Friday, November 30, 2018

Word of the Day: OSI model (Open Systems Interconnection)

Word of the Day WhatIs.com
Daily updates on the latest technology terms | November 30, 2018
OSI model (Open Systems Interconnection)

OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network.

A reference model is a conceptual framework for understanding relationships. The purpose of the OSI reference model is to guide vendors and developers so the digital communication products and software programs they create can interoperate, and to facilitate a clear framework that describes the functions of a networking or telecommunication system.

Most vendors involved in telecommunications make an attempt to describe their products and services in relation to the OSI model. And although it is useful for guiding discussion and evaluation, OSI is rarely actually implemented as-is. That's because few network products or standard tools keep related functions together in well-defined layers, as is the case in the OSI model. The TCP/IP protocol suite, which defines the internet, does not map cleanly to the OSI model.

Developed by representatives of major computer and telecommunication companies beginning in 1983, OSI was originally intended to be a detailed specification of actual interfaces. Instead, the committee decided to establish a common reference model with which others could then develop detailed interfaces, which, in turn, could become standards governing the transmission of data packets. The OSI architecture was officially adopted as an international standard by the International Organization for Standardization (ISO).

OSI model layers

The main concept of OSI is that the process of communication between two endpoints in a network can be divided into seven distinct groups of related functions, or layers. Each communicating user or program is on a device that can provide those seven layers of function.

In this architecture, each layer serves the layer above it and, in turn, is served by the layer below it. So, in a given message between users, there will be a flow of data down through the layers in the source computer, across the network, and then up through the layers in the receiving computer.

The seven layers of function are provided by a combination of applications, operating systems, network card device drivers and networking hardware that enable a system to transmit a signal over a network Ethernet or fiber optic cable or through Wi-Fi or other wireless protocols.

The seven Open Systems Interconnection layers are:

Layer 7: The application layer. This is the layer at which communication partners are identified -- Is there someone to talk to? -- network capacity is assessed -- Will the network let me talk to them right now? -- and where the data or application is presented in a visual form the user can understand. This layer is not the application itself, it is the set of services an application should be able to make use of directly, although some applications may perform application-layer functions.

 

Layer 6: The presentation layer. This layer is usually part of an operating system (OS) and converts incoming and outgoing data from one presentation format to another -- for example, from clear text to encrypted text at one end and back to clear text at the other.

 

Layer 5: The session layer. This layer sets up, coordinates and terminates conversations. Its services include authentication and reconnection after an interruption. On the internet, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) provide these services for most applications.

 

Layer 4: The transport layer. This layer manages packetization of data, then the delivery of the packets, including checking for errors in the data once it arrives. On the internet, TCP and UDP provide these services for most applications as well.

 

Layer 3: The network layer. This layer handles addressing and routing the data -- sending it in the right direction to the right destination on outgoing transmissions and receiving incoming transmissions at the packet level. IP is the network layer for the internet.

 

Layer 2: The data-link layer. This layer sets up links across the physical network, putting packets into network frames. This layer has two sub-layers: the logical link control layer and the media access control layer (MAC). MAC layer types include Ethernet and 802.11 wireless specifications.

 

Layer 1: The physical layer. This layer conveys the bit stream across the network either electrically, mechanically or through radio waves. The physical layer covers a variety of devices and mediums, among them cabling, connectors, receivers, transceivers and repeaters.

Quote of the Day

 
"The Open Systems Interconnection (OSI) model describes how the different software and hardware components involved in a network communication should divide their labor and otherwise interact." - John Burke

Learning Center

 

What is the difference between TCP/IP model and OSI model?
Our expert explains the difference between the OSI model vs. the TCP/IP model, and breaks down how the layers of the models relate to each other in terms of network communications.

How security, compliance standards prevent OSI layer vulnerabilities
To establish the best network cybersecurity, organizations should focus on creating a security and compliance framework for each OSI model. Read this tip to learn more about OSI layer vulnerabilities and the strategies to mitigate them.

Guide to identifying and preventing OSI model security risks: Layers 4 to 7
Organizations establishing network cybersecurity should focus on creating a framework to offset vulnerabilities in each layer of the Open Systems Interconnection. Read part two of this tip to learn more strategies to offset OSI model security risks in layers 4 to 7.

Layer 3 switches explained
Layer 3 switches are explained in this tip, including the difference between a switch, a router and a Layer 3 switch.

A comprehensive review of network performance monitors
Network performance monitors are crucial to today's data centers. In this buyer's guide, expert Andrew Froehlich takes a look at the systems that keep modern networks going.

Quiz Yourself

 
Inefficient use of bandwidth is the _____ of the network administrator's existence.
a. bane
b. bain

Answer

Stay in Touch

 
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

Visit the Word of the Day Archives and catch up on what you've missed!

FOLLOW US

TwitterRSS
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Whatis.com, click here. Please note, this will not affect any other subscriptions you have signed up for.
TechTarget

TechTarget, Whatis, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.

