Network Architecture Paper

Posted by Winnie Melda on October 22nd, 2018

The networks got their way into the global in the early 1940s and the frequent research and development led to the introduction of different networks, the standards that governed the network communication, computer systems, and the operating systems. Ideally the networks previous came n different versions of Ethernet SNAP, Ethernet 802.3, IEEE802.3 and IEEE802.2 standards alongside the Ethernet II as applied by the Unix. The facilitation of communication led to the introduction of the TCP/IP suite that aimed at boosting the communication within the given network. The communication at the same time between the networks, computer systems, and operating system was challenged as there was no standard that governed the same yet the users wanted to share the resources majorly data hence the introduction of OSI model. The International Standards Organization (ISO) developed the Open System Interconnect that got introduced to solve the problem of interoperability that describes how eh network does operate (White, 2015; Zimmermann, 1980). The TCP/IP suite describes a suite of protocols that got applied by the UNIX and on the internet.

Physical layer

The physical layer outlines the physical part of the company network by describing the cabling, the connectors, bits, frequencies the transmission media and their associated principles of working. The fiber cable that connects the finance building and the administration block gives the physical connection.

Data link layer

The network is defined with multiple computers that will have to share the single network. In this case, the data link layer enables the identification of the physical communication and computing devices within the network and determines the device that will communicate within the network. The CEO and financial officer computers get identified within the network of the company for sharing of the data.

Network layer

The network layer plays the role of routing such that it finds the shortest and cheap route to the destination network. Once communication gets initiated the layer will calculate the possible reliable, efficient and effective route that will guarantee the delivery of data to the destination. It works in a link to the physical layer in defining the short based route.

Transport layer

The transport layer plays the role of guaranteeing the flow of packets within the network from the send machine to the destination hence ensuring the end to end delivery of the data packets. The layer defines the destination computer and the source computer so that the data being sent get to the destination without the data getting corrupted or lost.

Session layer

The session layer provides the service of managing and controlling the communication between devices. The layer is defined of delivering the login rights, permission and general controlling of how different communicating devices get to communicate. The computer of finance section will learn through the IP address and MAC address the computer it has to communicate with the administration office. The communication gets launched by the session layer to make sure that the email is sent after which the communication session is terminated.

Presentation layer

The format applied by the computer is not understandable by the human brain. The presentation layer plays the role of configuring data so that it can be meaningful to the human and it is also defined by the aspect of enhancing security. Ideally, the presentation layer takes to deliver the function of encryption, compression, translation, and others (Alhamedi, Snasel, Aldosari & Abraham, 2014, ). A file sent by the finance department in the XML format is translated by the presentation layer to the computer of the chief executive officer so that the source format is retained. The encryption of the data will ensure that the data is integrated with some keys to protect and will get decrypted by the presentation layer. The cryptography implementation is achieved at the presentation layer. The connection to the secure websites requires the encryption of the communication links done by the layer.

Application layer

The application layer provides the description of the different application that the network is aware that purports the communication by ensuring that resources are shared. Any application that enables the sharing of resources rather facilitates communication then operates at the application layer. The application includes email, web browsers, social networks like Twitter, file sharing services, print server. Therefore, the financial officer can easily send a report via the email to the chief executive officer. However, the applications require networks for them to operate properly.

The TCP/IP suite comes as the combination of the application layer, presentation, and session layer to form the application layer. The network layer replaced and named as internet layer while the data link and physical layer map to the network access layer (Tiwari, Jaiswal, Varma, & Joshi, 2014).

Conclusion

The OSI model was created with the function of describing the network protocol stack, creating rules that govern the communications, describing how the data is shared and the communication of the network devices. The TCP/IP suite plays the same significant role only that the suite is applied to the internet communications.

References

Alhamedi, A. H., Snasel, V., Aldosari, H. M., & Abraham, A. (2014, July). Internet of things communication reference model. In Computational Aspects of Social Networks (CASoN), 2014 6th International Conference on (pp. 61-66). IEEE.

Tiwari, A., Jaiswal, M., Varma, N., & Joshi, B. L. (2014). TCP/IP Protocol Suite, Attacks, and Security Tools.

White, C. (2015). Data Communications and Computer Networks: A business user's approach. Cengage Learning.

Zimmermann, H. (1980). OSI reference model-the ISO model of architecture for open systems interconnection. IEEE Transactions on communications, 28(4), 425-432.

 Sherry Roberts is the author of this paper. A senior editor at Melda Research in non plagiarized research paper if you need a similar paper you can place your order for Nursing Papers for Sale.

Like it? Share it!


Winnie Melda

About the Author

Winnie Melda
Joined: December 7th, 2017
Articles Posted: 364

More by this author