OSI Model Analogy -- Indiana Term Paper

Excerpt from Term Paper :

Next, Dr. Jones takes the map, scans it into an image format and posts it to a secured area of his website. He sends the link to his closest advisors globally and asks them for feedback. He's careful to embed all the information in the actual graphic, not having any text that could potentially be hacked or taken. He also asks for return receipt of each e-mail announcing the map, and each of this peers across the universities of the world immediately respond back with questions, some with critical analysis, but mostly with interest in finding the golden monkeys of Sustantivo. This completes the data link layer.

Next, Dr. Jones begins to assemble his team of researchers who will attempt to burrow deep down into the caves below Sustantivo. Natasha has purchased one of the largest buildings in this oldest area of Rio and it has a basement of just over four stories. They use this as a jump-off point. For security, Natasha has installed laptops that had seismic sensors in them that also had screens that were bidirectional in capturing and sending images. Understandingly governments were very concerned about this technology as it could turn literally millions of PCs into spies overnight. Dr. Jones called it the Forbidden Browser. This is the network layer of the model.

With the team assembled and the building purchased, it was time to begin researching the paths to the ancient temple through both online and seismic analysis. This is the network layer.

As a knowledge base was developed about the temple and seismic readings indicate that the caves stretched on for miles hundreds of feet below the city of Rio, Dr. Jones began to create a shared

Cite This Term Paper:

"OSI Model Analogy -- Indiana" (2010, July 08) Retrieved November 17, 2018, from

"OSI Model Analogy -- Indiana" 08 July 2010. Web.17 November. 2018. <

"OSI Model Analogy -- Indiana", 08 July 2010, Accessed.17 November. 2018,