Explore BrainMass

OSI Model and Encryption

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

What is the history of the OSI model and benefits?

Why you would recommend either asymmetric key encryption, symmetric key encryption, or no encryption at all for the Email correspondence

© BrainMass Inc. brainmass.com October 24, 2018, 8:06 pm ad1c9bdddf

Solution Preview

The Open Systems Interconnection (usually abbreviated to OSI) was an effort to standardize networking that was started in 1982 by the International Organization for Standardization (ISO), along with the ITU-T [1].

Prior to OSI, networking was completely vendor-developed and proprietary, with protocol standards such as SNA, appletalk, netware and DECnet. OSI was an industry effort, attempting to get everyone to agree to common network standards to provide multi-vendor interoperability. It was common for large networks to support multiple network protocol suites, with many devices unable to talk to other devices because of a lack of common protocols between them.

The OSI reference model (which actually predates the OSI protocol work, dating to 1977) was the most important advance in the teaching of network concepts. It promoted the idea of a common model of protocol layers, defining interoperability between network devices and ...

Solution Summary

OSI Model and Encryption are explained.

See Also This Related BrainMass Solution

You and the other members of the IT team for Surebank need to get up to speed on the OSI model.


You are currently working for Surebank, a mid-size financial institution. The organization has approximately 80 people working in their main location where your office is located. The bank also has two branch locations. You have been very successful in your career as a Network Operation Specialist, serving at the help desk, assisting many users with routine problems with their desktop PC's and the company software. Your supervisor, the Network Administrator, was recently fired because of poor attendance. As you are the senior NOS and have performed very capably, you have been appointed as the Interim Network Administrator. If you do well, the interim position could become permanent for you.

Windows 2000 operating system and the Microsoft Office 2000 Suite is on all of the desktop computers (each staff member has a PC). These are the two primary applications you maintain on the network. The staff also uses a text-based interface to the financial system that operates on a mini-main frame similar to a UNIX machine. This interface is supported by consultants. You only need to coordinate the support calls for this software.

Each branch office has only two computers. Those computers are connected to the main office over a Frame Relay network that is supported by your local Internet Service Provider.

When you moved into your new office, you discovered that there is no network inventory, no network diagram, and very little information on how to maintain the network. You believe that the former Network Administrator took all of this information with him in retaliation for being terminated. You are not allowed to contact him, so you are on your own to learn and recreate the information you will need to be successful in this new position.

You will be able to use Internet search engines as well as have access to vendor information and technical resources to assist you in the work.

The main office computers are connected via an Ethernet network and a Token Ring network. Your predecessor was working on a presentation to your boss about having the Token Ring network replaced and converted to Ethernet. You have not been able to find the presentation so you will need to redo his work. In the coming weeks, you will need to both maintain current projects and systems, as well as take on any projects management asks of you.

You and the other members of the IT team for Surebank need to get up to speed on the OSI model. Describe the seven layers of the OSI model. Describe and explain each function of the seven layers, the protocols used, and the network components involved. State your findings as a short presentation.

View Full Posting Details