OSI And TCP/IP Model

Improved Essays
In order for network devices and applications to communicate with each other, they must follow protocols and specific rules that are laid out by the Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) model. In order for data to travel from one device to another, seven layers were created for the OSI & TCP/IP model. These seven layers are a basic standard, utilized by most networks today and are based on the OSI. Even though the OSI model is standard and widely used, it does have some drawbacks.
According to Google, the OSI is defined as a “conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into abstraction layers” (2005). According to Kozierk, the history of the OSI Model started in the late 1970’s when two independent designs were started with the same common purpose. One was by the ISO and the second was by CCITT (International Telegraph and Telephone Consultative Committee). The two developments each outlined parallel networking models and was combined in 1983 and was called The Basic Reference Model for Open Systems Interconnection (2012). It was renamed the OSI Model and published in 1984 by the International Organization for Standardization to set
…show more content…
This layer works with the Application and Session layer and is in charge of presenting and formatting data so that both the sender and receiver can read it (The OSI, 2014). The chief purpose of this layer is to take the data received from the Application layer, condense the data (to limit the number of bits sent), and convey the data in an appropriate format for the Session layer (An Overview, 2009). The tech-faq website lists the functions performed by the Presentation layer as: “protocol conversion, data transmission, data encryption and decryption, data compression, character set conversion, interpretation of graphics commands” (The OSI,

Related Documents

  • Improved Essays

    The Internet was originally called the ARPANET, and in order to enhance the ARPANET to be enable may different types of computer networks to all communicate with each other, an open source protocol needed to be created, hence the development of TCP/IP. TCP/IP improved communications throughout the network and allowed all computers to easily communicate with one another. Another technology that helped expand the ARPANET to more users in a specific location was the development of the Ethernet. Ethernet is a coaxial cable that is still used today in many local area networks. Ethernet is highly effective in moving data from one computer to another at high speeds.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 4 Paper

    • 551 Words
    • 3 Pages

    In T8.1, services and their corresponding user communicate with each other by passing data in a well-defined, shared format, or by coordinating an activity between two or more services. The services are located in a central service pool and can use a so-called Service Bus (often Enterprise Service Bus or ESB), should be shared in parallel by different application systems and beyond, combined by a service composition to arbitrarily complex complete systems. This, also called orchestration combination of various distributed services from many different administrative domains is an essential feature of a service-oriented architecture. A Service bus is used to provide communication between all services and any user, User sends request to the service…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 1 Assignment

    • 1292 Words
    • 6 Pages

    TCP/IP Transmission control Protocol/Internet protocol used to connect host computers on internet. First internet ARPANET was developed when US Department of research projects agency (ARPA) in the end of 1970s needed a system to share the resources of their big mainframe systems. In start ARPANET used Network Control Protocol but in 1974 TCP protocol was introduced and all pervious protocols were replaced with TCP Protocol. TCP/IP was the leader in protocols used as a communication protocol on the internet. TCP/IP is still being used as a communication protocol in network operating systems (Abbate, 1994).…

    • 1292 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    This specifies the general interface between the network layer (IP etc.) and the Data Link layer (Ethernet, Token Ring etc.) It’s the standard for the upper Data Link layer sublayer, also known as the Logical Link Control layer. It’s responsible for flow and error control. The Data Link layer wants to send some data over the network, 802.2 LLC helps make this possible. b. 802.3 – Ethernet 802.3 is the standard which Ethernet operates by.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Physical layer: also referred to as layer 1 is responsible for the electrical signals, radio signal, and light signals. It is basically the hardware layer for the OSI model. Devices such as switches and hubs operate at this layer. 2. Data link layer; is responsible for interpreting the electrical signals transmuted through the physical layer.…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    CS320 Assignment 1 Andrew McConnon 13349871 You want to connect different computers, at different locations, so that they can exchange data with each other. What are the different challenges that you need to overcome? Host Identification on small networks isn’t a problem as it can be set up with manual ways of addressing, but will be exponentially harder the larger a network becomes. Protocols, DHCP servers and addressing are a huge need if you want to create and sustain a large, expanding network.…

    • 399 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The following are the top 10 types of packets: IPv4: Internet Protocol version 4 (IPv4) is the standard version of the internet protocol, that acts as the platform for standard internet protocols and existing internet models (ISP). Extensive use of this protocol led to exhaustion of IP addresses. Therefore, we are bound to use IPv6, in the near future. A feature called as sub-netting is used for IP address allocation. It is defined in RFC 791.…

    • 917 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The protocols that are used are TCP and UDP. The data link layer is responsible for encapsulation of packets into frames and then transferring them to the physical layer. It is also responsible for flow control and addressing. 5. A three-way handshake is when two parties need to synchronize their segment sequence numbers used during their transmission.…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    It is composed of software controllers that communicate with the forwarding network fundamentals through standard interfaces, referred also as the South Bound Interface. The last layer is called Application Layer which takes care of…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    In OSI stack, presentation layer converts data transferred by the application layer of the transport node. The functions of presentation layer are : 1. Data transcription 2. Data reconstruction 3.…

    • 139 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Queuing schemes provide predictable network service by providing dedicated bandwidth, controlled jitter and latency, and improved packet loss characteristics. The basic idea is to pre-allocate resources (processor and buffer space) for sensitive data. Each of the following schemes require customized configuration of output interface queues [8]. • First In First Out (FIFO): the simplest form, which also known as first-come, first-served (FCFS) queuing, involves buffering and forwarding of packets in the order of arrival.…

    • 493 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Compared with normal two-tier client-server architecture, the three-tier client-server architecture has the following two important advantages: Better transparency. The servers within the application tier of the three-tier architecture allow an application to detach user interface from back-end resources and therefore provide better location and migration transparency. That is, the location or implementation of back-end resources can be changed without affecting the programs within the client…

    • 1122 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Mac Operating System

    • 777 Words
    • 4 Pages

    The operating system (also sometimes referred as the OS) is the computer program that runs the different functions of the computer, it without it, it would be nearly impossible for the user to interact with the computer. The OS helps to run the memory, storage and computer hardware. The Operating system I use most often is Macintosh’s OS X Snow Leopard. Most of what makes up an operating system is code, but that code would be challenging for the average user to decipher on their own the user interface allows the user to the able to execute commands, create and modify files. A user interface can be made up of applications or apps.…

    • 777 Words
    • 4 Pages
    Improved Essays