• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The seven layer osi model

Extracts from this document...

Introduction

Ricki Lambert Communications Technology The seven layer OSI model - D3 Introduction The OSI seven layer model is the method in which data is sent and received through a communications channel. As the name clearly states there are 7 processes that need to be undertaken in order for this to happen. However, for data to be sent and received successfully it needs to undergo the process twice, the second time in reverse order. An example of this can be seen below; The first layer we come across, and the last layer when sending is application. Let's have a look at the application layer a little further. Application It is important to consider what an application really can be when applying it to computing. Application is a software program designed to perform a specific task or group of tasks, such as word processing, communications, or database management. In the case of communication we have many applications, such as messenger software (yahoo or msn), chat rooms, most prominent though is the e-mail based software used on a daily basis by almost every internet user. An application of this type maybe outlook express, or a standard web based e-mail account. Application is considered very basic and is something which is visible to the user. ...read more.

Middle

This makes up a huge part of the transportation process however differing protocols to TCP can be used. TCP/IP is one of the most common procedures in computing communications and plays a big part in transportation. This goes to show the relationship between the network layer and the transport layer. The network layer is the IP and the TCP is part of the transport layer. There are many specific ways in which the transportation layer of the model works and these shall be listed below; * Segmentation, packaging and reassembling - This process is very similar to what occurs in the memory management sub system of an operating system. Large amounts of data are segmented into smaller pieces on the source machine and are then sent, this is then reassembled on the destination machine. * Flow control - This is implemented to ensure that time differences between sender and receiver are dealt with and corrected appropriately. Network The network layer is where a router will reside and is the area in which differing protocols reside. It is possible to think of the network layer of doing the following task; if two differing networks are involved in communicating then certain pathways need to be followed, ultimately this is the routers job but it co-insides with the network layer. ...read more.

Conclusion

This happens for both sending and receiving and also occurs in wireless networking. The devices such as the routers, hubs and modems are the ones responsible for possessing the data. They don't intend on knowing any of the message being sent they are just interested in the raw data, although instead of viewing this as a 0 or a 1 they see it as a light pulse or electric charge. The two layers, physical and data link are so closely related that it is impossible to define hardware that belong to one or the other. What is tending to happen nowadays is that the physical layer is being divided in to sub categories so that different network Medias can be supported by the same technology, this allows them to increase in performance and why we have seen the following, Ethernet, Fast Ethernet and 10-Gigabit Ethernet. Conclusion In concluding it is important to remember that all stages of the seven layer model are equally important even if some functions overlap. They are vital in the way in which we communicate and are always developing to suit new technologies and hardware. Another thing to consider is the actual definition of the seven layers. This is not true as really the system is an eight layer concept where the eighth layer is actually the network engineer or user. In some cases the eighth layer is used to define the way in which the system is protected so it represents the security features. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    The systems development life cycle (SDLC) is a conceptual model used in project management ...

    3 star(s)

    Further, since a prototype is limited in functionality it may not scale well if the prototype is used as the basis of a final deliverable, which may not be noticed if developers are too focused on building a prototype as a model.

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    Notice the way that the answers have been phrased in part (a). The question asked for a comparison of ROM and RAM so both need to be mentioned when you are giving an answer. To say that RAM is volatile is true, but does not answer the question until you say that ROM is not.

  1. The Seven Domains of IT Infrastructure

    Therefore, strict security is necessary to keep the system safe from attacks. If measures aren't taken to reinforce high security, security breaches are bound to occur. High security prevents hackers from gaining access to sensitive data and information. Remote Access can be gained through a VPN connection.

  2. Smart Card System

    Programming Skills Since Java is the most appropriate programming language that used to develop the system. Thus, the team does not have much knowledge on the Java Programming tool, as consequences, programming skill is also one of the major problems that faced by the team.

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    Noise is produced at every step, not forgetting that introduced by your own stereo equipment. It can never be entirely eliminated. The same problems of noise are shared by any method of transmitting information, and are certainly by telecommunications, including telephone calls.

  2. Introduction of Communication

    or interference of the signal, so listeners will hear the whole advert as we intended them to. Disadvantages Although DAB signals are less prone to interference; they are weaker than FM signals, which can cause problems if the listener lives just outside the broadcasting range, only 80% of the UK can receive a DAB signal.

  1. Logic and Logic Gates

    The line above stands for NOT. The circle on the symbol is called a bubble and is generally used to indicate the inverted (active-low) input or output. Truth Table Input Output AB Q 00 0 01 1 10 1 11 1 3. OR GATE There are two inputs so the equation is 22 = 4.

  2. Propose to research the WTLS or Wireless transport layer security protocol along with the ...

    The WTLS is the security layer of the Wireless Application Protocol (WAP) which was designed to allow wireless devices, and their limited screens and connection speeds, to access Internet and intranet applications. The WTLS is based off of the Internet's Transport Layer Security (TSL), which is very similar to Secure Socket Layer (SSL)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work