Osi Mode Layers

  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Osi Mode Layers as PDF for free.

More details

  • Words: 1,005
  • Pages: 4
Squatty.com - OSI Cheat Sheet

(Advanced Search)

Search May 24, 2005 Welcome to Squatty.com Submit a Story

Site Menu

Links

Geek Links Geek Support » Geek Downloads » Config Tool Geek Docs » Plugin Manual Geek Demo Geek Directory

Login Username: Password:

It appears you arrived here from a Google search. You can also search Squatty. com's archives with your query.

Site Stats

About

FAQ

What's Related ●

April 08, 2003

Contributed by:squatty

Views: 1805



More by squatty More from How-to

Story Options ● ●

The Open Systems Interconnect (OSI) model is something every good geek should know. I came across this nifty OSI reference during my recent review of the CISSP Telecommunications and Network Security domain. I added a few notes and put together a quick visio to form the below cheat sheet....

Open Systems Interconnect Model OSI segments networking tasks, processes, and services into different layers. Each layer has its own responsibilities when it comes to how two computers communicate over a network. Each layer has certain functionalities and the services and protocols that work within that layer to fulfill them. Each protocol at a specific OSI layer communicates with a protocol that operates at the same OSI layer on another computer. This happens through encapsulation. A message is constructed at the application layer and then passed down through the protocol’s stack. Each layer adds its own information to the message; thus, the message grows in size as it goes down the protocol stack. The message is then sent to the destination computer and the encapsulation is reversed by taking the message apart through the same steps as the source computer that encapsulated it. This is how computers communicate logically. Each layer adds its own information to the packet and then each layer at the destination computer only takes information that pertains to it.

Login Don't have an account yet? Sign up as a New User

Google Helper

Forum

OSI Cheat Sheet

Home Privacy Policy Site Index » Topics Ask Squatty Development » How-to Geeklog News » Product Reviews Just Fun Site Updates

Downloads

Security: Confidentiality, authentication, data integrity, non-repudiation Layer 7

Application

Technology: gateways Protocols: FTP, SMB, TELNET, TFTP, SMTP, HTTP, NNTP, CDP, GOPHER, SNMP, NDS, AFP, SAP, NCP, SET

Search Now!

Donations Help me help you! By donating you ensure squatty.com a future!

file:///C|/Documents and Settings/Administrator/Desktop/TOOLSET/CHEAT SHEETS/Squatty_com - OSI Cheat Sheet.htm (1 of 4)10/7/2005 11:59:27 AM

Includes the protocols that support the application. Responsible for all application-to-application communications. User information maintained at this layer is user data.

Mail Story to a Friend Printable Story Format

Squatty.com - OSI Cheat Sheet

Security: confidentiality, authentication, encryption

Chatterblock Total public Chats: 455 Sign in for private Messages No chat records on file

Technology: gateway Protocols: ASCII, EBCDIC, POSTSCRIPT, JPEG, MPEG, GIF

Username Enter Message Layer 6

Send/Refresh

Presentation

Chatterlog

Top Downloads Order By: Blocks Hacks Plugins Themes Title

D/Ls

Weather - Entire World Database for Geeklog

3685

Google Search

2665

Industrial Grey

2248

Geeklog 1.3.7s2 - Gallery 1.3.4 Integration

2160

Site Calendar Block

2154

FileMgmt Plugin Ver 1.2 Final Release

2119

Weather Plugin 2.0

2097

Who's Online w/ IP plot

2009

Theme Changer

1899

Gallery Random Photo Block v1.2

1631

More Downloads

Security: None Technology: gateways Protocols: Remote Procedure Calls (RPC) and SQL, RADIUS, DNS, ASP Layer 5

Receives information from the application layer protocols and puts it into a format that all computers following OSI can understand. Responsible for the formatting of the data so that it is suitable for presentation. Responsible for character conversion (ASCII/EBCDIC), Encryption/Decryption, Compression, and Virtual Terminal Emulation. User information maintained at this layer is called messages. Responsible for the setup of the connection, maintaining of the connection, and the connection tear-down. Simplex – communication takes place in one direction Half-duplex – comm. takes place in both directions, only 1system can send info at a time.

Session

Full-duplex – comm. takes place in both directions, both systems send information at the same ime. Security: Confidentiality, authentication, integrity Layer 4

Transport

Technology: gateways Protocols: TCP, UDP, SSL, SSH2, SPX, NetBios, ATP Security: confidentiality, authentication, data integrity

Layer 3

Network

Technology: virtual circuits (ATM), routers Protocols: IP, IPX, ICMP, OSPF, IGRP, EIGRP, RIP, BOOTP, DHCP, ISIS, ZIP, DDP, X.25

file:///C|/Documents and Settings/Administrator/Desktop/TOOLSET/CHEAT SHEETS/Squatty_com - OSI Cheat Sheet.htm (2 of 4)10/7/2005 11:59:27 AM

Responsible for the guaranteed delivery of information. It is also responsible for error detection, correction, and flow control. Information at this layer is called datagrams. Responsible for the routing of data from one node to another through the network including the path selection. Logical addresses are used at this layer. Information maintained at this layer is called packets.

Squatty.com - OSI Cheat Sheet

Security: confidentiality Technology: bridges, switch

Layer 2

Data Link

Protocols: L2F, PPTP, L2TP, PPP, SLIP, ARP, RARP, SLARP, IARP, SNAP, BAP, CHAP, LCP, LZS, MLP, Frame Relay, Annex A, Annex D, HDLC, BPDU, LAPD, ISL, MAC, Ethernet, Token Ring, FDDI

Security: confidentiality Technology: ISDN, Hubs, Repeaters, Cables Layer 1

Physical

Protocols: 10BaseT, 100BaseT, 1000BaseT, 10Base2, 10Base5, OC-3, OC-12, DS1, DS3, E1, E3, ATM, BRI, PRI, X.23

Responsible for translating data into LAN or WAN binary format for proper line transmission. Formats the data frame…puts the correct info into the header. Responsible for the physical addressing of the network via MAC addresses. There are two sublevels to the Data-Link layer. MAC and LLC. The Data-Link layer has error detection, frame ordering, and flow control. Information maintained at this layer is called frames. Responsible for the physical transmission of the binary digits through the physical medium. This layer includes things such as the physical cables, interfaces, and data rate specifications. Information maintained at this layer is called bits (the 1s and 0s). Bits are converted into voltage for transmission.

file:///C|/Documents and Settings/Administrator/Desktop/TOOLSET/CHEAT SHEETS/Squatty_com - OSI Cheat Sheet.htm (3 of 4)10/7/2005 11:59:27 AM

Squatty.com - OSI Cheat Sheet

Copyright © 2004 Squatty.com

Squatty.com News Feed

file:///C|/Documents and Settings/Administrator/Desktop/TOOLSET/CHEAT SHEETS/Squatty_com - OSI Cheat Sheet.htm (4 of 4)10/7/2005 11:59:27 AM

Powered By GeekLog v1.3.9 Created this page in 0.35 seconds

Related Documents

Osi Mode Layers
June 2020 17
Osi Layers
October 2019 25
Osi Layers
June 2020 21
Osi Network Layers Review
December 2019 22
Osi Model Layers
July 2020 11