0% found this document useful (0 votes)
15 views3 pages

The Process of Data Transfer Using OSI Model

The document outlines the process of data transfer using the OSI model between two individuals, Mr. X in Bangladesh and Mr. Y in the UK. It details each of the seven layers of the OSI model, explaining the functions and protocols involved in both the sending and receiving processes. The encapsulation and decapsulation of data as it travels through the layers ensure successful communication across the network.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views3 pages

The Process of Data Transfer Using OSI Model

The document outlines the process of data transfer using the OSI model between two individuals, Mr. X in Bangladesh and Mr. Y in the UK. It details each of the seven layers of the OSI model, explaining the functions and protocols involved in both the sending and receiving processes. The encapsulation and decapsulation of data as it travels through the layers ensure successful communication across the network.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

ARMY INSTITUTE OF BUSINESS ADMINISTRATION

SAVAR CANTONMENT

ASSIGNMENT

TITLE: THE PROCESS OF DATA TRANSFER USING OSI


MODEL.
Course Title: Computer & its Application in Business
Course Code: GED 1102

Submitted by: Md. Jonaidur Rahman


ID No.: 122312112
Batch: BBA-12
Submission Date: 23 August, 2023

Submitted to: Mr. Ahsan Ullah (Assistant Professor)


ARMY INSTITUTE OF BUSINESS ADMINISTRATION
Let's walk through the process of data transfer between Mr. X in Bangladesh and Mr. Y in the
UK using the OSI model:

1. Application Layer (Layer 7):


- Mr. X's computer initiates a data transfer by opening a web browser to access a website
hosted in the UK.
- The web browser uses the HTTP (Hypertext Transfer Protocol) at the application layer to
request the web page.

2. Presentation Layer (Layer 6):


- The data from the web browser is prepared for transmission.
- If needed, data compression, encryption, or translation may occur at this layer.

3. Session Layer (Layer 5):


- A session is established between the two computers to facilitate data exchange.
- This layer manages the synchronization and dialog control between the devices.

4. Transport Layer (Layer 4):


- The data from the upper layers is segmented into smaller chunks.
- Mr. X's computer uses the TCP (Transmission Control Protocol) to establish a reliable
connection with Mr. Y's computer in the UK.
- TCP provides mechanisms for flow control, error detection, and error correction.

5. Network Layer (Layer 3):


- Mr. X's computer determines the best route for the data to travel to reach Mr. Y's computer in
the UK.
- The data is encapsulated into packets, with source and destination IP addresses added to the
headers.
- The Internet Protocol (IP) operates at this layer, handling routing and addressing.

6. Data Link Layer (Layer 2):


- The packets from the network layer are further encapsulated into frames.
- The frames include MAC addresses for the source and destination devices.
- Ethernet is a common protocol at this layer for wired connections.

7. Physical Layer (Layer 1):


- The frames are converted into electrical signals or light pulses for transmission over the
physical medium.
- The physical medium could be a wired connection like fiber-optic cables or copper cables.
- Signal voltages, cable specifications, and other physical characteristics are managed at this
layer.
On Mr. Y's side, the process is reversed:

1. Physical Layer (Layer 1):


- The electrical signals or light pulses are received and converted back into frames.

2. Data Link Layer (Layer 2):


- The frames are extracted from the received signals.
- MAC addresses are used to determine if the frames are meant for Mr. Y's computer.

3. Network Layer (Layer 3):


- The packets are extracted from the frames.
- The destination IP address is used to determine if the packets are meant for Mr. Y's computer.

4. Transport Layer (Layer 4):


- The segments received are reassembled into the original data.
- TCP handles reordering segments and retransmitting lost ones.

5. Session Layer (Layer 5):


- The session is managed to ensure proper dialog control.

6. Presentation Layer (Layer 6):


- Any necessary decompression, decryption, or translation is performed.

7. Application Layer (Layer 7):


- The data is presented to Mr. Y's web browser, which can then display the requested web page.

Throughout this process, each layer adds its own header (and sometimes footer) to the data as it
travels down the layers, and the corresponding headers are removed on the receiving side as the
data moves up through the layers. This encapsulation and decapsulation process ensures that data
can be successfully transmitted and understood across the network.

You might also like