• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The seven layer osi model

Extracts from this document...


Ricki Lambert Communications Technology The seven layer OSI model - D3 Introduction The OSI seven layer model is the method in which data is sent and received through a communications channel. As the name clearly states there are 7 processes that need to be undertaken in order for this to happen. However, for data to be sent and received successfully it needs to undergo the process twice, the second time in reverse order. An example of this can be seen below; The first layer we come across, and the last layer when sending is application. Let's have a look at the application layer a little further. Application It is important to consider what an application really can be when applying it to computing. Application is a software program designed to perform a specific task or group of tasks, such as word processing, communications, or database management. In the case of communication we have many applications, such as messenger software (yahoo or msn), chat rooms, most prominent though is the e-mail based software used on a daily basis by almost every internet user. An application of this type maybe outlook express, or a standard web based e-mail account. Application is considered very basic and is something which is visible to the user. ...read more.


This makes up a huge part of the transportation process however differing protocols to TCP can be used. TCP/IP is one of the most common procedures in computing communications and plays a big part in transportation. This goes to show the relationship between the network layer and the transport layer. The network layer is the IP and the TCP is part of the transport layer. There are many specific ways in which the transportation layer of the model works and these shall be listed below; * Segmentation, packaging and reassembling - This process is very similar to what occurs in the memory management sub system of an operating system. Large amounts of data are segmented into smaller pieces on the source machine and are then sent, this is then reassembled on the destination machine. * Flow control - This is implemented to ensure that time differences between sender and receiver are dealt with and corrected appropriately. Network The network layer is where a router will reside and is the area in which differing protocols reside. It is possible to think of the network layer of doing the following task; if two differing networks are involved in communicating then certain pathways need to be followed, ultimately this is the routers job but it co-insides with the network layer. ...read more.


This happens for both sending and receiving and also occurs in wireless networking. The devices such as the routers, hubs and modems are the ones responsible for possessing the data. They don't intend on knowing any of the message being sent they are just interested in the raw data, although instead of viewing this as a 0 or a 1 they see it as a light pulse or electric charge. The two layers, physical and data link are so closely related that it is impossible to define hardware that belong to one or the other. What is tending to happen nowadays is that the physical layer is being divided in to sub categories so that different network Medias can be supported by the same technology, this allows them to increase in performance and why we have seen the following, Ethernet, Fast Ethernet and 10-Gigabit Ethernet. Conclusion In concluding it is important to remember that all stages of the seven layer model are equally important even if some functions overlap. They are vital in the way in which we communicate and are always developing to suit new technologies and hardware. Another thing to consider is the actual definition of the seven layers. This is not true as really the system is an eight layer concept where the eighth layer is actually the network engineer or user. In some cases the eighth layer is used to define the way in which the system is protected so it represents the security features. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    The systems development life cycle (SDLC) is a conceptual model used in project management ...

    3 star(s)

    And in its emphasis on small teams, short, iterative development cycles and an avoidance of prolonged requirements gathering up front, it shares many similarities with the extreme programming or agile development methodologies which still remain in vogue. As well as denoting a formal software development methodology, the phrase rapid application

  2. Marked by a teacher

    LAN & Topologies & Data Flow

    3 star(s)

    are used as web server, mail server or mail server using a STMP protocol. A web server is used to host a FTP/HTTP site which allows user to access information and download data if the server is not restricted to allow this to happen.

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    3 A. -Hard disk... -to store software and user files (e.g. word processor and essays) -Floppy disk drive... -to enable work to be transported between school and home so that it can be continued in the evening -CDROM... -to allow the import of new games to the PC.

  2. LAN & WAN Protocols

    Only full duplex allows data to be sent and received in both directions at the same time. IEEE 802 Institute of Electrical and Electronics Engineers 802 is the standard which looks after LAN and metropolitan area networks. It is restricted to networks which are carrying variable-size packets.

  1. Different ways of data capture

    PREVENTING DATA BEING DESTROYED/CHANGED * Discs - not allowed onto a system or they must be checked for viruses before use * User Ids and passwords - allowing only authorized users * Access rights - different levels of access for different users, This coulb be read only, Read/Write, No access.

  2. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    Noise is produced at every step, not forgetting that introduced by your own stereo equipment. It can never be entirely eliminated. The same problems of noise are shared by any method of transmitting information, and are certainly by telecommunications, including telephone calls.

  1. I have been given the task to design a database for a company called ...

    Delivery Date This form will not actually be used to directly enter in information on orders as the order information will be entered in by the user on to an order form which due to the relational links between the tables will transfer the necessary information on to order table.

  2. Introduction of Communication

    WAP is optimised for mobile networks that have narrow bandwidths. Disadvantages ? Expensive. ? Did not have a packet-based service for long time. ? Limited size of RAM and ROM. ? Limited power supply. ? Low bandwidth. ? Difficult to keep the phones up-to-date with new WAP services.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work