FROM: Student
SUBJECT: Security and the OSI Model
The Open Systems Interconnect (OSI) Model is the basis on which network communications function. Every network application more or less adheres to the standards of the OSI Model. Each layer of the OSI model represents a level of network functionality. For each layer, there are different types of security to protect the network at that layer. The physical layer is the actual medium in which the data travels. This is usually a wire, hub, or over the air. The physical layer can be secured by protecting access to network cables and ports. Data transmitted over fiber optics is much harder to intercept than data being transmitted over copper wire. The data link layer establishes the connection for the physical layer and turns the data from higher layers into the bits that will be transmitted across the medium. Security for the data link layer can be accomplished with port security, MAC address filtering, and wireless encryption. The network layer is the layer that most people think of when it comes to network security. Network firewalls operate by blocking IP addresses which are network layer characteristics. Routers are configured to provide network layer security as well. Any security feature that allows or denies access based on IP address is a level 3 security device. For the top 4 layers of the OSI model security and protocols don't always fall under a single layer. The transport layer plays a major part with SSL and of course TLS (Transport Layer Security). These protocols use encryption and keys to ensure private connections. Communication sessions between hosts are established and terminated at the session layer. There is no security feature directly associated with the session layer exclusively. The protocols for FTP, SMTP, and HTTP take place at the session layer. TCP port numbers are assigned at the session layer and some routers and firewalls may block traffic based on port number. Encryption and decryption take place at the presentation layer. This layer deals with ASCII character representation and the interpretation of characters into readable or usable information. Transmitted data is encrypted by the sender and then decrypted by the receiver at this layer. The final layer is the application layer. Here is where the end application sends the data or receives it from another application. The most common security feature of the application layer is password authentication.
Signed Student, NTC410
You May Also Find These Documents Helpful
-
Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…
- 254 Words
- 1 Page
Satisfactory Essays -
The value of layers in the OSI reference model is that it divides networking into a series of tasks, and then illustrates how those tasks relate to each other.…
- 3225 Words
- 13 Pages
Powerful Essays -
Layer 5: The session layer...This layer sets up, coordinates, and terminates conversations, exchanges, and dialogs between the applications at each end. It deals with session and connection coordination.…
- 987 Words
- 4 Pages
Good Essays -
2) Even though the OSI model is not directly implemented in networking, it still endures because it is basically a good “rule of thumb” and it sets a sort of idea on how things are supposed to run to keep things in standard.…
- 648 Words
- 3 Pages
Satisfactory Essays -
3.1: Networking models Review: The two networking models are TCP/IP which had 5 different layers and the OSI model which has 7 layers. They mainly incorporate the same layers and the only difference is that the TCP/IP layer combines layers 5, 6 and 7 all into layer 5. Both models are along the same line of information and both explain how a network moves data.…
- 324 Words
- 2 Pages
Satisfactory Essays -
With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…
- 3788 Words
- 16 Pages
Better Essays -
Answer: C. The physical layer sits just below the data link layer. D. The physical layer sits just below the data link layer.…
- 1325 Words
- 5 Pages
Good Essays -
The 5-layer model serves essentially the protocols regarded as Transmission Control Protocol (TCP) as well as Internet Protocol (IP), or mutually, TCP/IP. The User Datagram Protocol (UDP) is likewise served by this particular model. The 5-layer model was produced alongside with these protocols, anteceding the 7-layer model, and is from time to time known as the TCP Model.…
- 1263 Words
- 5 Pages
Powerful Essays -
Almost all networks in use today are based in some fashion on the Open Systems Interconnection (OSI) standard. The core of this standard is the OSI Reference Model, a set of seven layers that define the different stages that data must go through to travel from one device to another over a network. But the OSI is just a guideline.…
- 374 Words
- 2 Pages
Satisfactory Essays -
Javvin.com, (n.d.). OSI 7 Layers Reference Model For Network Communication. Retrieved on Wednesday, October 20, 2010, from http://www.javvin.com/osimodel.html…
- 1324 Words
- 6 Pages
Powerful Essays -
Interconnection (OSI) Model - is a conceptual and logical layout that defines network communication used by systems open to interconnection and communication with other systems.…
- 559 Words
- 3 Pages
Powerful Essays -
Each computer in the network has software that operates at each of the layers and performs the functions required by those layers. Each layer in the network uses a formal…
- 943 Words
- 4 Pages
Good Essays -
The first layer, physical, obtains a function that has the purpose of sending or receiving data by way of signals or voltages through physical aspects such as, cables or cards. With such data, signals, voltages, physical aspects of cables and cards, it is what is utilized in network connecting. The second layer, data-link, consists of encoded, decoded bits of data packets, which consists also of a management, knowledge transmission-protocol that works in connection with two additional internal layers, “media access control (MAC) layer and the logical link control (LLC) layer”, (2006. PP.S3). Both additional layers serve a function and purpose that determines how data is accessed from a network computer, gives it the data transmit permission, and controls in relation to checking for error(s), controls flow, and synchronization of the frame.…
- 576 Words
- 3 Pages
Good Essays -
Layer 4 - The Application layer is the top layer, it closely correlate with the functions of the top three layers of the OSI Model (Session layer, Presentation layer, Application layer). It is responsible for handling high-level protocols, supports network applications and provides for users and other programs an interface and how they interact with the lower layers.…
- 310 Words
- 1 Page
Satisfactory Essays -
I see that as a good analogy and I understand that the OSI model is broken down into seven layers and each layer has a job to do I was wondering which of these layers would be most important in developing security protocols for my company?…
- 1894 Words
- 8 Pages
Good Essays