applications at each end. It deals with session and connection coordination.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    2) Even though the OSI model is not directly implemented in networking, it still endures because it is basically a good “rule of thumb” and it sets a sort of idea on how things are supposed to run to keep things in standard.…

    • 648 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    3.1: Networking models Review: The two networking models are TCP/IP which had 5 different layers and the OSI model which has 7 layers. They mainly incorporate the same layers and the only difference is that the TCP/IP layer combines layers 5, 6 and 7 all into layer 5. Both models are along the same line of information and both explain how a network moves data.…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    Answer: C. The physical layer sits just below the data link layer. D. The physical layer sits just below the data link layer.…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    The 5-layer model serves essentially the protocols regarded as Transmission Control Protocol (TCP) as well as Internet Protocol (IP), or mutually, TCP/IP. The User Datagram Protocol (UDP) is likewise served by this particular model. The 5-layer model was produced alongside with these protocols, anteceding the 7-layer model, and is from time to time known as the TCP Model.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 2 Lab 2.1

    • 374 Words
    • 2 Pages

    Almost all networks in use today are based in some fashion on the Open Systems Interconnection (OSI) standard. The core of this standard is the OSI Reference Model, a set of seven layers that define the different stages that data must go through to travel from one device to another over a network. But the OSI is just a guideline.…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Javvin.com, (n.d.). OSI 7 Layers Reference Model For Network Communication. Retrieved on Wednesday, October 20, 2010, from http://www.javvin.com/osimodel.html…

    • 1324 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Interconnection (OSI) Model - is a conceptual and logical layout that defines network communication used by systems open to interconnection and communication with other systems.…

    • 559 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Mis 589 Unit 7

    • 943 Words
    • 4 Pages

    Each computer in the network has software that operates at each of the layers and performs the functions required by those layers. Each layer in the network uses a formal…

    • 943 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It230 Wk1 Checkpoint

    • 576 Words
    • 3 Pages

    The first layer, physical, obtains a function that has the purpose of sending or receiving data by way of signals or voltages through physical aspects such as, cables or cards. With such data, signals, voltages, physical aspects of cables and cards, it is what is utilized in network connecting. The second layer, data-link, consists of encoded, decoded bits of data packets, which consists also of a management, knowledge transmission-protocol that works in connection with two additional internal layers, “media access control (MAC) layer and the logical link control (LLC) layer”, (2006. PP.S3). Both additional layers serve a function and purpose that determines how data is accessed from a network computer, gives it the data transmit permission, and controls in relation to checking for error(s), controls flow, and synchronization of the frame.…

    • 576 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IT245 PH3 DB1

    • 310 Words
    • 1 Page

    Layer 4 - The Application layer is the top layer, it closely correlate with the functions of the top three layers of the OSI Model (Session layer, Presentation layer, Application layer). It is responsible for handling high-level protocols, supports network applications and provides for users and other programs an interface and how they interact with the lower layers.…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Dq 1 and 2 Week 4

    • 1894 Words
    • 8 Pages

    I see that as a good analogy and I understand that the OSI model is broken down into seven layers and each layer has a job to do I was wondering which of these layers would be most important in developing security protocols for my company?…

    • 1894 Words
    • 8 Pages
    Good Essays