Question

In: Computer Science

There are a lot of networking and network security jobs and every IT company has network...

There are a lot of networking and network security jobs and every IT company has network engineers, admins, etc. Why and how do think understanding the OSI Model and Network Devices are important from a work standpoint? Looking for some original content.

Solutions

Expert Solution

OSI

OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network.

A reference model is a conceptual framework for understanding relationships. The purpose of the OSI reference model is to guide vendors and developers so the digital communication products and software programs they create can interoperate, and to facilitate a clear framework that describes the functions of a networking or telecommunication system.

Most vendors involved in telecommunications make an attempt to describe their products and services in relation to the OSI model. And although it is useful for guiding discussion and evaluation, OSI is rarely actually implemented as-is. That's because few network products or standard tools keep related functions together in well-defined layers, as is the case in the OSI model. The TCP/IP protocol suite, which defines the internet, does not map cleanly to the OSI model

How the OSI model works

IT professionals use OSI to model or trace how data is sent or received over a network. This model breaks down data transmission over a series of seven layers, each of which is responsible for performing specific tasks concerning sending and receiving data.

The main concept of OSI is that the process of communication between two endpoints in a network can be divided into seven distinct groups of related functions, or layers. Each communicating user or program is on a device that can provide those seven layers of function.

In this architecture, each layer serves the layer above it and, in turn, is served by the layer below it. So, in a given message between users, there will be a flow of data down through the layers in the source computer, across the network, and then up through the layers in the receiving computer. Only the application layer, at the top of the stack, doesn’t provide services to a higher-level layer.

The seven layers of function are provided by a combination of applications, operating systems, network card device drivers and networking hardware that enable a system to transmit a signal over a network Ethernet or fiber optic cable or through Wi-Fi or other wireless protocols.

When most non-technical people hear the term “seven layers”, they either think of the popular Super Bowl bean dip or they mistakenly think about the seven layers of Hell, courtesy of Dante’s Inferno (there are nine). For IT professionals, the seven layers refer to the Open Systems Interconnection (OSI) model, a conceptual framework that describes the functions of a networking or telecommunication system.

The model uses layers to help give a visual description of what is going on with a particular networking system. This can help network managers narrow down problems (Is it a physical issue or something with the application?), as well as computer programmers (when developing an application, which other layers does it need to work with?). Tech vendors selling new products will often refer to the OSI model to help customers understand which layer their products work with or whether it works “across the stack”.


Related Solutions

Case: Northridge Security Consultants, a security consulting company that specializes in network security for businesses, has...
Case: Northridge Security Consultants, a security consulting company that specializes in network security for businesses, has been using you as an outside contractor to provide research and customer service for their clients. A landscaping business, Sunset Landscapers, has contracted with NSC to help them implement cryptography to protect all documents and transmissions throughout their network. They have over twenty locations nationwide. NSC has found that even though the company would like this technology, the IT Director is resistant to any...
Security should be a top concern for every network environment. This is especially true in a...
Security should be a top concern for every network environment. This is especially true in a converged network. Many mission-critical services depend on this infrastructure. A security breach could cause devastating effects on the environment. All measures must be taken to reduce the risk of a security breach. In 3–4 paragraphs, complete the following: Discuss 1 way to reduce risk in the network. Who do you think is responsible for keeping the network safe—the administrator, the users, or both? Why?
Security should be a top concern for every network environment. This is especially true in a...
Security should be a top concern for every network environment. This is especially true in a converged network. Many mission-critical services depend on this infrastructure. A security breach could cause devastating effects on the environment. All measures must be taken to reduce the risk of a security breach. In 3–4 paragraphs, complete the following: Discuss 1 way to reduce risk in the network. Who do you think is responsible for keeping the network safe—the administrator, the users, or both? Why?
Advance networking Smart Grid and the importance of the networking component--Explain the proposed network architecture of...
Advance networking Smart Grid and the importance of the networking component--Explain the proposed network architecture of the Smart Grid and the stated benefits to the U.S.
Steve’s Job Inc. works a lot of jobs and makes a lot of money. At the...
Steve’s Job Inc. works a lot of jobs and makes a lot of money. At the end of the previous month Steve had one job, job 10020, in process. For Job 10020 Steve had incurred $20,000 in labor, $50,000 in material and applied $10,000 in overhead. Steve tacks on a 50% profit margin to determine the amount charged to his customers. During the month Steve incurred another $40,000 in labor and another $30,000 in material plus the overhead. This job...
Define the scope of network security.
Define the scope of network security.
A security analyst is interested in setting up an IDS to monitor the company network. The...
A security analyst is interested in setting up an IDS to monitor the company network. The analyst has been told there can be no network downtime to implement the solution, but the IDS must capture all of the network traffic. Which of the following should be used for the IDS implementation? A. Network tap B. Honeypot C. Aggregation D. Port mirror
What are the differences and similarities between security, network security, and computer security in IT fields?
What are the differences and similarities between security, network security, and computer security in IT fields? Do the fields cover clearly delineated areas, or is there considerable overlap? Would you say that one of these areas is more technical than the other two?
Discuss network security in a business ethics.
Discuss network security in a business ethics.
Networking ~ A 2016 study conducted by LinkedIn found that 85% of all jobs are filled...
Networking ~ A 2016 study conducted by LinkedIn found that 85% of all jobs are filled via networking - the process of interacting with others to develop professional contacts. Marie is skeptical of this study, and believes that the actual percentage of jobs filled by networking is actually less than 85%. Marie randomly samples recently filled jobs and finds that 80% of them were filled by networking. She conducts a hypothesis test. The p-value for the test is calculated to...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT