Information Technology: Osi Model

Submitted by: Submitted by

Views: 741

Words: 2267

Pages: 10

Category: Science and Technology

Date Submitted: 09/22/2010 06:42 PM

Report This Essay

To give you a summary of the client and network operating systems pros and cons and what they consist of.

Computers have the ability to act as a server; provide resources to other machines, request resources form other computers and act as a client. These machines have similar levels of capabilities that are considered as peers. The reason for is they share resources with each other (pg. 5). A network operating system (NOS) requires cables that connect the systems through a medium service. These computers are also connected with a NIC card or network adapter (pg.7). This can also be accomplished through a RJ-45 jack, fiber-optic connections or wireless connections today. There are adapters that do not support multiple media types, and the configurations may be automatic or through software (pg. 133).

Reference models have the ability to separate networking into layers that make it easy to describe the complex processes and operations that were drafted in a theoretical model of networks. There are protocols that are involved with reference models when sending and receiving information across the network. This is known as the Open System Interconnection (OSI) reference model that was discovered in the 1970’s. This became a standard in 1983. The value with using an OSI reference model is that it is, a useful way of describing and thinking about networking (pg. 160, 161, 180).

ISO Model outlines how protocols perform together and establishes and industry standard. For communication and ensures this communication between the host. There are seven layers to the OSI model and are as follows:

Application Layer: Known as layer 7; defines how network applications perform network-related functions. This layer has a set of interfaces for applications to access the networking services like: network file transfer, message handling, and database query, handles network access, movement of data from the sender to the receiver, and error recovery for applications....