The OSI Model – Layer 6: Presentation

Last time, I explained the fundamentals of the fifth layer of the OSI framework: the session layer. The session layer establishes, manages, and terminates the connections between applications. It also sets up, coordinates, and terminates conversations, exchanges, and dialogues between the different applications at each end. It deals with session and connection coordination.

(more…)

0 Comments

The OSI Model | Layer 2

In my previous post, we started the journey through networking by following the OSI framework. With this framework, you get a clear overview of how you set up a network correctly. It also gives you a solid troubleshooting guideline in case of problems in your (organization’s) network.

(more…)

0 Comments

The OSI Model | Fundamentals

When you encounter complex technologies, you need to simplify the process by breaking it down into simple, isolated processes and actions. This is done by using a network model. Practice is important but without a guideline/roadmap you might get stuck or come up with a solution that is not the most optimal one.  

(more…)

0 Comments

802.1X Security | Part 2

Most companies do not have an extra security layer when a client computer connects to the wired network. When connecting to a network, the client computer receives an IP from a DHCP (Domain Host Configuration Protocol: the “IP generator”). At this point, a client computer is not identified or authenticated on a wired network and attacks based on the hacker’s knowledge can be launched.  

(more…)

0 Comments