• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The OSI Reference Model, in its simplest terms is a seven layered design designed to make software development, product evolution, modular engineering and multi vendor interoperability easier

Extracts from this document...

Introduction

Introduction

Developed by the International Standards Organisation (ISO) in the 1980s and often described simply as The Stack, The OSI Reference Model, in its simplest terms is a seven layered design designed to make software development, product evolution, modular engineering and multi vendor interoperability easier. This enables the solutions offered by one layer to be updated without adversely affecting the other layers thus making it easier for both application and hardware developers alike. By the time the OSI Reference Model had been fully developed The Defence Advanced Research Project Agency had continued to develop what has now become the de facto standard for the internet, the four layered TCP/IP Protocol Stack. TCP/IP attempts to create a heterogeneous network with open protocols that are independent of operating system and architectural difference. TCP/IP protocols are available to everyone, and are developed and changed by consensus. Everyone is free to develop products to meet these open protocol specifications.

The Department of  Defences development of The TCP/IP Protocol Stack halted further development of the OSI Reference Model and indeed other vendors such as Netware, AppleTalk, Xerox and 3com developed there own standards. Although based on the OSI Reference Model, the concepts of protocol hierarchy are somewhat different.

This report will focus on the different protocol layers and their functions within the OSI Reference Model and the TCP/IP Protocol Stack, some comparisons with other vendor specific stacks will also be made.

Report

...read more.

Middle

), are usually delivered to other systems and often involving complex programmes that in turn act as a front end to a variety of services.  

Presentation

Sometimes referred to as "connection-oriented" this layer is the first one that offers connector functions to both a layer above and a layer below. This layer takes information provided by the application layer making sure that it is in a format that other architectures (i.e. Apple Mac) can read. This layer is also responsible for encoding, encrypting and compression. Layer 6 has to make some assumptions in order to perform its task. The first is that a route exists to the other machine. The second is that all underlying functions needed to establish that connection are available in the lower layers. If they are not, Layer 6 does not attempt to fix things by itself; it simply fails.

Session

Maintains end to end communication sessions of the logical link between users. Such function involves a session, which may in turn support one or more presentation spaces above it and one or more applications above that. The session layer is also responsible for reporting upper layer errors.

Transport

The workhorse of the stack, and the part that most people think of first when they consider networking operations. Maintains the flow of data from source to destination. Provides error checking and recovery of data between the devices,  The transport layer can also sequence and acknowledge data requests.

In the TCP/IP Model, The Transport layer (also known as the Host-to-Host Transport layer)

...read more.

Conclusion

                                                                        Andrew S. Patrick

The OSI model plays an important role in standardizing communications between disparate systems. Were it not for the standards and specifications originally outlined within in the OSI model, linking Apple, Novell and other systems would certainly prove much more challenging.

Bibliography

Book reference

CISCO Press (2003), Internetworking Technologies Handbook, 4th Edition

Microsoft Press (2000), Windows 2000 Resource Kit, 1st Edition.

WWW   documents

Patrick, Andrew (2004), A human factors extension of the seven layer OSI Reference Model. Available from: http://www.andrewpatrick.ca/OSI/10layer.html

Drabik, John (2003), Comm’s Design. The seven faces of the OSI reference model parts 1 and 2 available from: www.commsdesign.com/design_corner/OEG2003041

Foundation Degree

Networking

Net Fundamentals Assignment 1

Paul Lord

16th October 2005

Tutor:        Lin Coxall

        Net Fundamentals Assignment 1                 16th Oct 2005               Page

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Network Design

    File Server The main purpose of using a file server to keep the files in a centralized storage location is so that it can be access by the client computers. So Course Materials and other documents can be kept on the file server.

  2. This paper will propose a testing strategy for Internet E-Commerce applications and assess its ...

    We are not suggesting that BIT is the same as user acceptance testing. Rather, we expect that in many organizations, the final stages of LSI testing provide some confidence to users that the system will work as they require. If you are asked to plan an acceptance test for your

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    SSM can be broken down into several stages * Stage 1&2 - Finding out * Stage 3 - Selection * Stage 4 - Model Building * Stage 5 - Comparison * Stage 6&7 - Recommendations for change and taking action SSM provides a shift within paradigms where perspectives are concerned.

  2. CAM, which stands for Computer aided manufacture, is used extensively within companies as a ...

    This could, potentially, mean machine downtime if there is no alternative tool that can be used already in the magazine. Annular Rings Microchips Barcodes Features Ease of setting up Good Good Moderate Initial cost Moderate High Moderate Ongoing cost Low Low Moderate Opportunity for data degradation Low Low Moderate Quantity

  1. The purpose of this project is to discuss the issues associated with the deployment ...

    high technology operations. Notice that the system here is the operational one. If we were inventing or designing a new system the clients may very well be airlines and/or government regulators. 3.1.2 Rich Pictures Checkland tends to describe his systems with diagrams known as "rich pictures".

  2. The aim of this project is to develop a web-based control laboratory to serve ...

    Since a web-based laboratory has so many benefits over the traditional laboratory experiment. Different web-based laboratories have already been developed by universities over the world. In general, a web-based laboratory allows users to conduct the experiment by connecting to the server through the internet, which the server is controlling the real experiment in the laboratory.

  1. The project explains various algorithms that are exercised to recognize the characters present on ...

    These images captured under poor visibility conditions have low contrast and brightness elements that generate a low quality image. It is very important to feed these types of images as an input to the recognition algorithm in order to check the integrity of the characters being identified.

  2. Impact of Social Networking on e-business

    The increasing popularity of SNSs amongst businesses and casual users alike is a standing proof that the social collaborative tool based on the ground breaking web2.0 technology has come to stay for good. However, businesses need to take caution about the way they utilize this media alongside their ecommerce operations due to the effects involved.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work