Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

1

Week 3

Student’s Name:

Institution:

Course:

Professor:

Date:
2

Week 3

The Open System Interconnection (OSI) is a reference model demonstrating the data

exchange across different computer software applications through a physical medium. This

architectural pattern for inter-computer communication was designed in 1984 by the

International Organization for Standardization (ISO). It constitutes seven layers with distinct

characteristics and operations. The upper layers are applied only in software as they facilitate

functions related to application issues (Rao & Nayak, 2014). It entails the application,

presentation, session, and transport layers. In contrast, the lower layer facilitates data movement

through different computers via a physical medium. Therefore, it applies to both hardware and

software platforms. It constitutes the network, data link, and physical layers.

The different layers in the OSI model differ in their attributes and functionalities. For

instance, the physical layer is the lowest level of the OSI model that facilitates the transmission

of individual bits across multiple nodes. It develops, stabilizes, and deactivates physical

connections. Besides, it identifies and states the mechanical, electrical, and procedural network

interface requirements. The functions of the physical layer entail line configuration to enhance

connectivity between the devices (Rao & Nayak, 2014). It also aids data transmission across

multiple computers. The physical layer develops the topography that defines the arrangement of

the network devices. Lastly, it facilitates signal transmission of critical information.

Secondly, the data link layer is critical for effective communication across multiple

computers. It indicates data formats in the network and boosts accuracy in the transfer of data

frames. It also constitutes the logical link control (LLC) and access link control (ALC) sub-

layers. The LLC manages the flow and transfer of packets to the receivers' network layer.

Besides, the ALC connects the LLC with the network’s physical layer to move packets over the
3

network. The data link layer promotes framing by forming packets from the physical's raw bit

streams (Yuan & Wang, 2016). Besides, it facilitates physical addressing to determine the actual

destination of the information. It also enhances flow and error control to boost the efficiency and

reliability of the data transmission. Lastly, the data link layer aids access control through the

inter-connected devices.

Thirdly, the network layer monitors and manages the device's location in the system.

Therefore, it identifies the most appropriate path for the data to follow from the source to the

final destination. It constitutes network layer protocols like the IP and Ipv6 used to direct the

network traffic. This layer performs multiple functions that demonstrate its uniqueness. For

instance, it facilitates internetworking, where different devices access logical connections (Yuan

& Wang, 2016). This is the primary role of this layer. Besides, it performs the addressing

functions that determine the identity of different devices. It also facilitates routing to establish an

appropriate path for effective data transmission. Lastly, it engages in packetizing role aided by

the internet protocol (IP).

Fourthly, the transport layer ensures order and uniformity during data transmission to

mitigate duplication. Its mandate is to complete the transfer of information across the system. It

converts data attained from the upper layer into small segments. As a result, this level is also

referred to as a send-to-end layer. It entails the transmission control protocol (TCP) and user

datagram protocols (UDP). The TCP develops and handles a link between hosts (Yuan & Wang,

2016). In contrast, the UDP does not inform the sender about the received package to make

transportation unreliable. The functions of the transport layer entail segmentation and

reassembly, service-point addressing, flow and error control, and connection control.
4

Fifthly, the session layer is categorized in the upper level of the OSI Model. It establishes

an effective link between the communicating devices. Similarly, it manages and synchronizes the

interactions across the computer system that aid communication. The session layer performs two

critical roles. First, it facilitates dialog control to enhance communication between different

processes within the network (Yuan & Wang, 2016). This function may vary as half-duplex or

full-duplex. Secondly, it facilitates synchronization and recovery processes by adding

checkpoints during data transmission. This is vital for data safety and privacy.

Furthermore, the presentation layer focuses on the semantics of the data transmitted

across the operating systems. It functions as the information translator for a network by

converting it to different presentation formats. As a result, it is referred to as the syntax layer

(Yuan & Wang, 2016). The primary function of the presentation layer concerns data translation

into a familiar format that suits the end-users. It employs different encoding approaches to

translate the information into a receiver-dependent format. Besides, this layer facilitates data

encryption to enhance privacy during its conversion and transmission across the network. Lastly,

it aids data compression to limit the number of bits that are transmitted. This ensures the

effective movement of complex data like video, text, and audio.

Lastly, the application layer acts as the avenue for users and application procedures to

access network services. It addresses problems concerning resource allocation and network

transparency to satisfy the end users. Therefore, the specific functions of the application layer are

to facilitate file transfer, access, and management (FTAM). It enables individuals to transmit data

across different devices from remote locations. Similarly, it permits the end-users to retrieve and

manage files remotely (Rao & Nayak, 2014). Other functions of this layer concern mail
5

forwarding and storage and directory services. It highlights the global data on various objects

and indicates the distributed database sources.


6

References

Rao, U. H., & Nayak, U. (2014). Understanding Networks and Network Security. The InfoSec

Handbook, 187–204. https://doi.org/10.1007/978-1-4302-6383-8_9

Yuan, Y., & Wang, F.-Y. (2016, November 1). Towards blockchain-based intelligent

transportation systems. IEEE Xplore. https://doi.org/10.1109/ITSC.2016.7795984

You might also like