• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The seven layer osi model

Extracts from this document...


Ricki Lambert Communications Technology The seven layer OSI model - D3 Introduction The OSI seven layer model is the method in which data is sent and received through a communications channel. As the name clearly states there are 7 processes that need to be undertaken in order for this to happen. However, for data to be sent and received successfully it needs to undergo the process twice, the second time in reverse order. An example of this can be seen below; The first layer we come across, and the last layer when sending is application. Let's have a look at the application layer a little further. Application It is important to consider what an application really can be when applying it to computing. Application is a software program designed to perform a specific task or group of tasks, such as word processing, communications, or database management. In the case of communication we have many applications, such as messenger software (yahoo or msn), chat rooms, most prominent though is the e-mail based software used on a daily basis by almost every internet user. An application of this type maybe outlook express, or a standard web based e-mail account. Application is considered very basic and is something which is visible to the user. ...read more.


This makes up a huge part of the transportation process however differing protocols to TCP can be used. TCP/IP is one of the most common procedures in computing communications and plays a big part in transportation. This goes to show the relationship between the network layer and the transport layer. The network layer is the IP and the TCP is part of the transport layer. There are many specific ways in which the transportation layer of the model works and these shall be listed below; * Segmentation, packaging and reassembling - This process is very similar to what occurs in the memory management sub system of an operating system. Large amounts of data are segmented into smaller pieces on the source machine and are then sent, this is then reassembled on the destination machine. * Flow control - This is implemented to ensure that time differences between sender and receiver are dealt with and corrected appropriately. Network The network layer is where a router will reside and is the area in which differing protocols reside. It is possible to think of the network layer of doing the following task; if two differing networks are involved in communicating then certain pathways need to be followed, ultimately this is the routers job but it co-insides with the network layer. ...read more.


This happens for both sending and receiving and also occurs in wireless networking. The devices such as the routers, hubs and modems are the ones responsible for possessing the data. They don't intend on knowing any of the message being sent they are just interested in the raw data, although instead of viewing this as a 0 or a 1 they see it as a light pulse or electric charge. The two layers, physical and data link are so closely related that it is impossible to define hardware that belong to one or the other. What is tending to happen nowadays is that the physical layer is being divided in to sub categories so that different network Medias can be supported by the same technology, this allows them to increase in performance and why we have seen the following, Ethernet, Fast Ethernet and 10-Gigabit Ethernet. Conclusion In concluding it is important to remember that all stages of the seven layer model are equally important even if some functions overlap. They are vital in the way in which we communicate and are always developing to suit new technologies and hardware. Another thing to consider is the actual definition of the seven layers. This is not true as really the system is an eight layer concept where the eighth layer is actually the network engineer or user. In some cases the eighth layer is used to define the way in which the system is protected so it represents the security features. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    The systems development life cycle (SDLC) is a conceptual model used in project management ...

    3 star(s)

    come up after its practical use starts, so the issues related to the system are solved after deployment of the system. Not all the problems come in picture directly but they arise time to time and needs to be solved; hence this process is referred as Maintenance.

  2. Marked by a teacher

    LAN & Topologies & Data Flow

    3 star(s)

    are used as web server, mail server or mail server using a STMP protocol. A web server is used to host a FTP/HTTP site which allows user to access information and download data if the server is not restricted to allow this to happen.

  1. The Seven Domains of IT Infrastructure

    Therefore, strict security is necessary to keep the system safe from attacks. If measures aren't taken to reinforce high security, security breaches are bound to occur. High security prevents hackers from gaining access to sensitive data and information. Remote Access can be gained through a VPN connection.

  2. Introduction of Communication

    RSS is relatively new and not many websites support it. The feeds create higher traffic on the server, because of this the feed is often slow, and the user might prefer to visit the website. Screen Based Personal computers Touch Screens SMS (Short Message Service)

  1. Logic and Logic Gates

    The line above stands for NOT. The circle on the symbol is called a bubble and is generally used to indicate the inverted (active-low) input or output. Truth Table Input Output AB Q 00 0 01 1 10 1 11 1 3. OR GATE There are two inputs so the equation is 22 = 4.

  2. LAN & WAN Protocols

    It works at the physical layer. ADSL uses cooper telephone line rather than the old conventional voiceband modem. It is a full-duplex system. Broadband is an example ADSL transmission. It uses the frequencies which are not used by the voice telephone line. A micro filter allows for this to happen.

  1. WAN Protocols

    of Protocols Almost all of the protocols of the past couple of decades are still in use in one way or another. Many have gained popularity as they surpass the capabilities of their older equivalents and some are a lot less common than they used to be.

  2. Subnetting and IPs IP addresses are an extremely important part of sending and ...

    Class C addresses uses the first three octets for network address and the final octet for the host ID. This Class provides the greatest number of Network addresses and fewer hosts. The massive jump between Class A, B and C is what lead to the developing of Subnetting which eliminates

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work