Question

In: Computer Science

Research the OSI reference model and provide the steps for how data travels from an Application...

Research the OSI reference model and provide the steps for how data travels from an Application to the recipient using a real-life example.

Solutions

Expert Solution

Layer Number Layer Name Description
7 Application Provide user interface to send and receive the data
6 Presentation
Encrypt, format and compress the data for transmission
5 Session Initiate and terminate session with remote system
4 Transport
Break data stream in smaller segments and provide reliable and unreliable data delivery
3 Network
Provide logical addressing
2
Data Link
Prepare data for transmission
1 Physical Move data between devices

==> The Application Layer

This is the last and the topmost layer of the OSI model. This layer provides an interface between application programs running in system and network. If any application needs to access any resource that is available in remote system, it interacts with this layer. Then this layer encompasses the protocols and services that the application will employ to access that resources.

There are two types of application programs; network-aware and network-unaware. An application program is considered as network-aware when it can make any sort of network request. If an application program can’t make any kind of network request, it is considered as network-unaware program.

==> The Presentation Layer

The sixth layer of OSI model is the Presentation layer. Applications running in local system may or may not understand the format that is used to transmit the data across the network. The presentation layer works as the translator in OSI model. When receiving data from application layer, it converts that data in such a format that can be sent over the network. When receiving data from session layer, it reconverts that data in such a format that the application which will use the incoming data can understand.

==> The Session Layer

The session layer is the fifth layer of OSI model. It is responsible for setting up, managing, and dismantling sessions between presentation layer entities and providing dialogs between computers.

When an application makes a network request, this layer checks whether the requested resource is available in local system or in remote system. If requested resource is available in remote system, it tests whether a network connection to access that resource is available or not. If network connection is not available, it sends an error message back to the application informing that connection is not available.

If network connection is available, it establishes a session with remote system. For each individual request, it uses a separate session. This allows multiple applications to send or receive data simultaneously. When data transmission is completed, it terminates the session.

==> The Transport Layer

The transport layer is the fourth layer of OSI model. It provides following functionality: -

Segmentation

On sending computer, it breaks data stream into smaller pieces before transmission. Each piece is known as segment and the process of breaking data into smaller pieces is known as segmentation. On receiving computer, it joins all segments back in data stream. So the upper layers receive data in the format in which it was sent.

Data transportation

This layer establishes a logical connection between sending system and receiving system and uses that connection to provide end-to-end data transportation. For data transportation, it mainly uses two protocols; TCP and UDP.

Multiplexing

Through the use of port numbers, this layer also provides connection multiplexing. Connection multiplexing allows multiple applications to send and receive data simultaneously

==> The Network Layer

The third layer of OSI model is the Network Layer. This layer takes data segment from transport layer and adds logical address to it. A logical address has two components; network partition and host partition. Network partition is used to group networking components together while host partition is used to uniquely identity a system on a network. Logical address is known as IP address. Once logical address and other related information are added in segment, it becomes packet.

This layer decides whether the packet is intended for local system or remote system. It also specifies the standards and protocols which are used to move the data packets across the networks.

To move data packet between two different networks, a device known as router is used. Router uses logical address to take routing decision. Routing is a process of forwarding data packet to its destination.

==> The Data Link Layer

The Data Link Layer is the second layer of OSI model. This layer defines how networking components access the media and what transmission methods they use. This layer has two sub-layers; MAC and LLC.

MAC (Media Access Control)

This sub layer defines how the data packets are placed in media. It also provides physical addressing. Physical address is known as MAC address. Unlike logical addresses which need to be configured, physical addresses are pre-configured in NIC. MAC address is used to uniquely identify a host in local network.

LLC (Logical Link Control)

This sub layer identifies the network layer protocol. On sending computer, it encapsulates the information of the Network Layer protocol in LLC header from which the Data Link layer receives the data packet. On receiving computer, it checks the LLC header to get the information about the network layer protocol. This way a data packet is always delivered to the same network layer protocol from which it was sent.

==> The Physical Layer

The Physical Layer is the first layer of OSI model. This layer specifies the standards for devices, media and technologies which are used in moving the data across the network such as:-

  1. · Type of cable used in connecting the devices
  2. · Patterns of pin used in both sides of cable
  3. · Type of interface card used in networking device
  4. · Type of connector used to connect the cable with network interface
  5. · Encoding of digital signals received from the Data Link layer based on the attached

This was exapmle of osi model


Related Solutions

how would you envision the different layers defined in the OSI Reference Model to interact. how...
how would you envision the different layers defined in the OSI Reference Model to interact. how would you use the OSI model when troubleshooting a network connectivity problem
Discuss how you would envision the different layers defined in the OSI Reference Model to interact....
Discuss how you would envision the different layers defined in the OSI Reference Model to interact. Provide an example of how you would use the OSI model when troubleshooting a network connectivity problem
1. What is the main benefit of using the OSI reference model? 2. What are the...
1. What is the main benefit of using the OSI reference model? 2. What are the pros and cons of using SMF optical cable? 3. What is a patch cable used for? 4. What is the difference between a E1 and a T1 leased line? 1. What part of TCP/IP provides flexibility? 2. What Ethernet class (A, B or C) is most used? Why? 3. Why is subnetting used? 4. (3 points): What is a layer 3 switch?
The OSI and the TCP/IP reference models are defined in seven and four layers, respectively. Research...
The OSI and the TCP/IP reference models are defined in seven and four layers, respectively. Research and discuss why this approach to a network model works better than a single layer model and provide a brief discussion on the benefits of the multi-layer approach. In what other everyday activities could layered approaches also be applied to explain its steps or activities?
Describe a hypothetical situation where you can apply the OSI reference model in conjunction with protocol...
Describe a hypothetical situation where you can apply the OSI reference model in conjunction with protocol analysis to solve a problem or think through a solution involving an information system or network. Discuss the advantages, disadvantages, and limits of using the model and protocol analysis in that situation. Describe a real-world problem where you can apply the OSI reference model to solve a problem or to think through a solution involving an information system or network. Discuss the advantages, disadvantages,...
Explain and draw a diagram about data encapsulation and de-capsulation processes using OSI model.
Explain and draw a diagram about data encapsulation and de-capsulation processes using OSI model.
The Data Link layer of OSI model has four functions associated with providing service to LAN...
The Data Link layer of OSI model has four functions associated with providing service to LAN users. These functions are split into two groups treated by logical link control (LLC) layer and medium access control (MAC) of IEEE 802 reference model. Why? What function(s) is handled by LLC and what others are handled by MAC?
Provide the reference (in APA format) to an empirical research study that examines the IZOF theory...
Provide the reference (in APA format) to an empirical research study that examines the IZOF theory for arousal in athletes.
Provide a professional application of one multichannel queuing model. In addition, please provide a one paragraph...
Provide a professional application of one multichannel queuing model. In addition, please provide a one paragraph description to the application and a one paragraph conclusion to the application.
provide an overview of the theory and application of vector error correction model in financial econometrics....
provide an overview of the theory and application of vector error correction model in financial econometrics. ensure you use some examples to elaborate your views as well as the key diagostics
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT