SlideShare ist ein Scribd-Unternehmen logo
1 von 16
The OSI
networking
reference model.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
PACE IT.
– A brief history.
– Networking reference models.
– OSI and TCP/IP comparison.
Page 4
The OSI networking reference model.
Page 5
The OSI (Open Systems
Interconnection) reference
model is a conceptual model
with two major components.
The first main component of the OSI networking
reference model is an abstract model of
networking—a seven layer model. The second is a
set of specific protocols, which allow differing
computing systems to communicate with one
another despite their different architectures.
The OSI networking reference model.
Page 6
The OSI networking reference model.
– Why a networking model was required.
» Early networks communicated using proprietary languages.
» Early networks could only communicate with like systems (e.g.,
IBM to IBM and DEC to DEC).
» The U.S. government desired a robust computer
communications system that could survive disasters.
– TCP/IP reference model.
» The Transmission Control Protocol/Internet Protocol (TCP/IP)
was published as the U.S. DoD standard in 1982.
» Adopted by the big players beginning in 1984.
• AT&T moved the UNIX implementation to open source in
1989.
– OSI reference model.
» Published in 1983.
» Defines the relationships between differing protocols.
» Defines the relationships between differing protocols and
hardware.
Page 7
The OSI networking reference model.
Page 8
The OSI networking reference model.
– The OSI reference model.
» Layer 1, the physical layer: standardizes the electrical signal
that networks use; also defines cable standards and how bits
are placed on the physical media.
• Network cables and hubs are part of Layer 1.
» Layer 2, the data link layer: responsible for identifying the
individual nodes (both sending and receiving); it also introduces
an error correction method known as frame check sequence
(FCS). It is composed of two sub-layers:
• The logical link control (LLC) layer is mainly responsible for
flow control and error correction.
• The media access control (MAC) layer is mainly responsible
for node addressing.
• Switches and bridges are Layer 2 devices.
» Layer 3, the network layer: responsible for routing functions
between networks. It identifies nodes and networks.
• Routers are Layer 3 devices.
Page 9
The OSI networking reference model.
– OSI reference model continued.
» Layer 4, the transport layer: responsible for breaking the data
into smaller pieces for the lower layers and for the actual data
transport protocols—TCP and UDP (Transmission Control
Protocol and User Datagram Protocol); the transport layer may
be required to confirm the actual delivery of the data stream
and error correction.
» Layer 5, the session layer: responsible for establishing the
initial parameters between two systems. Sets up and tears
down the communication channels.
» Layer 6, the presentation layer: responsible for taking data
and converting it from a machine dependent language to a
machine independent language. This is also the layer that
has the main responsibility for encryption between networks.
» Layer 7, the application layer: responsible for the protocols
that request services or functions from other systems. They
may not be the actual application; for instance, IE is an
application that uses HTTP (Hypertext Transfer Protocol) at
Layer 7 to request Web pages.
Page 10
The OSI networking reference model.
– TCP/IP reference model.
» Network interface layer (a.k.a. Link layer): handles electrical
signaling, flow control, error detection, and node addressing.
» Internet layer: handles routing functions and identifies network
systems and nodes.
» Transport layer: handles breaking the data into more
manageable chunks for lower layers; it is the layer responsible
for the delivery method, either reliable or unreliable, and error
correction for reliable delivery.
» Application layer: handles requests for services from
applications, translation to machine independent languages
and encryption. It also sets up and tears down sessions.
Page 11
The OSI networking reference model.
Page 12
While TCP/IP is the dominant
model, most technicians
communicate issues using the
OSI model because it is more
specific.
When problems occur—and they will—it is easier to
resolve them with a more highly defined set of
specifications (e.g., Layer 5 of the OSI model vs. the
Application layer of the TCP/IP model).
The OSI networking reference model.
Page 13
Both the OSI and TCP/IP
models are references only.
It is not mandatory that
they be followed.
Each developer and manufacturer determines its
own method of implementing the reference model.
While, in theory, there will never be a problem in
communication between devices and systems, it is
only a theory.
The OSI networking reference model.
Page 14
The OSI and TCP/IP networking models were created to allow disparate
systems and networks to communicate easily between each other.
Topic
A brief history.
Summary
The OSI reference model has seven layers: physical, data link, network,
transport, session, presentation, and application. The TCP/IP reference
model has four layers: Network interface, Internet, Transport, and
Application.
Networking reference models.
TCP/IP is the dominant model in use; however, the OSI model is more
commonly used when discussing problems. Both models are references
only; developers and manufacturers determine their own methods of
implementing network models.
OSI and TCP/IP comparison.
The OSI networking reference model.
Page 15
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

Weitere ähnliche Inhalte

Was ist angesagt?

CN_lec 1_Introduction
CN_lec 1_IntroductionCN_lec 1_Introduction
CN_lec 1_IntroductionRijutha Kumar
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2Sohail Gohir
 
Itmg360 chapter one_v05
Itmg360 chapter one_v05Itmg360 chapter one_v05
Itmg360 chapter one_v05Anuja Lad
 
Network standards & protocols
Network standards & protocolsNetwork standards & protocols
Network standards & protocolsJaleel James
 
Networking (osi model)
Networking (osi model)Networking (osi model)
Networking (osi model)Pooja Bhojwani
 
Networking Standards and Protocols Project
Networking Standards and Protocols ProjectNetworking Standards and Protocols Project
Networking Standards and Protocols ProjectYonathan G. Negash
 
Different types of network topologies
Different types of network topologiesDifferent types of network topologies
Different types of network topologieskona paul
 
What is network architecture (full)
What is network architecture (full)What is network architecture (full)
What is network architecture (full)Sorcia D'Arceuil
 
IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2Rexon Calub
 
Week 4 introducing network standards
Week 4 introducing network standardsWeek 4 introducing network standards
Week 4 introducing network standardsRobert Almazan
 
Networking Models
Networking ModelsNetworking Models
Networking ModelsAftab Mirza
 
Cn 04,32,36-Cn all chapters1- computer networks- gtu
Cn 04,32,36-Cn all chapters1- computer networks- gtuCn 04,32,36-Cn all chapters1- computer networks- gtu
Cn 04,32,36-Cn all chapters1- computer networks- gtuJay Patel
 

Was ist angesagt? (20)

CN_lec 1_Introduction
CN_lec 1_IntroductionCN_lec 1_Introduction
CN_lec 1_Introduction
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2
 
Itmg360 chapter one_v05
Itmg360 chapter one_v05Itmg360 chapter one_v05
Itmg360 chapter one_v05
 
Network standards & protocols
Network standards & protocolsNetwork standards & protocols
Network standards & protocols
 
Networking (osi model)
Networking (osi model)Networking (osi model)
Networking (osi model)
 
Networking Standards and Protocols Project
Networking Standards and Protocols ProjectNetworking Standards and Protocols Project
Networking Standards and Protocols Project
 
Different types of network topologies
Different types of network topologiesDifferent types of network topologies
Different types of network topologies
 
Csc341 – Lecture 1 network management
Csc341 – Lecture 1 network managementCsc341 – Lecture 1 network management
Csc341 – Lecture 1 network management
 
What is network architecture (full)
What is network architecture (full)What is network architecture (full)
What is network architecture (full)
 
IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2
 
Cable Connectors
Cable ConnectorsCable Connectors
Cable Connectors
 
Week 4 introducing network standards
Week 4 introducing network standardsWeek 4 introducing network standards
Week 4 introducing network standards
 
Networking Models
Networking ModelsNetworking Models
Networking Models
 
Chapter1
Chapter1Chapter1
Chapter1
 
Computer networking 1
Computer networking 1Computer networking 1
Computer networking 1
 
Cn 04,32,36-Cn all chapters1- computer networks- gtu
Cn 04,32,36-Cn all chapters1- computer networks- gtuCn 04,32,36-Cn all chapters1- computer networks- gtu
Cn 04,32,36-Cn all chapters1- computer networks- gtu
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Chapter2
Chapter2Chapter2
Chapter2
 
Hy3313681373
Hy3313681373Hy3313681373
Hy3313681373
 
Chapter7
Chapter7Chapter7
Chapter7
 

Andere mochten auch

OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of NetworkingMukesh Tekwani
 
Networking fundamentals osi
Networking fundamentals   osiNetworking fundamentals   osi
Networking fundamentals osiRoland Sellis
 
Osi reference model in Networking
Osi reference model in NetworkingOsi reference model in Networking
Osi reference model in NetworkingSatya P. Joshi
 
The OSI Model of Networking
The OSI Model of NetworkingThe OSI Model of Networking
The OSI Model of NetworkingKashif Sohail
 
OSI Model - Every Detail Explained
OSI Model - Every Detail ExplainedOSI Model - Every Detail Explained
OSI Model - Every Detail ExplainedAshish Malik
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksSlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShareSlideShare
 

Andere mochten auch (13)

Osi model in networking
Osi model in networkingOsi model in networking
Osi model in networking
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
Networking fundamentals osi
Networking fundamentals   osiNetworking fundamentals   osi
Networking fundamentals osi
 
Osi
OsiOsi
Osi
 
Osi reference model in Networking
Osi reference model in NetworkingOsi reference model in Networking
Osi reference model in Networking
 
The OSI Model of Networking
The OSI Model of NetworkingThe OSI Model of Networking
The OSI Model of Networking
 
OSI Model - Every Detail Explained
OSI Model - Every Detail ExplainedOSI Model - Every Detail Explained
OSI Model - Every Detail Explained
 
OSI MODEL - A PROJECT
OSI MODEL - A PROJECTOSI MODEL - A PROJECT
OSI MODEL - A PROJECT
 
Osi model
Osi modelOsi model
Osi model
 
7 layer OSI
7 layer OSI7 layer OSI
7 layer OSI
 
OSI Model
OSI ModelOSI Model
OSI Model
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Ähnlich wie PACE-IT: The OSI Networking Reference Model

7 Layers Of The OSI Model
7 Layers Of The OSI Model7 Layers Of The OSI Model
7 Layers Of The OSI ModelAngela Weber
 
Osi model in networking
Osi model in networkingOsi model in networking
Osi model in networkingsheikhparvez4
 
Osi model and tcpip model.
Osi model and tcpip model.Osi model and tcpip model.
Osi model and tcpip model.kona paul
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And DisadvantagesRenee Jones
 
Computer Network - Introduction to Networks
Computer Network - Introduction to NetworksComputer Network - Introduction to Networks
Computer Network - Introduction to NetworksSwapnil Agrawal
 
osi-tcp.pptx..................................
osi-tcp.pptx..................................osi-tcp.pptx..................................
osi-tcp.pptx..................................DeepakM509554
 
Nt1310 Unit 3 Data Analysis Essay
Nt1310 Unit 3 Data Analysis EssayNt1310 Unit 3 Data Analysis Essay
Nt1310 Unit 3 Data Analysis EssayAntoinette Williams
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1paolo374233
 
7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.Kanishk Raj
 
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docxRunning Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docxtodd521
 

Ähnlich wie PACE-IT: The OSI Networking Reference Model (20)

7 Layers Of The OSI Model
7 Layers Of The OSI Model7 Layers Of The OSI Model
7 Layers Of The OSI Model
 
Osi model in networking
Osi model in networkingOsi model in networking
Osi model in networking
 
Osi model and tcpip model.
Osi model and tcpip model.Osi model and tcpip model.
Osi model and tcpip model.
 
OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And Disadvantages
 
Computer Network - Introduction to Networks
Computer Network - Introduction to NetworksComputer Network - Introduction to Networks
Computer Network - Introduction to Networks
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
osi-tcp.pptx..................................
osi-tcp.pptx..................................osi-tcp.pptx..................................
osi-tcp.pptx..................................
 
Osi rp3
Osi rp3Osi rp3
Osi rp3
 
Learn basics of ip addressing
Learn basics of  ip addressingLearn basics of  ip addressing
Learn basics of ip addressing
 
Nt1310 Unit 3 Data Analysis Essay
Nt1310 Unit 3 Data Analysis EssayNt1310 Unit 3 Data Analysis Essay
Nt1310 Unit 3 Data Analysis Essay
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1
 
7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.
 
COMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IPCOMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IP
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docxRunning Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
 
what is OSI model
what is OSI modelwhat is OSI model
what is OSI model
 
Osi model
Osi modelOsi model
Osi model
 
Osi model
Osi modelOsi model
Osi model
 
Class work4
Class work4Class work4
Class work4
 

Mehr von Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 

Mehr von Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Kürzlich hochgeladen

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 

Kürzlich hochgeladen (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 

PACE-IT: The OSI Networking Reference Model

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 PACE IT. – A brief history. – Networking reference models. – OSI and TCP/IP comparison.
  • 4. Page 4 The OSI networking reference model.
  • 5. Page 5 The OSI (Open Systems Interconnection) reference model is a conceptual model with two major components. The first main component of the OSI networking reference model is an abstract model of networking—a seven layer model. The second is a set of specific protocols, which allow differing computing systems to communicate with one another despite their different architectures. The OSI networking reference model.
  • 6. Page 6 The OSI networking reference model. – Why a networking model was required. » Early networks communicated using proprietary languages. » Early networks could only communicate with like systems (e.g., IBM to IBM and DEC to DEC). » The U.S. government desired a robust computer communications system that could survive disasters. – TCP/IP reference model. » The Transmission Control Protocol/Internet Protocol (TCP/IP) was published as the U.S. DoD standard in 1982. » Adopted by the big players beginning in 1984. • AT&T moved the UNIX implementation to open source in 1989. – OSI reference model. » Published in 1983. » Defines the relationships between differing protocols. » Defines the relationships between differing protocols and hardware.
  • 7. Page 7 The OSI networking reference model.
  • 8. Page 8 The OSI networking reference model. – The OSI reference model. » Layer 1, the physical layer: standardizes the electrical signal that networks use; also defines cable standards and how bits are placed on the physical media. • Network cables and hubs are part of Layer 1. » Layer 2, the data link layer: responsible for identifying the individual nodes (both sending and receiving); it also introduces an error correction method known as frame check sequence (FCS). It is composed of two sub-layers: • The logical link control (LLC) layer is mainly responsible for flow control and error correction. • The media access control (MAC) layer is mainly responsible for node addressing. • Switches and bridges are Layer 2 devices. » Layer 3, the network layer: responsible for routing functions between networks. It identifies nodes and networks. • Routers are Layer 3 devices.
  • 9. Page 9 The OSI networking reference model. – OSI reference model continued. » Layer 4, the transport layer: responsible for breaking the data into smaller pieces for the lower layers and for the actual data transport protocols—TCP and UDP (Transmission Control Protocol and User Datagram Protocol); the transport layer may be required to confirm the actual delivery of the data stream and error correction. » Layer 5, the session layer: responsible for establishing the initial parameters between two systems. Sets up and tears down the communication channels. » Layer 6, the presentation layer: responsible for taking data and converting it from a machine dependent language to a machine independent language. This is also the layer that has the main responsibility for encryption between networks. » Layer 7, the application layer: responsible for the protocols that request services or functions from other systems. They may not be the actual application; for instance, IE is an application that uses HTTP (Hypertext Transfer Protocol) at Layer 7 to request Web pages.
  • 10. Page 10 The OSI networking reference model. – TCP/IP reference model. » Network interface layer (a.k.a. Link layer): handles electrical signaling, flow control, error detection, and node addressing. » Internet layer: handles routing functions and identifies network systems and nodes. » Transport layer: handles breaking the data into more manageable chunks for lower layers; it is the layer responsible for the delivery method, either reliable or unreliable, and error correction for reliable delivery. » Application layer: handles requests for services from applications, translation to machine independent languages and encryption. It also sets up and tears down sessions.
  • 11. Page 11 The OSI networking reference model.
  • 12. Page 12 While TCP/IP is the dominant model, most technicians communicate issues using the OSI model because it is more specific. When problems occur—and they will—it is easier to resolve them with a more highly defined set of specifications (e.g., Layer 5 of the OSI model vs. the Application layer of the TCP/IP model). The OSI networking reference model.
  • 13. Page 13 Both the OSI and TCP/IP models are references only. It is not mandatory that they be followed. Each developer and manufacturer determines its own method of implementing the reference model. While, in theory, there will never be a problem in communication between devices and systems, it is only a theory. The OSI networking reference model.
  • 14. Page 14 The OSI and TCP/IP networking models were created to allow disparate systems and networks to communicate easily between each other. Topic A brief history. Summary The OSI reference model has seven layers: physical, data link, network, transport, session, presentation, and application. The TCP/IP reference model has four layers: Network interface, Internet, Transport, and Application. Networking reference models. TCP/IP is the dominant model in use; however, the OSI model is more commonly used when discussing problems. Both models are references only; developers and manufacturers determine their own methods of implementing network models. OSI and TCP/IP comparison. The OSI networking reference model.
  • 16. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.