Skip to main content

Ethical hacking simplified (System fundamentals). OSI reference Model.

Inter-networking models 
(System fundamentals continuation) 


The word inter according to word web dictionary means between or among. Network as already defined is a system which permits devices to share common resources together. Inter-networking simply means sharing resources between different networks. Initially when networking started devices can only interconnect between devices from the same vendors. Meaning HP machines can never interconnect with Dell machines. Example is take for example your HP machine cannot work on any network that is not a HP network! Meaning all the network must be made up of HP devices. This can be tedious, it only promote monopoly. The most popular system will always dominate the market, end users (consumers) have no choice than to stick with the popular device so as to share resources. To solve this problem the ISO (international standard organization) came up with a solution. The hero was born to save the networking industry from monopoly, by enhancing competition. The OSI (Open system interconnection) reference model was born.

OSI Reference Model


OSI reference model emergence in the late 1970s change the way devices interconnect! It becomes standard which makes devices from different vendors communicate! This sound great! No need to disturb your self with vendor restriction! You can use devices from different vendors to set up your own network. OSI model is grouped into 7-layers which makes it easy for system interconnection! As we all know division of labour leads to specialization! Laughing.....

OSI Reference Model 7 layers


Application layer Layer 7

Presentation layer Layer 6

Session layer Layer 5

Transport layer Layer 4

Network layer Layer 3

Data link layer Layer 2

Physical layer Layer1

You have to always remember the 7layers the way they are arranged. It seems hard to but there is a shortcut (mind you shortcuts in IT is always permitted lol! ).

The Mnemonics used are All Peoples Seems To Need Data Processing.
That's when you are using top down approach.

Please Do Not Teach Stupid Peoples Acronyms
When you are using the down to up approach (from the receiving end).

All you need to do is to take the first letter of the sentence,
for example All( you take the A=Application.)

Application layer: This layer serves as interface between the user and the system. When using system or trying to access the network like browsing the internet, we directly use the browser. Computer systems only understand the binary digits 1 and 0, thus making it impossible for the user to interact directly with those boring codes. When browsing the internet everything from data entered, addresses must be converted to that boring code before presenting it to the network and vice versa. Protocols like HTTP which is used in accessing hypertext(web-pages) resides here. The user interact with the HTTP protocols to access any resources that deals with the websites. Although one can access such files without the internet nor network, this can only happens when the HTML documents are locally resided on ones computer hard-drive.

Presentation Layer: Guess what? Presentation layer gets its name from its function! It presents data to the application layer. Presentation layer doesn't only presents data, it also make sure data sent across the network is can be read by the target devices without problem. Presentation layer translate data into codes like ASCII code(American standard code for information interchange), EBCDIC (extended binary coded decimal interchange code) etc and vice versa. Data compression(reducing the size of data bandwidth without affection the actual data. Take for example squeezing lot of items into a box for easy transportation.) decompression (This is the opposite of compression. When the squeezed items are brought back to their actual size!), encryption(This is the process of converting data into code, this time not for bandwidth management but for security purpose. Take for example, you traveled are together with friends, you and one of your friend decided to create a code to discuss a private message without the rest understanding what you are saying. The act of coding the message into unique way that the rest wont understand is encryption.) and decryption( The act of understanding or translating the code is decryption) is done here!

Session Layer: The word session according to word web dictionary (sequence of interactions over a network, or time connected to a certain computer). This layer creates, manages and tear down sessions between transport layer and the presentation layer. Each time you want to make call or send data across the network, session is created, the devices uses the session created to send and receive data across the network. On finishing the session has to he tear down (destroyed). Session is governed by rules for a successful transmission of data.
Modes are used as dialog control for successful data delivery.
    Session modes
  • Half duplex
  • full duplex
  • simplex mode

Half duplex: This session mode let the systems or devices to interact in a walkie-talkie manner, one device has to wait for the other device to finish sending data before it can send it own data. Just like walkie-talkie. You cant speak together at a time, one has to finish. After finish talking he signals the other user with “over” meaning he is though with the session you can now talk.

Full duplex: Full duplex mode allow devices to send and receive data simultaneously on the network. Just like how we interact on the GSM networks, sender and the receiver can talk at the same time and even argue.

Simplex: This is a one way transmission of data. Where one is identified as the sender and the other as the receiver. Example is the text message(SMS), in this mode one only sends data and the other receives the message.

NB:Mind you English is not my tongue, you have to be patient with my rough English! After-all the purpose of communication is interconnection! hahahaha understanding.

Join Us on Facebook:ICTmagazine
                  BBM channel: ICTmagazine
to be continued

Comments

Popular posts from this blog

Powerful words from Steve Jobs on his sick bed

Powerful message. Steve Jobs’ Last Words - I reached the pinnacle of success in the business world. In others’ eyes, my life is an epitome of success. However, aside from work, I have little joy. In the end, wealth is only a fact of life that I am accustomed to. At this moment, lying on the sick bed and recalling my whole life, I realize that all the recognition and wealth that I took so much pride in, have paled and become meaningless in the face of impending death. In the darkness, I look at the green lights from the life supporting machines and hear the humming mechanical sounds, I can feel the breath of god of death drawing closer… Now I know, when we have accumulated sufficient wealth to last our lifetime, we should pursue other matters that are unrelated to wealth… Should be something that is more important: Perhaps relationships, perhaps art, perhaps a dream from younger days ... Non-stop pursuing of wealth will only turn a person into a twisted being, just l

iTunes Connect is down!

Something is wrong in Cupertino. A number of developers today turned to Twitter to complain that iTunes Connect, a hub for iOS and Mac software makers, was logging them into the wrong accounts.  The service appears to be matching log-ins with the wrong accounts, showing apps and usernames from completely different people. When developers try to access one of the apps, they receive an error message leading them back to their own account. iTunes Connect has since been taken offline as Apple’s engineers presumably set off to fix the problem. We’ve contacted Apple and will update if we hear back. Culled from:  The Next Web

How to Send SMS to any number anonymously

In this technology era, many of us want to send messages anonymously! the reasons might be maintaining privacy, franking etc. But many sees it as impossible! Today I'm going to take you through steps to send SMS/Text message without exposing your identity. This method is actually based on sending SMS using some online websites that will allow you to send SMS without entering any personal details. So just have a look on the websites to send free Anonymous SMS. List of Websites To Send Anonymous SMS To Any Number :- 1   Seasms.com This is the one of the best site that supports 160 character message to send to any number online and you will not need to register any personal details and can send free SMS to any of number. Must try this. 2   Spicesms.com This site only allows you to send SMS in india. The message service of this site is very fast as the message will be send instantly to the receiver end. 3   Smsti.in This website allows to send SMS in India onl