Looking for a similar answer, essay, or assessment help services?

Simply fill out the order form with your paper’s instructions in a few easy steps. This quick process ensures you’ll be matched with an expert writer who
Can meet your papers' specific grading rubric needs. Find the best write my essay assistance for your assignments- Affordable, plagiarism-free, and on time!

Posted: June 5th, 2024

Characteristics Of The Osi Layers Information Technology Essay

This document is a research paper on network security and implementation of a network sniffer. The document overviews a study on computer networks, different hardware used in a network and how to programmatically approach to read all the packets that are being communicated within a specific network.

Network security and network monitoring are prime concerns for any organization. Network teams are established to monitor the bandwidth usage, anonymous transactions, intrusions, security breaches etc. Network sniffer is an approach to design an application that reads every packet in a local area network and forms an analysis to identify threats.

Which Citation Styles Can You Handle?

We get a lot of “Can you do MLA or APA?”—and yes, we can! Our writers ace every style—APA, MLA, Turabian, you name it. Tell us your preference, and we’ll format it flawlessly.

A network sniffer is a residual application that should be installed on one of the computers on the local Ethernet network. On initialization the application will reset the Ethernet card in promiscuous mode. This document will analyze the technical feasibility and will critically review the design for the project.

Network sniffer should be an application that assists network administrators to analyze in and outflow of data, identify the frequent source and destinations, identify bottle necks, data overflows etc. The application shall be accessible from a remote location for the administrator.

CHAPTER 1: INTRODUCTION

INTRODUCTION TO NETWORKS

Definitions:

A group of 2 or more computers linked with a communication medium is a network. The computers in a network are called nodes.

A network can also be defined as a set of independent nodes that have a physician or a logical medium for communication.

Are Writing Services Legal?

Totally! They’re a legit resource for sample papers to guide your work. Use them to learn structure, boost skills, and ace your grades—ethical and within the rules.

The Origin:

Computer networks are mans greatest invention ever. Networks are used for different purposes. A network definition is so simple and generic for the fact that they are versatile and have a broad list of tasks that they can accomplish. Today every activity that we perform has a network involved, our internet, the cell phone network, office networks, ATM machines etc. Networks are the driving power behind modern days technological growth. While networks play a major role, their evolution is of much to teach.

While today connecting a personal computer in a network is a common activity, during their origin, it was large mainframes that were connected to each other over a network. PC network was a phenomemoon that swung into action during the 90s.

Challenges today:

As the benefits grow so will the challenges. Below are some of the challenges that computer networks face.

What’s the Price for a Paper?

Starts at $10/page for undergrad, up to $21 for pro-level. Deadlines (3 hours to 14 days) and add-ons like VIP support adjust the cost. Discounts kick in at $500+—save more with big orders!

Security: Simple use of the term security would be a more generic way to express the challenge for networks. Network security is a major concern today. With the internet evolution hackers have the ability to barge into any computer in the network using some sophisticated tools. Network data leakage, network eavesdropping is a threat to data safety and security. Some of the modern day security systems are firewalls and intrusion detectors, packet analyzers.

Scalability: The ability to accommodate additional computers on a network is scalability. With the growing usage of networks the need to accommodate more number of computers increases. This is a challenge modern day networking. A network should be growing able.

Protocols: A better example to this is the networks of networks, the internet. The internet is a collection of different times of networks, but with evolving needs there might be new protocols and then the complication to have a communication between two different networks running on different protocols.

Speed: The type of network decides the speed of data transfer. On a shared network the speed might be a constraint and adding more computers will take their share of the network bandwidth. Critical applications will need high speed network access to resources.

Is My Privacy Protected?

100%! We encrypt everything—your details stay secret. Papers are custom, original, and yours alone, so no one will ever know you used us.

NETWORK COMMUNICATION:

The OSI model:

The famously known ISO-OSI model which stands for Open System Interconnection (OSI) reference model devised by the International standards organization (ISO). The OSI model is a standard model which governs every network protocol. This is the primary architecture model. The model describes 7 layers for data processing. Each layer is an independent by itself and will perform a set of activities. Each layer is self contented and independently implemented too. The reason this model is versatile and can accommodate one layer or all the 7 layers made it a chosen model for all protocols:

•Layer 7-Application

•Layer 6-Presentation

•Layer 5-Session

Is AI Involved in Writing?

Nope—all human, all the time. Our writers are pros with real degrees, crafting unique papers with expertise AI can’t replicate, checked for originality.

•Layer 4-Transport

•Layer 3-Network

•Layer 2-Data link

•Layer 1-Physical

Why Are You the Best for Research?

Our writers are degree-holding pros who tackle any topic with skill. We ensure quality with top tools and offer revisions—perfect papers, even under pressure.

