COMPUTER NETWORK-SET OF COMPUTERS WHICH ARE AUTONOMOUS/NOT
IN MASTER-SLAVE CONFIGURATION.( ONE DEVICE HAS A
UNIDIRECTIONAL CONTROL OVER ONE OR MORE DEVICES)
NETWORKING EVOLVED FROM THE BASIC PRINCIPLE OF MOVING DATA FROM
ONE COMPUTER TO ANOTHER. AS MORE EFFICIENT MEANS WERE
DISCOVERED—NAMELY, ELECTRICITY ON A COPPER WIRE—NETWORKING
BECAME MORE POPULAR. HOWEVER, THERE WERE NO STANDARDS IN PLACE.
NETWORK MANUFACTURER IMPLEMENTED A DIFFERENT MEANS OF DATA
TRANSFER THAN ANOTHER. IF YOU HAD AN IBM NETWORK, YOU PURCHASED
ONLY IBM NETWORK DEVICES. IN 1984, A GROUP KNOWN AS THE
INTERNATIONAL ORGANIZATION FOR STANDARDIZATION (ISO) CREATED A
MODEL CALLED THE OPEN SYSTEMS INTERCONNECT (OSI).THIS MODEL
DEFINED GUIDELINES FOR INTEROPERABILITY BETWEEN NETWORK
MANUFACTURERS.
A PROTOCOL, THEN, IS MORE THAN JUST THE WORDS OF COMPUTERS, AT ANY
TIME, BOTH COMPUTERS USING THE SAME PROTOCOL HAVE AN EXACT,
COMPLETE UNDERSTANDING OF EACH OTHER
THE OSI MODEL HAS MANY BENEFITS WHICH INCLUDE: A. COMPATIBILITY: THE
OSI MODEL CAN FIT TO ANY COMPATIBLE SOFTWARE, B. EASY
TROUBLESHOOTING, EASY UNDERSTANDING NATURE, SECURITY: OSI MODEL
HAVE FUNCTIONALITY FOR ENCRYPTION AND DECRYPTION, REDUCES
COMPLEXITY: IT BREAKS NETWORK COMMUNICATION PROCESS INTO
SMALLER AND SIMPLER COMPONENTS
DISADVANTAGES OF OSI MODEL
OSI MODEL IS NOT ADAPTED AT ALL TO TELECOMMUNICATION APPLICATIONS
ON COMPUTER
DUE TO THE COMPLEXITY OF THE MODEL, THE FIRST IMPLEMENTATIONS
WERE PRETTY HEAVY AND SLOW
OSI IS BASICALLY AN ARCHITECTURE WHICH ONLY GIVES US AN IDEA HOW
PACKETS TRANSFER OVER THE NETWORK DURING ANY COMMUNICATION
THE PURPOSE OF THIS INTERNATIONAL STANDARD REFERENCE MODEL OF
OPEN SYSTEMS INTERCONNECTION IS TO PROVIDE A COMMON BASIS FOR THE
COORDINATION OF STANDARDS DEVELOPMENT FOR THE PURPOSE OF SYSTEM
INTER-CONNECTION
PHYSICAL LAYER THIS IS LOWERMOST LAYER OF THE OSI MODEL THIS LAYER
REPRESENT THE PHYSICAL ASPECTS OF THE NETWORK SUCH AS CABLE AND
CONNECTORS, THE BASIC FUNCTIONS OF THIS LAYER ARE HANDLES VOLTAGES,
ELECTRICAL PULSES, CONNECTORS AND SWITCHES SO THAT DATA CAN BE
TRANSMITTED FROM ONE NETWORK DEVICE TO ANOTHER(TO BE
TRANSMITTEDDATA MUST BE TRANSFORMED TO ELECTROMAGNATIC SIGNAL
THE PHYSICAL LAYER’S SECURITY IS BASED PLACING THE
HARDWARE BEHIND LOCKED DOORS AND LIMITED ACCESS OF
PERSONNELREFAS BITSPROTOCOL-EHERNET,BLUETOOTH
DATA-LINK LAYER THIS IS THE SECOND LAYER OF OSI MODEL THE DATA LINK
LAYER IS OFTEN SUBDIVIDED INTO TWO PARTS LOGICAL LINK CONTROL (LLC)
