StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Passing data with OSI modle - Essay Example

Cite this document
Summary
The open system interconnection with seven layers in which all have different network functions (Lathem 6), divides tasks moving information across networked computers to seven smaller task groups. The seven smaller layers is then allocated with a task or group of tasks. The…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
Passing data with OSI modle
Read Text Preview

Extract of sample "Passing data with OSI modle"

Passing data with OSI model The open system interconnection with seven layers in which all have different network functions (Lathem 6), divides tasks moving information across networked computers to seven smaller task groups. The seven smaller layers is then allocated with a task or group of tasks. The seven layers: Layer 7- application, Layer 6- presentation, Layer 5- session, Layer 4- transport, Layer 3- network, Layer 2- data link and Layer 1- physical are responsible for transmission of information from a software application in a computer system to another computer system.

Information relayed from a computer system passes through the application layer in its system which in turn transmits the same information to the presentation layer and eventually to the session layer and so down the physical layer. The physical layer places the information in physical network radium and sent to the next computer system through the medium (Lathem 6).The physical phase in the receiving computer removes the information from the physical network medium and is received across the receiving computer system (Lathem 6).

The physical layer of this computer passes the information upwards to the data link layer 2, which then passes on to the network layer 3 and so on until it reaches the application layer of the computer system. Eventually the application layer of the receiving computer system passes the information to its application program to finish the communication process (Lathem 6). Encapsulation process involves transmission of information that goes down the OSI model in the computer system in which the information originates from (Whitaker 44).

The application layer which has the user interface passes data to the presentation layer and eventually to the session layer. There is extra information added by these three layers compared to the original information (Kasera 18). The new information is then passed on to the transport level in which information is broken down into smaller particles known as segments. These segments are well aligned to enable a stream of the same information to the recipient. The receiving layer receives information from the transport layer in segments that were subdivided (Whitaker 44).

Network addressing and routing is done to the segments through the internet network. The data at this level includes the transport header and the upper information known as a packet (Kasera 18). The packets are added with an IP header of the network layer then send to the Data link layer. The data link layer also transmits each packet in frames which contain the hardware address of the source and the destination computer. At the end there is also the frame check sequence to ensure a right sequence of the data broken down.

The frame is sent router if only the destination computer is in a remote network. Physical layer then encapsulates a digital signal which is readable by devices in the same local network (Lathem 6).De-encapsulation process goes up the OSI model in transmission of information in the receiving computer system (Whitaker 44).The host computer synchronizes with the digital signal after which it receives the whole frame and passes it on to the data link layer. This layer does a cyclic redundancy check on the frames.

Once they are proved to have no errors by matching with the values in the FCS the layer steps off any information that was put in the remote system’s data link layer and pass the rest in packets to the network layer (Lathem 6). The IP address is checked and the network layer header is stripped off from the packet and the rest of the information is passed to the transport layer. Here the information is processed into segments in a stream and acknowledges to the transmitting computer that it received each piece.

Eventually the data is handed to the upper layer application where the end user receives the original information (Kasera 18).One significant piece of information to remember is that data flows in 2 ways in the OSI model, where DOWN denotes data encapsulation and UP denotes data de-capsulation (Kasera 18).Works CitedKasera, Sumit, Nishit Narang, and Sumita Narang. Communication Works: Principles and Practice. New Delhi: Tata McGraw-Hill Pub. Co, 2005. Print.Lathem, Chris, Bradley Dinerman, and Lars Hansen.

Configuring Sonicwall Firewalls. Rockland, Mass: Syngress, 2006. Internet resource.Whitaker, Andrew, and Michael Valentine. Ccna: (exam 640-802). Indianapolis, Ind: Que, 2007. Print.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Passing data with OSI modle Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Passing data with OSI modle Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1646417-passing-data-with-osi-modle
(Passing Data With OSI Modle Essay Example | Topics and Well Written Essays - 500 Words)
Passing Data With OSI Modle Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1646417-passing-data-with-osi-modle.
“Passing Data With OSI Modle Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1646417-passing-data-with-osi-modle.
  • Cited: 0 times

CHECK THESE SAMPLES OF Passing data with OSI modle

ESI Active Directory Configuration

The 3rd should backup only after internal audit has double checked the active or real time backup data.... om, each branch will have a subdomain that employees can access after passing security authentication.... Elliott's Solutions Inc.... finally decided on its IP Scheme, Domain Name, DNS Configuration, and valued website to allow its many employees to access resources for greater productivity in many branches nationwide and to forthcoming new locations… ESI Active Directory Configuration Elliott's Solutions Inc....
5 Pages (1250 words) Essay

IT Consultant & Methodolgies

In this case, an attacker will therefore try to exploit the open standards of the TCP/IP or osi reference model.... One common thing with ICMP is that it is a data component and it is used to build tunnels.... IT Consultant & Methodologies Instructor Date Introduction As many people would agree, the computer age has brought with it many advancements in many areas....
3 Pages (750 words) Essay

Oracle and a Secure System

e has to be offered at a higher layer on the Open System Interconnection (osi) Reference Model.... There are several systems that on the basis of IP address define which packets to pass and which packets to stop from passing.... This essay "Oracle and a Secure System" is about a number of attacks that can attack the IPs and Oracle....
11 Pages (2750 words) Essay

CAN Bus Technology, Working and Operation of CAN System

owever, we find that modern CAN bus technology has an edge over the Ethernet when it comes to conflict resolution and data transmission.... CAN technology being purely a data link layer implementation program, it became quite popular for use in various capital equipment like textile machinery, apart from its original use in passenger cars and other transport vehicles.... However, this further gave rise to the need of having standards for these layer implementations and data exchange programs....
9 Pages (2250 words) Coursework

The Precautions for the Use of VLAN

The osi model is based on a layered model in which the communication protocol divides its functionality into a series of layers.... In the osi model, the Data Link Layer (Layer 2) is very crucial because all the upper layers rely on it to provide reliable data transfer across the physical link – if this layer is compromised, then the entire communication session is compromised....
7 Pages (1750 words) Assignment

Intro to Quality Management Six Sigma: DMAIC Project Plan Coca-Cola

n the analyzing phase, data will have to be presented in possible mathematical model for easy interpretation.... It has always been improving its services in order to serve their customers appropriately.... Various quality issues have been raised concerning water use, power consumption and handling of customers'… Coca-Cola chief executive officer has emphasized that customer queries have to be handled first before all other matters are addressed....
2 Pages (500 words) Essay

Software Market and Piracy

The essay "Software Market and Piracy" focuses on the majority interesting new occurrence that has developed in the software market, software with capability of being redistributed, modifications and access to source codes.... hellip; The interesting new occurrence that has developed in the software market, software with capability of being redistributed, modifications and access to source codes, “The open Source Software” has generated a noticeable widely felt popularity and impact....
7 Pages (1750 words) Essay

How Packet Data Travels through the Networks

TCP/IP architectural model combines some layers in the osi model and has got five different layers which include the application layer, transport layer, network layer, link layer, and physical layer... The paper 'How Packet data Travels through the Networks' presents the computer system that relies on a set of protocols namely the TCP/IP protocol suite for information exchange, storage, and communication.... This report is intended to provide an insight into how packet data travels through the networks, the role of various protocols, and about various processes that occur within the network....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us