Define Function of OSI Layers, Basic Computer Science

Assignment Help:
OSI Layers: Open Systems Interconnection model is a reference model developed by International Organization for Standardization in 1984, as a conceptual structure of principles for communication in the network across different applications by different vendors
Layer 7:Application Layer
Application layer interface to user processes for communication and data transfer in network. Provides consistent services such as virtual terminal, file and job transfer and operations
Layer 6:Presentation Layer
Masks the differences of data formats between different systems Specifies architecture-independent data transfer format Encodes and decodes data; Encrypts and decrypts data; Compresses and decompresses data
Layer 5:Session Layer
Important function of session layer are :
Dialog controller - Session layer is the dialog controller. it establishes, maintain and synchronizes between communicating system, token management- its also provide token management services
Layer 4:Transport Layer
Manages end-to-end message delivery in network Provides reliable and sequential packet delivery through error recovery and flow control mechanisms Provides connectionless oriented packet delivery
Layer 3:Network Layer
Determines how data are transferred between network devices Routes packets according to unique network device addresses Provides flow and congestion control to prevent network resource depletion
Layer 2:Data Link Layer
data link layer transforms the physical layer, row transmission facilities to a reliable link and its is responsible for node to node deliver also operating the communication links Frames packets Detects and corrects packets transmit errors
Layer 1:Physical Layer
Defines physical means of sending data over network devices. physical layer perform the functions required to transmit a bit stream over a physical medium

Related Discussions:- Define Function of OSI Layers

Identify the critical races, 1. The standard way for debuggers to plant bre...

1. The standard way for debuggers to plant breakpoints in a program in RAM (whatever the processor instruction set) is to save the breakpointed instruction and replace it by a jump

Normalization, how we come to know about primary key,if more than ids gathe...

how we come to know about primary key,if more than ids gather?

Heuristic search strategies-artificial intelligence, Heuristic Search Strat...

Heuristic Search Strategies-Artificial intelligence In general speaking, a heuristic search is one which utilizes a rule of thumb to improve an agent's performance in solving p

Cost of computer, If you have to consider the installation of communication...

If you have to consider the installation of communications packages, the same questions have to be asked. (a) Does the software and the modem support the necessary transmission

Explain actual process of ftp applications, Question 1 How do you inse...

Question 1 How do you insert Image source code in HTML Question 2 Explain actual process of FTP applications Question 3 Write a short note on TIFF BMP

Theory of computation, I define a restricted form of TMs M as follows. Give...

I define a restricted form of TMs M as follows. Given any input x on the tape of M, the initial portion of the tape that holds x is read-only and one-way. That is, M cannot write o

Super computers, Super Computers: The specialised demands and requirem...

Super Computers: The specialised demands and requirements of science, industry and military have led to the creation of powerful super computers. For numerically intensive com

Digitalelectronics, what duality principle and huntington postulates

what duality principle and huntington postulates

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd