• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The OSI Reference Model, in its simplest terms is a seven layered design designed to make software development, product evolution, modular engineering and multi vendor interoperability easier

Extracts from this document...

Introduction

Introduction

Developed by the International Standards Organisation (ISO) in the 1980s and often described simply as The Stack, The OSI Reference Model, in its simplest terms is a seven layered design designed to make software development, product evolution, modular engineering and multi vendor interoperability easier. This enables the solutions offered by one layer to be updated without adversely affecting the other layers thus making it easier for both application and hardware developers alike. By the time the OSI Reference Model had been fully developed The Defence Advanced Research Project Agency had continued to develop what has now become the de facto standard for the internet, the four layered TCP/IP Protocol Stack. TCP/IP attempts to create a heterogeneous network with open protocols that are independent of operating system and architectural difference. TCP/IP protocols are available to everyone, and are developed and changed by consensus. Everyone is free to develop products to meet these open protocol specifications.

The Department of  Defences development of The TCP/IP Protocol Stack halted further development of the OSI Reference Model and indeed other vendors such as Netware, AppleTalk, Xerox and 3com developed there own standards. Although based on the OSI Reference Model, the concepts of protocol hierarchy are somewhat different.

This report will focus on the different protocol layers and their functions within the OSI Reference Model and the TCP/IP Protocol Stack, some comparisons with other vendor specific stacks will also be made.

Report

...read more.

Middle

), are usually delivered to other systems and often involving complex programmes that in turn act as a front end to a variety of services.  

Presentation

Sometimes referred to as "connection-oriented" this layer is the first one that offers connector functions to both a layer above and a layer below. This layer takes information provided by the application layer making sure that it is in a format that other architectures (i.e. Apple Mac) can read. This layer is also responsible for encoding, encrypting and compression. Layer 6 has to make some assumptions in order to perform its task. The first is that a route exists to the other machine. The second is that all underlying functions needed to establish that connection are available in the lower layers. If they are not, Layer 6 does not attempt to fix things by itself; it simply fails.

Session

Maintains end to end communication sessions of the logical link between users. Such function involves a session, which may in turn support one or more presentation spaces above it and one or more applications above that. The session layer is also responsible for reporting upper layer errors.

Transport

The workhorse of the stack, and the part that most people think of first when they consider networking operations. Maintains the flow of data from source to destination. Provides error checking and recovery of data between the devices,  The transport layer can also sequence and acknowledge data requests.

In the TCP/IP Model, The Transport layer (also known as the Host-to-Host Transport layer)

...read more.

Conclusion

                                                                        Andrew S. Patrick

The OSI model plays an important role in standardizing communications between disparate systems. Were it not for the standards and specifications originally outlined within in the OSI model, linking Apple, Novell and other systems would certainly prove much more challenging.

Bibliography

Book reference

CISCO Press (2003), Internetworking Technologies Handbook, 4th Edition

Microsoft Press (2000), Windows 2000 Resource Kit, 1st Edition.

WWW   documents

Patrick, Andrew (2004), A human factors extension of the seven layer OSI Reference Model. Available from: http://www.andrewpatrick.ca/OSI/10layer.html

Drabik, John (2003), Comm’s Design. The seven faces of the OSI reference model parts 1 and 2 available from: www.commsdesign.com/design_corner/OEG2003041

Foundation Degree

Networking

Net Fundamentals Assignment 1

Paul Lord

16th October 2005

Tutor:        Lin Coxall

        Net Fundamentals Assignment 1                 16th Oct 2005               Page

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. State two advantages and two disadvantages of a layered operating system.

    Mainly, the program counter and the execution stack associated with the executing thread is saved, so that the context of a new thread can be restored.

  2. NETWORK DESIGN PROPOSAL

    * 4 pair solid PVC; 1000 feet * Maintained by Computer Services as needed SmartPro 1400 * $454.99 * Available/In Stock * 6 outlets +LAN * Maintained by Computer Services as needed EtherFast 8-Port 10/100 Desktop Hub * $79.99 * Available/In Stock * True 10/100 auto-sensing ports, Internal store-and-forward switching

  1. Network Design

    We are proposing a database server because software like student information and student payment details will be kept on a centralized database, so a database server should be established. Also for the software development purposes students may need a database management system, so with the client computers users can use database services.

  2. Phong Shading and Gouraud Shading The standard reflection model in computer graphics that ...

    The modelling transformation We use the modelling transformation to position and orient the model. For example, you can rotate, translate, or scale the model - or perform some combination of these operations. In the fan function I used the glScalef()

  1. The aim of this project is to develop a web-based control laboratory to serve ...

    In Figure 1 below illustrates the block diagram of a general web-based laboratory. Users are students who conduct the experiment. They are connected to the server through the internet. The server hosts the web page of the experiment with a GUI (Graphical User Interface)

  2. The project explains various algorithms that are exercised to recognize the characters present on ...

    The following functions namely, Image_copy, Defragmentation, Resizing_quad_gen, File mapping and Template Matching are the governing factors that decide the above estimation. 5.5 Optimization Techniques In order to optimize the above design, it is necessary to analyze the part of the code that is consuming the maximum amount of time.

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    As identified that many of these are not fit for purpose, as they require adaptation proven within chapter 6.0, to fit the organisations culture, system users and technological developments. Pertaining to SSADM and ISD, this methodology can be seen as too complex for quickly adapting organisations.

  2. TCP wireshark. This assignment will investigate the behaviour of TCP (Transmission Control Protocol). The ...

    Note that in order to find the POST command; you'll need to dig into the packet content field at the bottom of the Wireshark window, looking for a segment with a "POST" within its DATA field. No. 4 segment is the TCP segment containing the HTTP POST command.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work