AWS doubles down on AI/ML features

Application Development Digest
A roundup of application development content from TechTarget's network | November 30, 2018
TechTarget
FEATURED STORY
Amazon SageMaker updates take on workflows, data labeling

By Darryl K. Taft, News Writer

AWS has extended its AI portfolio with more options for developers who want to more easily and quickly incorporate machine learning into their applications.

(SearchAWS.com)

Advertisement
NEWS
 
Top enterprise application trends require revamped thinking
Gartner experts revealed the top 10 trends in application architecture that they expect enterprises to adopt within three to five years.
(SearchMicroservices.com)
 
GraphQL group sets new direction for developers

A group of GraphQL users and the Linux Foundation joined forces to manage and monitor the future of Facebook's popular open source data query and manipulation language.

(TheServerSide.com)

 
Oracle vet Kurian will make Google Cloud more enterprise-savvy
The next CEO of Google Cloud, Thomas Kurian, brings experience with product development and 20 years at Oracle to the position. Here's what we can predict he'll do.
(SearchCloudComputing.com)
 
AWS Outposts amplify signals of a hybrid cloud world

AWS will transport its software stack into customer data centers with Outposts, a managed service that incorporates the same hardware the cloud provider uses for EC2.

(SearchAWS.com)

EXPERT ADVICE
 
Ways to partially implement Agile and still get results

A full Agile transformation might not be possible -- or make sense -- for every app dev team. Yet, these Agile practices and elements can be incorporated with minimal disruption.

(SearchSoftwareQuality.com)

 
What the future holds for the VMs vs. containers debate

With advances from Docker, Kubernetes and other container technologies, an ecosystem is emerging that threatens the existence -- or at least importance -- of VMs in enterprises.

(SearchITOperations.com)

 
Open source tools to consider for your RESTful APIs

Before your software team pays for an expensive API platform, consider some open source options to help you handle the design, development and management of RESTful APIs.

(SearchMicroservices.com)

 
Why teams create individualized DevOps platforms

Pre-built DevOps platforms offer a wealth of capabilities without the hassle to integrate everything. But cherry-picking for exact needs yields tighter resource management.

(SearchITOperations.com)

 
Assess native cloud monitoring tools from top IaaS providers

There are many third-party cloud monitoring tools, but the native option of your public cloud platform might be the best fit. Here are the capabilities what Google, AWS and Azure offer.

(TheServerSide.com)

 
Try this Chocolatey tutorial to pick up Vagrant provisioning

To install a Linux-based tool on a non-Linux machine, at least one intermediary tool is necessary. On Windows, use the Chocolatey package manager and follow these steps.

(SearchITOperations.com)

 
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Application Development Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Application Development Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.
TechTarget

How to apply security controls to the printing fleet

TechTarget
Business Technology Research     November 30, 2018
TechTarget
IN THIS ISSUE
How to apply security controls to the printing fleet
SPONSORED BY: HP
Although many IT departments rigorously apply security measures to computers and the network, printing and imaging devices are often overlooked. But printers can provide an entry to your network, and securing them is just as important. This white paper reveals recommendations for print and document security so you can meet compliance regulations.
Using data science to solve real business problems
SPONSORED BY: IBM
Companies everywhere are relying on data science to solve business problems. However, many data scientists and engineers lack the skills to successfully operationalize data science models. Read this research report to learn how your organization can successfully operationalize machine learning and data science projects.
Enhance digital transformation with workspaces designed for automation
SPONSORED BY: Citrix
Download this resource to learn how unified digital workspaces, with built in automation capabilities, can eliminate low-value, resource-intensive tasks. You'll see how moving the focus to the top of the stack allows IT to better understand the services and apps that will make a difference in supporting digital transformation.
10 essential security elements for hybrid cloud
SPONSORED BY: IBM
Explore how an effective security framework can allow financial services organizations to confidently move forward with hybrid cloud while remaining compliant.
This newsletter is published by TechTarget.

TechTarget Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe
TechTarget

A zero-trust security model in the age of digital transformation

TechTarget
Business Technology Research     November 30, 2018
TechTarget
IN THIS ISSUE
A zero-trust security model in the age of digital transformation
SPONSORED BY: IBM Akamai
Discover why a traditional perimeter is no longer conducive to cybersecurity in the age of digital transformation, and why companies are adopting a zero-trust security and delivery model.
How secure are your printers?
SPONSORED BY: HP
How secure are your printers? Get your rating and a personalized checklist.
Enable choice & flexibility when deploying digital workspaces
SPONSORED BY: Citrix
Check out this resource to learn how best-in-class digital workspaces will remove the burden from IT to pick the right options and provide users with the ability to choose what they want - reducing complaints, and enabling workers to be far more productive.
Mobile vision 2020: The future of endpoint management
SPONSORED BY: IBM
Download this resource to learn what the future of enterprise mobility holds, how your organization can prepare, and the UEM platforms that can help ease your organization's management and security challenges.
This newsletter is published by TechTarget.

TechTarget Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe
TechTarget