Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
What is the function of application layer in osi model
Functionality of the osi model
Functionality of the osi model
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Michael Rauseo IT310
OSI Model
In the early years of computer and network research and development many systems were designed by a number of companies. Although each system had its rights and were sold across the world, it became apparent as network usage grew, that it was difficult, to enable all of these systems to communicate with each other.
In the early 1980s, the International Organization for Standardization (ISO) recognized the need for a network model that would help companies create common network implementations. The OSI reference model, released in 1984, addresses this need. The OSI reference model became the primary architectural model for communications. Although other architectural models have been created, most network vendors relate their network products to the OSI reference model.
The OSI model describes the processes necessary for effective communication in terms of a seven layered model. The seven layers are :
Physical Layer
The physical layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between end systems. Such characteristics as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, and physical connectors, are defined by physical layer specifications.
Data Link Layer
The data-link layer provides error-free transfer of data frames from one computer to another over the physical layer. The layers above this layer can assume virtually error-free transmission over the network. The data-link layer provides the following functions.
- Establishing and terminating a logical link between two computers identified by their unique network interface card.
- Controlling frame flow by instructing the transmitting computer not to transmit frame buffers
- Sequentially transmitting and receiving frames
- Providing and expecting frame-acknowledgment, and detecting and recovering from errors that occur in the physical layer by ret...
... middle of paper ...
...cation layer of one system will be readable by the application layer of another system. If necessary, the presentation layer translates between multiple data representation formats by using a common data representation format. The presentation layer concerns itself not only with the format and representation of actual user data, but also with data structures used by programs. In addition to actual data format transformation, the presentation layer negotiates data transfer syntax for the application layer.
Application Layer
The application layer is the OSI layer closest to the user. It differs from the other layers because it does not provide services to any other OSI layer, but rather to application processes lying outside the scope of the OSI model. Examples include spreadsheet programs, word-processing programs, banking terminal programs, etc. The application layer identifies and establishes the availability of intended communication partners, synchronizes cooperating applications, and establishes agreement on procedures for error recovery and control of data integrity. Also, the application layer determines whether sufficient resources for the intended communication exist.
[]
Multiplexing will gather the data from the source host and give that data some header information. This data will be created into segments by demultiplexing and then be sent to the 3rd layer (Network layer). So to summarize multiplexing will gather data and give it header information and demultiplexing will create segments and sent them to the network layer. Now with flow control that will relate with multiplexing, mainly because it can take multiple data streams and combine them into one shared stream, making that a form of data flow control. Now as far as error checking that will relate to the frames of the data. The logical link control will use a frame check sequence (FCS) to check the frame to see if there is any problems with it. If it detects an error during the frame check sequence then the frame will be discarded and the data will be passed on to the network layer. With this all being said this will mainly be used in the OSI model since the logical link control is the sub-layer for the data link layer. (The other sub layer being MAC) Without the logical link control or 802.2 then the data link layer wouldn’t function
OSI – Open Systems Interconnection - is reference model for how applications can communicate over a network. A reference model is a conceptual framework for understanding relationships.
MAC Layer Connections: Management connections and data transport connections are two connections in this layer. The management connections have three types: basic, primary, and secondary. A basic connection and primary connection are created for each MS when they join the network. A basic connection is used for short and urgent management message. And a primary connection is used for delay-tolerant management messages. The secondary connection is used for IP summarized management messages such as dynamic host configuration protocol [DHCP], and simple network management protocol [SNMP]. Transport connections can be provisioned or can be recognized on demand. They are used for user traffic flows. Unicast or multicast can be used for transmission.
(2012) suggest that communication is a process that involves a sender, a receiver, a message and a channel. The sender and the receiver of the communication may be the professionals and the channels of communication may be through hand over’s, emails, phones calls, verbal discussion and other relevant communication channel
Cisco System was incorporated as information technology organization which has become a leader in internet and networking industry. Cisco System was incorporated during the period of 1984 from the scientist of a university of Stanford, whose prime objective is to find an easier way to link various types of a computer system by developing a network protocol. During the period of 1986, the first system was shipped by Cisco and in current period it has transformed itself into a multi-national giant, having around seventy-two thousand employees and operating in more than one hundred and fifteen countries. In the current era, Cisco System is perceived as a foundation of networking system for small medium organization, internet service
Network computing was created in an effort to allow users of a computer application to share data more easily than using stand alone computers. Clients on a client/server network store their application data on a central server. There are two categories of clients on a network. They were originally categorized by their hardware design, but today clients are categorized by the software application design and where the bulk of the processing is done and where the bulk of the application software is stored.
Colorado State University-Global Campus. (2014). Module 5: Networking Part I [Blackboard ecourse]. In ITS 310- Introduction to Computer Based Systems. Greenwood Village, CO: Author.
For purposes of this paper, the layers will be described in top down fashion beginning with application and ending with the physical layer. This simulates the theoretical method that a computer sends data. When receiving data, the layers are reversed and the data flows from the physical up to the application layer.
A network card is a piece of hardware which allows the computer to communicate with a network. Nowadays, there are rarely used because most computer come with them built in.
The communication process model was illustrated in the beginning of the film when the receptionist sends out the instants message to other employees to warn them of Margret who was making her way to the office. The information got through the office before Margret walks in and everyone pretended to be working in her presence as she walked through the office. This illustrates how fast information was send through electronic communication and the receivers understood what the message meant. The employees knew how to act and avoid getting in the way of Margret before she walked in. The receptionist who originally sends out the message received the feedback through indirect evidence from the employee’s action which meant that the receiver understood the transmitted message.
Local Area Networks also called LANs have been a major player in industrialization of computers. In the past 20 or so years the worlds industry has be invaded with new computer technology. It has made such an impact on the way we do business that it has become essential with an ever-growing need for improvement. LANs give an employer the ability to share information between computers with a simple relatively inexpensive system of network cards and software. It also lets the user or users share hardware such as Printers and scanners. The speed of access between the computers is lighting fast because the data has a short distance to cover. In most cases a LAN only occupies one or a group of buildings located next to each other. For larger area need there are several other types of networks such as the Internet.
Communication is an interdependent process of sending, receiving, and understanding messages. The definition implies that the components of the communication process cannot be examined separately. Rather, the relationship exists between the sender and the receiver, as well as the environment of the communication event, must be viewed as a whole. According to this perspective, if any of the components and circumstances change (that is, the number of individuals involved in the interaction, seating arrangements, or the time of the day) the communication event is altered. Communication is an ongoing process; we never stop sending and receiving messages. As we will discover, communication is a dynamic process, a process that changes from one communication setting to the next. Although it is difficult to predict, the ways of interpreting communication, certain components are always present in the communication process.
This report will describe the two forms of data communications in terms of the physical interfaces and modes of operation. It will describe the features of data communications equipment in relation to synchronous and asynchronous communication including modems, network terminating units and sending and receiving equipment.
Lack of Sensitivity to Receiver. A failure in effective communication may result when a message is not received by its receiver. Identifying the receiver’s needs, status, knowledge of the subject, and language skills assists the sender in preparing a successful message.
The TCP/IP is the most important internet operation protocol in the world. While IP protocol performs the mass of the functions which is needed for the internet to work. It does not have many capabilities which are essential and needed by applications. In TCP/IP model these tasks are performed by a pair of protocols that operate at the transport layer. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP). These two protocols are vital when it comes to delivering and managing the communication of numerous applications. To pass on data streams to the proper applications the Transport layer must identify the target application. First, to be able to attain this, Transport layer assigns an application an identifier. In the TCP/IP model call this identifier a port number. Every individual software process needing to access the network is assigned a un...