blog




  • Essay / Open Systems Interconnect

    Table of ContentsIntroductionISO Model ImageProtocolsTCP vs UDPTCP/IP vs ISO ModelIntroductionThe seven-layer OSI stands for Open Systems Interconnect reference model is a repair of how data travels through a network, c is an international communications standard, the ISO reference model is divided into seven different layers, namely application, presentation, session, transport, network, data link and physical link. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get an original essay Another reason for the ISO benchmark is to show how a device on a network communicates with another device, the data is broken into packets since the data is too large to be transmitted over a network. Networks are a collection of devices connected to a server or hub. The signal must be converted to digital format so that the computer can understand the transmitted information, the data is transformed into binary bits. The bottom three layers of the model take care of moving packets through the network to the end. device, while the upper four layers are used to convert the data into packets and to complete the network communion process. The model creates an overview of the interconnection of each layer and the relationships between layers below and above the current layer. Each layer is responsible for performing different functions and data transmission protocols on the network, these protocols are switching rules and procedures. on the network. Each layer has different protocols that are necessary for each layer to communicate with each other. The standards are also used in the seven-level model. These are rules and procedures that have been created by an organization or governing body as a standard way of doing something. They are used in a way that there aren't many different ways to do something. .Application layer image of the ISO model. The application layer is made up of the seven layers of the ISO model, this layer is used by network applications, it uses end user services and processes, it allows the network to verify user authentication and privacy, layer also allows file management. transfers, email and other network software services.[1] These processes are offered by a protocol that operates at the application layer, called Hypertext Transfer Protocol (HTTP), telnet, Dynamic Host Configuration Protocol (DHCP), and File Transfer Protocol (FTP). This layer processes email messages and files. It uses gateways to send information to the network layer.Presentation layer. Presentation layer data is formatted into a representation that the network can understand, it also deals with encryption and decryption of data. the presentation layer works to transform the data into the form that the application layer can accept. The data is translated from the application to network format. This layer transforms the data so that the layers below and above can understand what is being transferred and accept it. The protocols used are AES encryption, American Standard Code (ASCII), Multi-Purpose Internet Mail Extensions (MIME). The devices used on this layer are firewalls and gateways. Session layer. The session layer allows two applications on different computers to open, use, and close a connection. Its main role is to perform name recognition andother functions, such as security, necessary to allow two applications to communicate over the network. coordinates and completes conversations. the protocol used in this layer is Remote Procedure Call (RPC), Structured Query Language (SQL) and ISO 8327. This layer used device such as gateways.Transport layer. Transport layer this is where data is transported through the network it uses to protocols Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) is a communication protocol used in place of TCP, it is mainly used to establish low-latency connections between applications on the Internet. This layer checks the data for errors once it arrives, meaning the message is transmitted error-free, in order, and without losses or duplications. Gateways and multiplexers are devices used on this network layer layer. The network layer is the Internet layer, it is the layer that contains the packet information that will be transmitted. This layer decides which physical path the data should take based on network conditions, using routers and gateways. The protocols used in this layer are Internet Protocol (IP), Network Address Translation (NAT), Address Resolution Protocol (ARP), Internet Control Message Protocol (ICMP), Internet Protocol Security is a suite of network protocols that authenticates (IPSEC), Open Shortest Path First (OSPF). Data Layer. The data layer sends data frames from the network layer to the physical layer. It is responsible for controlling the signals that enter and exit the network cable. On reception, the data link layer packages the raw bits from the physical layer into data frames. The layer also controls the data flowing through this layer when no frame buffer is available. The protocols used in this layer are 802.11N, Spanning Tree Protocol (STP), Ethernet, Layer 2 Tunneling Protocol (L2TP), Carrier-sense multiple access with collision Detection (CSMA/CD). The protocol tells the network how to handle a device trying to connect to the same data channel and how the device should wait to reconnect to the channel, to reduce the risk of collision in the network, digital subscriber line (DSL) and Internet Protocol Security are a suite of network protocols that authenticate (IPEC).The physical layer. The physical layer is the bottom layer of the OSI bag that transmits raw unstructured data (signal state represents 1 or 0) onto the physical media. The physical layer is hardware-based and deals with all aspects of establishing and maintaining a physical link between communicating computers. This layer uses different types of cables, for example wires, fibers and wireless connection, the transmission speed is damped depending on the type of wires used and the speed of the area. The main protocols used on the physical layer are Fast Ethernet, Carrier-sense multiple access with collision detection (CSMA/CD) and Asynchronous transfer mode (ATM). The protocols This image shows how each layer of the ISO model is used and the different protocols and the standards used on the diapers. Some of the protocols used in the ISO model are used more than once. The protocols operate at different layers of the OSI model. Each layer has its own protocols. TCP and IP are collectively called the protocol stack or network/transport protocols. This is due to protocols operating at the network and transport layers to allow computers to communicate. A protocol stack, r stack, is a group of protocols arranged in layers to enable the.