Professional Documents
Culture Documents
Week 3 - .Edited
Week 3 - .Edited
Week 3
Student’s Name:
Institution:
Course:
Professor:
Date:
2
Week 3
The Open System Interconnection (OSI) is a reference model demonstrating the data
exchange across different computer software applications through a physical medium. This
International Organization for Standardization (ISO). It constitutes seven layers with distinct
characteristics and operations. The upper layers are applied only in software as they facilitate
functions related to application issues (Rao & Nayak, 2014). It entails the application,
presentation, session, and transport layers. In contrast, the lower layer facilitates data movement
through different computers via a physical medium. Therefore, it applies to both hardware and
software platforms. It constitutes the network, data link, and physical layers.
The different layers in the OSI model differ in their attributes and functionalities. For
instance, the physical layer is the lowest level of the OSI model that facilitates the transmission
of individual bits across multiple nodes. It develops, stabilizes, and deactivates physical
connections. Besides, it identifies and states the mechanical, electrical, and procedural network
interface requirements. The functions of the physical layer entail line configuration to enhance
connectivity between the devices (Rao & Nayak, 2014). It also aids data transmission across
multiple computers. The physical layer develops the topography that defines the arrangement of
Secondly, the data link layer is critical for effective communication across multiple
computers. It indicates data formats in the network and boosts accuracy in the transfer of data
frames. It also constitutes the logical link control (LLC) and access link control (ALC) sub-
layers. The LLC manages the flow and transfer of packets to the receivers' network layer.
Besides, the ALC connects the LLC with the network’s physical layer to move packets over the
3
network. The data link layer promotes framing by forming packets from the physical's raw bit
streams (Yuan & Wang, 2016). Besides, it facilitates physical addressing to determine the actual
destination of the information. It also enhances flow and error control to boost the efficiency and
reliability of the data transmission. Lastly, the data link layer aids access control through the
inter-connected devices.
Thirdly, the network layer monitors and manages the device's location in the system.
Therefore, it identifies the most appropriate path for the data to follow from the source to the
final destination. It constitutes network layer protocols like the IP and Ipv6 used to direct the
network traffic. This layer performs multiple functions that demonstrate its uniqueness. For
instance, it facilitates internetworking, where different devices access logical connections (Yuan
& Wang, 2016). This is the primary role of this layer. Besides, it performs the addressing
functions that determine the identity of different devices. It also facilitates routing to establish an
appropriate path for effective data transmission. Lastly, it engages in packetizing role aided by
Fourthly, the transport layer ensures order and uniformity during data transmission to
mitigate duplication. Its mandate is to complete the transfer of information across the system. It
converts data attained from the upper layer into small segments. As a result, this level is also
referred to as a send-to-end layer. It entails the transmission control protocol (TCP) and user
datagram protocols (UDP). The TCP develops and handles a link between hosts (Yuan & Wang,
2016). In contrast, the UDP does not inform the sender about the received package to make
transportation unreliable. The functions of the transport layer entail segmentation and
reassembly, service-point addressing, flow and error control, and connection control.
4
Fifthly, the session layer is categorized in the upper level of the OSI Model. It establishes
an effective link between the communicating devices. Similarly, it manages and synchronizes the
interactions across the computer system that aid communication. The session layer performs two
critical roles. First, it facilitates dialog control to enhance communication between different
processes within the network (Yuan & Wang, 2016). This function may vary as half-duplex or
checkpoints during data transmission. This is vital for data safety and privacy.
Furthermore, the presentation layer focuses on the semantics of the data transmitted
across the operating systems. It functions as the information translator for a network by
(Yuan & Wang, 2016). The primary function of the presentation layer concerns data translation
into a familiar format that suits the end-users. It employs different encoding approaches to
translate the information into a receiver-dependent format. Besides, this layer facilitates data
encryption to enhance privacy during its conversion and transmission across the network. Lastly,
it aids data compression to limit the number of bits that are transmitted. This ensures the
Lastly, the application layer acts as the avenue for users and application procedures to
access network services. It addresses problems concerning resource allocation and network
transparency to satisfy the end users. Therefore, the specific functions of the application layer are
to facilitate file transfer, access, and management (FTAM). It enables individuals to transmit data
across different devices from remote locations. Similarly, it permits the end-users to retrieve and
manage files remotely (Rao & Nayak, 2014). Other functions of this layer concern mail
5
forwarding and storage and directory services. It highlights the global data on various objects
References
Rao, U. H., & Nayak, U. (2014). Understanding Networks and Network Security. The InfoSec
Yuan, Y., & Wang, F.-Y. (2016, November 1). Towards blockchain-based intelligent