• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The OSI Reference Model, in its simplest terms is a seven layered design designed to make software development, product evolution, modular engineering and multi vendor interoperability easier

Extracts from this document...

Introduction

Introduction

Developed by the International Standards Organisation (ISO) in the 1980s and often described simply as The Stack, The OSI Reference Model, in its simplest terms is a seven layered design designed to make software development, product evolution, modular engineering and multi vendor interoperability easier. This enables the solutions offered by one layer to be updated without adversely affecting the other layers thus making it easier for both application and hardware developers alike. By the time the OSI Reference Model had been fully developed The Defence Advanced Research Project Agency had continued to develop what has now become the de facto standard for the internet, the four layered TCP/IP Protocol Stack. TCP/IP attempts to create a heterogeneous network with open protocols that are independent of operating system and architectural difference. TCP/IP protocols are available to everyone, and are developed and changed by consensus. Everyone is free to develop products to meet these open protocol specifications.

The Department of  Defences development of The TCP/IP Protocol Stack halted further development of the OSI Reference Model and indeed other vendors such as Netware, AppleTalk, Xerox and 3com developed there own standards. Although based on the OSI Reference Model, the concepts of protocol hierarchy are somewhat different.

This report will focus on the different protocol layers and their functions within the OSI Reference Model and the TCP/IP Protocol Stack, some comparisons with other vendor specific stacks will also be made.

Report

...read more.

Middle

), are usually delivered to other systems and often involving complex programmes that in turn act as a front end to a variety of services.  

Presentation

Sometimes referred to as "connection-oriented" this layer is the first one that offers connector functions to both a layer above and a layer below. This layer takes information provided by the application layer making sure that it is in a format that other architectures (i.e. Apple Mac) can read. This layer is also responsible for encoding, encrypting and compression. Layer 6 has to make some assumptions in order to perform its task. The first is that a route exists to the other machine. The second is that all underlying functions needed to establish that connection are available in the lower layers. If they are not, Layer 6 does not attempt to fix things by itself; it simply fails.

Session

Maintains end to end communication sessions of the logical link between users. Such function involves a session, which may in turn support one or more presentation spaces above it and one or more applications above that. The session layer is also responsible for reporting upper layer errors.

Transport

The workhorse of the stack, and the part that most people think of first when they consider networking operations. Maintains the flow of data from source to destination. Provides error checking and recovery of data between the devices,  The transport layer can also sequence and acknowledge data requests.

In the TCP/IP Model, The Transport layer (also known as the Host-to-Host Transport layer)

...read more.

Conclusion

                                                                        Andrew S. Patrick

The OSI model plays an important role in standardizing communications between disparate systems. Were it not for the standards and specifications originally outlined within in the OSI model, linking Apple, Novell and other systems would certainly prove much more challenging.

Bibliography

Book reference

CISCO Press (2003), Internetworking Technologies Handbook, 4th Edition

Microsoft Press (2000), Windows 2000 Resource Kit, 1st Edition.

WWW   documents

Patrick, Andrew (2004), A human factors extension of the seven layer OSI Reference Model. Available from: http://www.andrewpatrick.ca/OSI/10layer.html

Drabik, John (2003), Comm’s Design. The seven faces of the OSI reference model parts 1 and 2 available from: www.commsdesign.com/design_corner/OEG2003041

Foundation Degree

Networking

Net Fundamentals Assignment 1

Paul Lord

16th October 2005

Tutor:        Lin Coxall

        Net Fundamentals Assignment 1                 16th Oct 2005               Page

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Network Design

    File Server The main purpose of using a file server to keep the files in a centralized storage location is so that it can be access by the client computers. So Course Materials and other documents can be kept on the file server.

  2. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    SSM can be broken down into several stages * Stage 1&2 - Finding out * Stage 3 - Selection * Stage 4 - Model Building * Stage 5 - Comparison * Stage 6&7 - Recommendations for change and taking action SSM provides a shift within paradigms where perspectives are concerned.

  1. This paper will propose a testing strategy for Internet E-Commerce applications and assess its ...

    We will only consider field usability testing here. Usability testing of a finished system is effective for finding certain faults, but is no substitute for good usability design. Experience shows that usability tests uncover fewer faults than inspections, but the faults that are found are often more subtle or unusual in nature, and they can be more serious.

  2. The purpose of this project is to discuss the issues associated with the deployment ...

    Formal methods usually begin with a problem statement; Checkland found that fixing the problem too early made investigators unlikely to see different, possibly more basic, problems. And the method itself restricted what could be found out; if we expect the organization to be describable by the interaction among a number

  1. Impact of Social Networking on e-business

    Coleman Parkes Research (2010), which involved data analyzed from several countries revealed that, over 60% of businesses in these countries had improved market reputation through social media. 3.2 Benefits * Cost Saving Companies have yielded extensive profits and saved significantly with their transactions online.

  2. My aim is to develop and provide a proposal to the Surgery of a ...

    then there will be a message saying you need to register first. People who need to make an appointment, can do this by entering all the required information in the appointments page. Only current patients can make appointments, people who don't log in or are not registered will not be able to access the page.

  1. The aim of this project is to develop a web-based control laboratory to serve ...

    Background For traditional laboratory experiments, students required to attend in a scheduled time slot and location where multiple sets of instruments and instructors are require. Students very often are unable to complete their experiment satisfactorily within the time period.

  2. The project explains various algorithms that are exercised to recognize the characters present on ...

    Resizer - It provides a mean to size the input image data to the desired display or video encoding resolution. It accepts image data for separate horizontal and vertical resizing from 1/4� to 4� in increments of 256/N, where N is between 64 and 1024.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work