• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The OSI Reference Model, in its simplest terms is a seven layered design designed to make software development, product evolution, modular engineering and multi vendor interoperability easier

Extracts from this document...

Introduction

Introduction

Developed by the International Standards Organisation (ISO) in the 1980s and often described simply as The Stack, The OSI Reference Model, in its simplest terms is a seven layered design designed to make software development, product evolution, modular engineering and multi vendor interoperability easier. This enables the solutions offered by one layer to be updated without adversely affecting the other layers thus making it easier for both application and hardware developers alike. By the time the OSI Reference Model had been fully developed The Defence Advanced Research Project Agency had continued to develop what has now become the de facto standard for the internet, the four layered TCP/IP Protocol Stack. TCP/IP attempts to create a heterogeneous network with open protocols that are independent of operating system and architectural difference. TCP/IP protocols are available to everyone, and are developed and changed by consensus. Everyone is free to develop products to meet these open protocol specifications.

The Department of  Defences development of The TCP/IP Protocol Stack halted further development of the OSI Reference Model and indeed other vendors such as Netware, AppleTalk, Xerox and 3com developed there own standards. Although based on the OSI Reference Model, the concepts of protocol hierarchy are somewhat different.

This report will focus on the different protocol layers and their functions within the OSI Reference Model and the TCP/IP Protocol Stack, some comparisons with other vendor specific stacks will also be made.

Report

...read more.

Middle

), are usually delivered to other systems and often involving complex programmes that in turn act as a front end to a variety of services.  

Presentation

Sometimes referred to as "connection-oriented" this layer is the first one that offers connector functions to both a layer above and a layer below. This layer takes information provided by the application layer making sure that it is in a format that other architectures (i.e. Apple Mac) can read. This layer is also responsible for encoding, encrypting and compression. Layer 6 has to make some assumptions in order to perform its task. The first is that a route exists to the other machine. The second is that all underlying functions needed to establish that connection are available in the lower layers. If they are not, Layer 6 does not attempt to fix things by itself; it simply fails.

Session

Maintains end to end communication sessions of the logical link between users. Such function involves a session, which may in turn support one or more presentation spaces above it and one or more applications above that. The session layer is also responsible for reporting upper layer errors.

Transport

The workhorse of the stack, and the part that most people think of first when they consider networking operations. Maintains the flow of data from source to destination. Provides error checking and recovery of data between the devices,  The transport layer can also sequence and acknowledge data requests.

In the TCP/IP Model, The Transport layer (also known as the Host-to-Host Transport layer)

...read more.

Conclusion

                                                                        Andrew S. Patrick

The OSI model plays an important role in standardizing communications between disparate systems. Were it not for the standards and specifications originally outlined within in the OSI model, linking Apple, Novell and other systems would certainly prove much more challenging.

Bibliography

Book reference

CISCO Press (2003), Internetworking Technologies Handbook, 4th Edition

Microsoft Press (2000), Windows 2000 Resource Kit, 1st Edition.

WWW   documents

Patrick, Andrew (2004), A human factors extension of the seven layer OSI Reference Model. Available from: http://www.andrewpatrick.ca/OSI/10layer.html

Drabik, John (2003), Comm’s Design. The seven faces of the OSI reference model parts 1 and 2 available from: www.commsdesign.com/design_corner/OEG2003041

Foundation Degree

Networking

Net Fundamentals Assignment 1

Paul Lord

16th October 2005

Tutor:        Lin Coxall

        Net Fundamentals Assignment 1                 16th Oct 2005               Page

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Network Design

    File Server The main purpose of using a file server to keep the files in a centralized storage location is so that it can be access by the client computers. So Course Materials and other documents can be kept on the file server.

  2. This paper will propose a testing strategy for Internet E-Commerce applications and assess its ...

    We are not suggesting that BIT is the same as user acceptance testing. Rather, we expect that in many organizations, the final stages of LSI testing provide some confidence to users that the system will work as they require. If you are asked to plan an acceptance test for your

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    There are four stages involved within this methodology * Requirements planning * User design * Construction phase * Cutover JMRAD embraces the evolutionary and prototyping approach. * IE Methodology * JRP workshop * JAD workshop * Construction * Cutover Organisation-Oriented (SSM)

  2. Impact of Social Networking on e-business

    Research has proven that, people are more likely to purchase products recommended to them by a close relation or people they trust (Li et al., 2008; Makgosa et al., 2007; Ray et al., 2010). The implementation of SNs have generated substantial incomes for several organizations particularly Amazon.

  1. CAM, which stands for Computer aided manufacture, is used extensively within companies as a ...

    Like the annular rings the quantity of information is limited by the physical size of the label. However, unlike the microchip and annular rings, the data can be transmitted to a reader from a distance of up to several metres through the use of a laser to scan the labels

  2. The purpose of this project is to discuss the issues associated with the deployment ...

    The new name indicates that we don't know what problem we are interested in until the analysis is done. It is important in this phase to be as unsystematic as possible. There may be checklists of things to look for, and we will use many analogies from engineering, politics, biology

  1. The aim of this project is to develop a web-based control laboratory to serve ...

    The reasons being may due to different ability level of students, or lack of instruments and instructors in the laboratory [1]. Introducing a web-based laboratory will resolve these issues. This will enable students an unlimited access to the experiment in any location with a computer connected to the internet.

  2. Wireless Local Area Network (WLAN) technology is rapidly becoming a crucial component of computer ...

    The main objective was to ascertain if the Radio Signals would be affected by the building's solid concrete and extensive internal metal bookshelves. During the formal visit to Portsmouth University, Mr Chris Boorman, the Central Support Manager at Frewen Library (Portsmouth University), explained the operation and the important issues that need to be considered when implementing a wireless network.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work