AND MEDIUM ACCESS CONTROL (MAC). THE MAIN FUNCTION OF THIS LAYER
ARE HANDLES THE PHYSICAL TRANSFER, FARMING ( THE ASSEMBLY OF DATA
INTO A SINGLE UNIT OR BLOCK), FLOW CONTROL AND ERROR-CONTROL
FUNCTIONS OVER A SINGLE TRANSMISSION LINK PLACING THE
HARDWARE BEHIND LOCKED DOORS AND LIMITED ACCESS OF
PERSONNEL
THE DATA LINK LAYER INVOLVES HOW INFORMATION IS
OBTAINED AND TRANSMITTED BETWEEN STATIONS ON THE
NETWORK. INSTEAD OF USING MEDIA ACCESS CONTROL (MAC),
RECOMMENDS USING PUBLIC KEY ELLIPTIC CURVE CRYPTOGRAPHY TO SERVE
THE DATA LINK LAYER. THE LLC SUBLAYER'S MISSION IS TO GOVERN DATA
FLOW BETWEEN VARIOUS SERVICES AND APPLICATIONS, MAC SUBLAYERS,
WHICH ARE RESPONSIBLE FOR TRANSPORTING DATA ACROSS PHYSICAL
MEDIAREF ASFRAMEPROTOCOL MAC ADDRESS
NETWORK LAYER. THIS LAYER ESTABLISHES THE ROUTE BETWEEN THE
SENDING AND RECEIVING STATIONS. S. IT HANDLES THE ROUTING OF DATA
(SENDING IN THE RIGHT DIRECTION TO THE RIGHT DESTINATION. .THIS LAYER
MANAGES THE END TO END CONTROL (FOR EXAMPLE DETERMINING
WHETHER ALL PACKETS HAVE ARRIVED) AND ERROR CHECKING. THIS LAYER
ACTS AS AN INTERFACE BETWEEN THE BOTTOM AND TOP THREE LAYERS. IN
THIS LAYER USE OF TCP & UDP (USER DATAGRAM PROTOCOL). THE
NETWORK DETERMINES WHEN AND WHAT PATH THE
INFORMATION TRAVELS TO GET TO THE INTENDED
DESTINATIONREF AS PACKETPROTOCOL IP ADDRESS
TRANSPORT LAYERTHIS LAYER MANAGES THE END TO END CONTROL (FOR
EXAMPLE DETERMINING WHETHER ALL PACKETS HAVE ARRIVED) AND ERROR
CHECKING. THE TRANSPORT LAYER ENSURES DATA IS SUCCESSFULLY SENT AND
RECEIVED BETWEEN TWO NODES. THIS LAYER ACTS AS AN INTERFACE
BETWEEN THE BOTTOMS AND TOP THREE LAYERS. IN THIS LAYER USE OF TCP
& UDP (USER DATAGRAM PROTOCOL. THE GOAL OF THE TRANSPORT IS
TO PACKAGE THE DATA AND DELIVER IT INTACT AT ITS INTENDED
DESTINATION WITH HIGH RELIABILITY OF DATA INTEGRITY. THE
RISK ASSOCIATED WITH THE TRANSPORT IS OVERUSE OF PORTS
FOR SHARING, THAT WAS NOT CALCULATED INTO THE
TRANSMISSION OF THE PACKETS (KIZZA, 2010).REFAS
SEGMENT.PROTOCOLTCP,UDP
SESSION LAYERTHE SESSION LAYER DECIDES WHEN TO TURN
COMMUNICATION ON AND OFF BETWEEN TWO COMPUTERS. IT PROVIDES
THE MECHANISMS THAT CONTROL THE DATA EXCHANGE PROCESS AND
COORDINATES THE INTERACTION BETWEEN THEM THIS LAYER
ORGANIZES THE DATA INTO LOGICAL FLOWS AND PROVIDES
GUIDANCE ON ACCESS AND ACCESSIBILITY OF THE
INFORMATION.REFAS DATAPROTOCOL- NAPRESENTATION
LAYERWHEN DATA IS TRANSMITTED BETWEEN DIFFERENT TYPES OF
COMPUTER SYSTEMS, THE PRESENTATION LAYER NEGOTIATES AND MANAGES
THE WAY DATA IS REPRESENTED AND ENCODED IT CAN ENCRYPT,
FORMAT AND CONVERT DATA FROM ONE HOST TO THE OTHER SO
DATA IS RECOGNIZABLE AND USEFULREFASDATAPROTOCOL-
XML,JSON
APPLICATION LAYERTHIS IS TOPMOST OR LAST LAYER OF OSI MODEL. THIS
LAYER DEFINES THE LANGUAGES THAT PROGRAMS USE TO COMMUNICATE
WITH OTHER PROGRAMS. COMMON FUNCTIONS OF THIS LAYER ARE
OPENING, CLOSING, READING AND WRITING FILES, TRANSFERRING FILES AND
E-MAIL MESSAGE, THIS IS THE HIGH LEVEL FUNCTIONS OF THE
PROGRAMS UTILIZING THE NETWORK.REFAS DATA,PROTOCOL-
HTTP,SFTP
TO CREATE THE SEVEN LEVELS, THE FOLLOWING PRINCIPLES WERE USED. 1)
EACH LAYER SHOULD PERFORM A WELL-DEFINED FUNCTION. 2) A LAYER
SHOULD BE CONSTRUCTED IF A DIFFERENT LEVEL OF ABSTRACTION IS
REQUIRED. 3) LAYER BOUNDARIES SHOULD BE CHOSEN TO REDUCE
INFORMATION FLOW ACROSS INTERFACES. 4) EACH LAYER'S ROLE SHOULD BE
CHOSEN WITH THE GOAL OF DEVELOPING INTERNATIONALLY RECOGNIZED
PROTOCOLS.
HYPERTEXT TRANSFER PROTOCOL (HTTP), SFTP (SSH FILE
TRANSFER PROTOCOL) IS A SECURE FILE TRANSFER
PROTOCOL. EXTENSIBLE MARKUP
LANGUAGE (XML) JSON (JAVASCRIPT OBJECT
NOTATION) THE TRANSMISSION CONTROL PROTOCOL (TCP) IS A
TRANSPORT PROTOCOL THAT IS USED ON TOP OF IP TO
ENSURE RELIABLE TRANSMISSION OF PACKETS, THE USER
DATAGRAM PROTOCOL (UDP) IS A LIGHTWEIGHT DATA
TRANSPORT PROTOCOLIT DOES NOT ATTEMPT TO SOLVE
OTHER PROBLEMS THAT ARISE WITH PACKETS, SUCH AS LOST
OR OUT OF ORDER PACKETS. AN IP ADDRESS IS A UNIQUE
ADDRESS THAT IDENTIFIES A DEVICE ON THE INTERNET OR A
LOCAL NETWORK
A MEDIA ACCESS CONTROL ADDRESS (MAC ADDRESS) IS A
UNIQUE IDENTIFIER ASSIGNED TO A NETWORK INTERFACE
CONTROLLER (NIC) FOR USE AS A NETWORK ADDRESS IN
COMMUNICATIONS WITHIN A NETWORK SEGMENT,
ETHERNET (/ˈIːΘƏRNƐT/) IS A FAMILY OF WIRED COMPUTER
NETWORKING TECHNOLOGIES COMMONLY USED IN LOCAL AREA
NETWORKS (LAN), METROPOLITAN AREA NETWORKS (MAN)
AND WIDE AREA NETWORKS (WAN), BLUETOOTH IS A SHORT-
RANGE WIRELESS TECHNOLOGY
THE OSI MODEL CAN ONLY BE EXPLAINED BY 48% AND THE REST FORM OTHER
FACTORS. THIS IS CAUSED BY RESPONDENTS WHO DO NOT KNOW AND
UNDERSTAND ABOUT OSI (OPEN SYSTEM INTERCONNECTION) AND FORM THE
OSI NETWORK . THE DEVELOPMENT OF OSI STANDARDS IS A VERY BIG
CHALLENGE, THE RESULT OF WHICH WILL IMPACT ALL FUTURE COMPUTER
COMMUNICATION DEVELOPMENTS. IF STANDARDS COME TOO LATE OR ARE
INADEQUATE, INTERCONNECTION OF HETEROGENEOUS SYSTEMS WILL NOT BE
POSSIBLE OR WILL BE VERY COSTLY. A COMPUTER NETWORK IS A SET
OF COMPUTERS SHARING RESOURCES LOCATED ON OR
PROVIDED BY NETWORK NODES.