0% found this document useful (0 votes)
6 views6 pages

Research Activity - CCIT 103

The document outlines the OSI and TCP/IP models in the context of file transfer and email transmission, detailing the functions of each layer from the Application Layer to the Physical Layer. It describes how protocols like SMTP and TCP ensure secure and reliable data transmission. Additionally, it provides a real-world scenario of sending an email, illustrating the practical application of these networking concepts.

Uploaded by

s2023101680
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views6 pages

Research Activity - CCIT 103

The document outlines the OSI and TCP/IP models in the context of file transfer and email transmission, detailing the functions of each layer from the Application Layer to the Physical Layer. It describes how protocols like SMTP and TCP ensure secure and reliable data transmission. Additionally, it provides a real-world scenario of sending an email, illustrating the practical application of these networking concepts.

Uploaded by

s2023101680
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Name: John Kiel Kondo​ ​ ​ ​ ​ ​ ​ Date: 01/29/05

Course/Section: BSIT - 2A​ ​ ​ ​ ​ ​ ​ Research Activity

File transfer

Layer 7: Application Layer - The author will compose an email through a software or web
application where the user accesses the network

Layer 6: Presentation Layer - The composed email will be encrypted to ensure security before
transmission.

Layer 5: Session Layer - This layer will ensure that the connection between the sender and the
email server will remain active throughout the transmission.

Layer 4: Transport Layer - All of the data that are about to be transferred will be broken into
smaller pieces. TCP ensures that the data segments are transferred in order.

Layer 3: Network Layer - This layer will find the best route for the data to be transferred. Each
data packet is assigned source and destination IP addresses to ensure proper routing of data.

Layer 2: Data Link Layer - Each data frame is assigned to a MAC address to facilitate the
delivery within the local network.

Layer 1: Physical Layer - Those small pieces of data will be transmitted back as a whole through
a physical media..
Protocol Identification

Layer 7 (Application Layer)


-​ The File Transfer Protocol is initially conducted at the application layer where the
transfer of files between the user and the server creates a way to send and receive files
through a network.

Layer 6 (Presentation Layer)


-​ The Presentation Layer is responsible for data translation, encryption, and compression to
ensure that data is properly formatted before being processed by the Application Layer.
Layer 5 (Session Layer)
-​ The File Transfer Protocol is responsible for maintaining and managing the continuous
connection between the user and server during the transfer of the files.

Layer 4 (Transport Layer)


-​ The FTP uses the Transmission Control Protocol here at the Layer 4 to ensure that the
transfer of files remains reliable and also to guarantee that the files were being transferred
correctly and without any errors

Layer 3 (Network Layer)


-​ This layer is responsible for routing the data packets across the network. The File
Transfer Protocol is relies on the Internet Protocol in order to route the data between the
user and server also to make sure that the data will be transferred correctly

Layer 2 (Data Link Layer)


-​ This layer is relying on the Wi-Fi or the wired network connections to take care of the
physical addressing and detection to ensure that the files are transferred over the network

Layer 1 (Physical Layer)


-​ The File transfer protocol relies on this layer for the transmission of data over the
communication channel such as cables, signals, which handles the transmission of the
actual file packets to another device

2. Real-World Scenario Application

Scenario: Sending an Email with a classmate

OSI Model

1.​ Application Layer


-​ The email software (Gmail) is used to construct and send out the email.

2.​ Presentation Layer


-​ The composed email will be translated using Multipurpose Internet Mail
Extensions to support attachments like images and texts.

3.​ Session Layer


-​ Within this layer, a session will be created between the two clients which are the
sender and receiver to manage their communication until the email is sent.
4.​ Transport Layer
-​ The Transmission Control Protocol will be applied in this layer to make sure that
the email sent is transmitted correctly and ensures that there were no errors.

5.​ Network Layer


-​ Internet Protocol assigns source and destination IP addresses to route the email to
the correct servers.

6.​ Data Link Layer


-​ The email will be formatted to a data unit to be proper data transmission across
the local network

7.​ Physical Layer


-​ This layer will be responsible for transmitting the data within the physical and
wireless connection.

TCP/IP Model

1.​ Application Layer


-​ The email will be produced and shared using an email client (Gmail).

2.​ Transport Layer


-​ At this layer, the Transmission Control Protocol will be utilized to ensure that the
sent email is correctly transferred and error-free.

3.​ Network Layer


-​ Emails will be assigned IP addresses by Internet Protocol in order to ensure
proper routing.

4.​ Data Link Layer


-​ The email created by the user will now be formatted to data units for better
transmission of data.

5.​ Physical Layer


-​ This layer will be in charge of data transmission over both wireless and physical
connections.
Role of each layer

OSI Model

1.​ Application Layer


-​ This layer is where the user will compose, initiate, format the email that the user
created and to be sent to the recipient. The relevant protocol present in this layer
is the Simple Mail Transfer Protocol. The SMTP is responsible for sending the
email from the sender to the recipient’s email server.

2.​ Presentation Layer


-​ This layer is responsible for ensuring that the contents of the email is encoded and
encrypted correctly. The transport layer security is present protocol in this layer.
The function of TLS will ensure that the email is encrypted.

3.​ Session Layer


-​ This layer ensures that the communication between the client’s side and the
recipient side remains intact. The relevant protocol in this layer is the Simple Mail
Transfer Protocol or SMTP. This protocol is responsible for establishing and
maintaining the session while ensuring that the email is going to be delivered
correctly.

4.​ Transport Layer


-​ Transport layer will guarantee that the email is going to be delivered to the
recipient by breaking it into data units. The protocol that is relevant within this
layer is the Transmission Control Protocol. TCP is responsible for a reliable
delivery of email.

5.​ Network Layer


-​ This layer will ensure that the email sent will be routed correctly by using the IP
addresses that the Internet Protocol assigned. IP is the one that finds what’s the
best path for the transmission of email.

6.​ Data Link Layer


-​ Data Link Layer will format the email into a data frame, where it can ensure the
transmission is correct and proper across the network. The Point-to-Point Protocol
is the relevant protocol for this layer. It creates a direct link between from one
device to another over a network to ensure that the email is secure.
7.​ Physical Layer
-​ This layer, which handles the transfer of the actual file packets to another device,
is necessary for the file transfer protocol to transmit data over communication
channels like cables and signals. Mostly, Wi-Fi transfers radio waves to make
wireless communication possible.

References:
TechTarget. (n.d.). Intro to encapsulation and decapsulation in networking. TechTarget.
Retrieved January 29, 2025, from
https://www.techtarget.com/searchnetworking/tip/Intro-to-encapsulation-and-decapsulation-in-ne
tworking#:~:text=Encapsulation%20adds%20information%20to%20a,can%20read%20the%20or
iginal%20data.

Kurose, J. F., & Ross, K. W. (2017). Computer networking: A top-down approach (7th ed.).
https://www.ucg.ac.me/skladiste/blog_44233/objava_64433/fajlovi/Computer%20Networking%
20_%20A%20Top%20Down%20Approach,%207th,%20converted.pdf

Mahmud, O. (2023, December 18). Exploring data flow via email transmission. DEV.to.
https://dev.to/olyma

Imperva. (n.d.). OSI model. Imperva. Retrieved January 29, 2025, from
https://www.imperva.com/learn/application-security/osi-model/#:~:text=The%20Physical%20La
yer%20converts%20the,the%20email%20is%20fully%20received.

You might also like