Characteristics of the OSI Layers:

The OSI model is divided into two group layers. The Upper layers and the lower layers. The upper layers – Application layers are more often layers that interact with the end software on the computer. While the data transport layers deals with raw network data including the physical layer. The application layer directly interacts with the end user.

The physical layer and the data link layer are implementations of both hardware and software combinations. The lowest layer, the physical layer directly interacts with the network medium which is a network cable or a wireless medium.

Data Formats:

Regularly used data communication formats are frames, packets, datagram, segments, messages, cells, and data units. Based on the protocol and different components inside the data unit, it is classified into a data format.

Frame is a unit that communicates at the data link layer. It contains both a header and trailer content. The header contains information about the source of origin, destination etc.

Who Writes My Assignments?

Experts with degrees—many rocking Master’s or higher—who’ve crushed our rigorous tests in their fields and academic writing. They’re student-savvy pros, ready to nail your essay with precision, blending teamwork with you to match your vision perfectly. Whether it’s a tricky topic or a tight deadline, they’ve got the skills to make it shine.

Above image describes the structure of a frame. The header and trailer packets contain control information for the data link layer, the upper layer data contains data that should be transmitted to the next upper layer which is the network layer.

While a frame deals at the datalink layer, packets are the term used for data that are processed at the network layer. A packet also contains a header and trailer load. This part of the packet contains the control data and checksum for the packet. On processing the packet the network layer feeds the upper layer data to the next layer.

Datagrams are information units with a source and destination as the network layer and use a connectionless service. Segment is the term used for data packets that involve at the transport layer.

A cell is a composition of a header and data load, the header will contain information that is dor the data link layer entity and is 5 bytes long. The data load or the payload is data for the upper layer is 48 bytes long. The size of these fields is fixed always.

Will My Paper Be Unique?

Guaranteed—100%! We write every piece from scratch—no AI, no copying—just fresh, well-researched work with proper citations, crafted by real experts. You can grab a plagiarism report to see it’s 95%+ original, giving you total peace of mind it’s one-of-a-kind and ready to impress.

Network Protocols:

Network protocols are for the purpose to support two different entities communicate in an understandable language with each other. A wide variety of protocols exist and all these protocols evolved from the ISO OSI model. Over the course of time companies developed protocols to suit their/their customer’s needs. While there are many protocols the top protocols is the TCP/IP protocol. The TCP protocol ensure data packets are delivered across the network without any loss and the IP protocol controls the transfer of data by maintain the routing for the data packets. LAN and WAN are such protocols that use TCP/IP.

TCP segment structure

A TCP segment consists of a segment header and a data section. The TCP header contains 10 mandatory fields, and an optional extension field (Options, pink background in table). The data section follows the header. Its contents are the payload data carried for the application.

1.4 Network Topologies

1.5 Network Identification and hardware

Network hardware, the physician medium that build the network system consists of different equipment like routers, switches, hubs, network interface cards, cables, bridges, modems, adaptors etc. Here I would like to discuss some of the primary hardware that will play a vital role for network sniffers discussion.

Switches: A network bridge that routes data at the DLL (layer 2 – Data link layer) of the OSI model. There are two types of switches, layer 2 and layer 3 switches. Each point on a switch acts as a direct communication point with the client machine. The switch provides a one to one relation and identification for the server. When a data packet enters a switch, the switch registers the MAC address and associates it with a port on the switch. When there is a data packet for this destination it directly transfers data over this port.

Can You Use Any Citation Format?

Yep—APA, Chicago, Harvard, MLA, Turabian, you name it! Our writers customize every detail to fit your assignment’s needs, ensuring it meets academic standards down to the last footnote or bibliography entry. They’re pros at making your paper look sharp and compliant, no matter the style guide.

Routers: An efficient networking device is a router. It is an advanced level switch. A network router works at the network layer and can transfer data with IP addresses and not binding to MAC addresses. Routers maintain a routing table and will run on algorithms that improve data transfer and eliminate bottlenecks.

Network interface cards (NIC): Also known as Ethernet card is an interface on the computer to the network via a cable or wireless medium. It provides a low level address with the Media Access control identification or also called as MAC ID.

CHAPTER 2: NETWORK SNIFFERS

Purpose

Network sniffer as the name says is an application that can sniff packets traversing over a certain selected network. In a bus network, the data communication is a broadcast service.

A sniffer takes advantage of this service and reads all the packets in the network. Some of the applications that will have a network sniffer underlying are

Can I Change My Order Details?

For sure—you’re not locked in! Chat with your writer anytime through our handy system to update instructions, tweak the focus, or toss in new specifics, and they’ll adjust on the fly, even if they’re mid-draft. It’s all about keeping your paper exactly how you want it, hassle-free.

Network monitoring tools

Firewalls

Network analysis/diagnostics tools

Usage monitors

How Do I Order a Paper?

It’s a breeze—submit your order online with a few clicks, then track progress with drafts as your writer brings it to life. Once it’s ready, download it from your account, review it, and release payment only when you’re totally satisfied—easy, affordable help whenever you need it. Plus, you can reach out to support 24/7 if you’ve got questions along the way!

Parental control tools

Packet Analyzer

Scope

While network sniffers tend to be the solution for network administrators to perform their day to day activities, the current model of sniffers are limited to bus based topologies. This said, the sniffer is practically a subset of itself when it is installed in a switch based network.

Types of network sniffers

Stand-alone sniffer: A stand-alone network sniffer is an application that is installed on a device which is carried by the network administrator. The network administrator has to plug in this device into the local network and start analyzing packets. This is the old model where network administrator is expected to be present to capture and analyze packets.

How Quick Can You Write?

Need it fast? We can whip up a top-quality paper in 24 hours—fully researched and polished, no corners cut. Just pick your deadline when you order, and we’ll hustle to make it happen, even for those nail-biting, last-minute turnarounds you didn’t see coming.

Modern Sniffer with RMON (remote monitoring): The current day network sniffers are advanced sniffers with ability to work remotely. Network administrator can run the sniffer application in one of the local computers on the network which will be active most of the time. The sniffer will continuously analyze packets and store results. When the administrator prefers to generate reports, review network usage, traffic etc the administrator can remotely login to this server via the same network and read all the reports. This gives the flexibility to the administrator to choose to provide services from wherever he/she are and also provide simultaneous service to multiple networks.

Advantages

Network sniffers provide multiple advantages. As told earlier, they are a boon to the network administrator to run diagnostics on their network to analyze the network usage, generate reports, identify protocols on the network etc.

This can lead to identifying security breaches, over bandwidth usages, source computers accessing illegal sites, virus/worm transmission pattern identifications etc.

Based on the packets traversal a pre-emptive program can identify frequently visited destinations inside and outside the network.

Limitations

Like any other software network sniffers have another side too. If fallen in wrong hands, every data communication over the network could be eavesdropped by hackers and interpreted leading to data leakage.

Can You Handle Tough Topics?

Absolutely—bring it on! Our writers, many with advanced degrees like Master’s or PhDs, thrive on challenges and dive deep into any subject, from obscure history to cutting-edge science. They’ll craft a standout paper with thorough research and clear writing, tailored to wow your professor.

In general a network sniffer doesn’t consider reading data inside a packet; the major concern is the overhead which has the source and destination addresses and the packet types. But it is always extendable to read the data inside a packet. However, this data might be encrypted but if the source/destination program are not robust enough, the data can be leaked.

Case Study

CHAPTER 3: OUR APPROACH

3.1 Introduction

Every time there is a packet on the network, the packet is sent to all the computers in the network and only that machine whose MAC ID matches with the destination MAC ID in the packet will process the packet further. All other machines reject this packet.

3.2 The Design

This section, I would like to briefly discuss how a network sniffer works and the design structure of the same

Set the Ethernet card to promiscuous mode

When the network sniffer is initialized for monitoring purpose, the network sniffer would first set the Ethernet card into promiscuous mode.

Read all packets on the network

Once the Ethernet card is set to promiscuous mode, it starts reading every packet on the network from then on. The header of these packets is read and the source, destination, packet type, time etc are recorded in the system.

How Do You Match Professor Expectations?

We follow your rubric to a T—structure, evidence, tone. Editors refine it, ensuring it’s polished and ready to impress your prof.

Move to network packet processor for analysis

Dynamic reporting is done in this phase. That means all the packets that are read, based on this data instant reports are generated like traffic on the network at that point of time, each source computer network usage etc.

Store results for interpretation

The results of the above reports and that network packet data is stored so the administrator can perform other interpretations and audits as required.

3.3 Limitations

1. Ethernet based architecture: This architecture of network sniffer is an Ethernet based architecture which means that the software will then be more of a local computer monitoring tool if installed on switch based architecture.

CHAPTER 4: TECHNICAL FEASIBILITY

CHAPTER 5: CRITICAL EVALUATION

5.1 The design

5.2 Technical resources availability

5.3 Conclusion

Tags: Affordable Essay Pro Papers UK, Assist with Thesis Writing Online, Complimentary Essay Example, Online Dissertation Help from PhD Experts

Order|Paper Discounts

Why Choose Essay Bishops?

You Want The Best Grades and That’s What We Deliver

Top Essay Writers

Our top essay writers are handpicked for their degree qualification, talent and freelance know-how. Each one brings deep expertise in their chosen subjects and a solid track record in academic writing.

Affordable Prices

We offer the lowest possible pricing for each research paper while still providing the best writers;no compromise on quality. Our costs are fair and reasonable to college students compared to other custom writing services.

100% Plagiarism-Free

You’ll never get a paper from us with plagiarism or that robotic AI feel. We carefully research, write, cite and check every final draft before sending it your way.