Define Function of OSI Layers, Basic Computer Science

Assignment Help:
OSI Layers: Open Systems Interconnection model is a reference model developed by International Organization for Standardization in 1984, as a conceptual structure of principles for communication in the network across different applications by different vendors
Layer 7:Application Layer
Application layer interface to user processes for communication and data transfer in network. Provides consistent services such as virtual terminal, file and job transfer and operations
Layer 6:Presentation Layer
Masks the differences of data formats between different systems Specifies architecture-independent data transfer format Encodes and decodes data; Encrypts and decrypts data; Compresses and decompresses data
Layer 5:Session Layer
Important function of session layer are :
Dialog controller - Session layer is the dialog controller. it establishes, maintain and synchronizes between communicating system, token management- its also provide token management services
Layer 4:Transport Layer
Manages end-to-end message delivery in network Provides reliable and sequential packet delivery through error recovery and flow control mechanisms Provides connectionless oriented packet delivery
Layer 3:Network Layer
Determines how data are transferred between network devices Routes packets according to unique network device addresses Provides flow and congestion control to prevent network resource depletion
Layer 2:Data Link Layer
data link layer transforms the physical layer, row transmission facilities to a reliable link and its is responsible for node to node deliver also operating the communication links Frames packets Detects and corrects packets transmit errors
Layer 1:Physical Layer
Defines physical means of sending data over network devices. physical layer perform the functions required to transmit a bit stream over a physical medium

Related Discussions:- Define Function of OSI Layers

Cai, #whatis cai?and its pit fallsquestion..

#whatis cai?and its pit fallsquestion..

Mr, Please what is the different between computer science and information t...

Please what is the different between computer science and information technology? Which of this require too much reading? Thanks

Constant bit rate atm theory, For the connections that request a static amo...

For the connections that request a static amount of bandwidth that is continuously available during the connection lifetime. Is intended to support real time applications requiring

Nursing care activity module, Nursing Care Activity Module Retrievi...

Nursing Care Activity Module Retrieving of identification data of patient  Assessment of the patient  - Physical - Mental - Personal - Socio-c

Trap doors and Logic Bombs, Trap doors:  This is a way of bypassing normal...

Trap doors:  This is a way of bypassing normal authentication procedure (windows/ operating system user name  and password) to access a system. Once a system is compromised (impac

Software Exploration, I need to review 2 different softwares one is windows...

I need to review 2 different softwares one is windows based and the other is Linux Based. Please Ask for further details

Write the function pop in c, QUESTION (a) Convert each of the following...

QUESTION (a) Convert each of the following expressions to prefix and postfix. (i) (A+B)*(C+D) (ii) A-B/(C*D^E) (^ denotes exponentiation) (b) The following algorithm c

Create a queue, QUESTION (a) Give the representation of a queue as an a...

QUESTION (a) Give the representation of a queue as an abstract data type. (b) What is a priority queue? Give two types of priority queues. (c) The following program does

Distinguish between s-http and ssl, QUESTION (a) Distinguish between S...

QUESTION (a) Distinguish between S-HTTP and SSL (b) What are the three basic security provided by SSL? (c) Discuss the limitations of SSL (d) State the port number us

What is evaluating information system investments, 1. What is Evaluating In...

1. What is Evaluating Information System Investments? 2. Is IS evaluation different to evaluation of other investments? 3. What approaches are used to evaluate IS investments

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd