Different layers of osi model, Computer Networking

Assignment Help:

Different layers of OSI Model?


Related Discussions:- Different layers of osi model

Networks edge and technologies - computer networks , Networks Edge  and Te...

Networks Edge  and Technologies Network  Edge  provides  information  exchange  between  the access network  and the core  network. The devices  and facilities in the network

What does the user datagram protocol (udp) , UDP is connectionless, and doe...

UDP is connectionless, and does not give error checking. But remember, error checking can happen at other layers too.

What are triggers and rules, What are Triggers and Rules? Triggers are...

What are Triggers and Rules? Triggers are special user defined actions generally in the form of stored processes that are automatically invoked by the server based on data rel

Objective of parallel algorithms, After studying this part the students wil...

After studying this part the students will be able to understand about the following: Analysis of Parallel Algorithms; Different Models of Computation; o   Interco

What happens in cdma systems, Question: (a) Suppose that you are a comm...

Question: (a) Suppose that you are a communication engineer and you have to construct a mobile telephone network with bandwidth W = 4.2 MHz in each link. The data rate is

What is star topology, What is Star topology Each station is directly c...

What is Star topology Each station is directly connected to a common central node. Typically, each station attaches to a central node via two point-to-point links, one for tran

Explain what is meant by circuit switching, Question 1: (a) Explain wh...

Question 1: (a) Explain what is meant by circuit switching? Give its main shortcoming and explain its relevance in telephone systems. (b) Outline the differences betwee

Determine the computing infrastructure, Determine the computing infrastruct...

Determine the computing infrastructure One solution for the protection of the computing infrastructure is to use digital certificate-based solutions. Users can be given access

Root, Originally Linux/UNIX systems had one all-powerful user called root t...

Originally Linux/UNIX systems had one all-powerful user called root that managed systems. Discuss the risks of having a single root user and how more limited management abilities c

12/5/2013 5:26:55 AM

The Transport Layer:
The essential function of the transport layer is to accept data from above, split it up into smaller units if need be, pass these to the network layer, and make sure that the pieces all arrive correctly at the other end. In addition, all this should be done efficiently and in a way which isolates the upper layers from the inevitable modification in the hardware technology. The transport layer also determines which type of service to provide to the session layer, and, eventually, to the users of the network. The generally popular type of transport relation is an error-free point-to-point channel that delivers messages or bytes in the order in which they were sent. However, one another way to possible kinds of transport service are the transporting of isolated messages, with no guarantee about the order of delivery, and the broadcasting of messages to multiple destinations. The type of service is determined when the connection is recognized. The transport layer is a true end-to-end layer, all way from a source to the destination. In other words, a program on the source machine carries on a discussion with a like program on the destination machine, using message headers and control messages. In lower layers, the protocols are connecting each machine and its immediate neighbours, and not between the ultimate source and destination machines, which may be detached by some routers.

The Session Layer:
The session layer allows users on unlike machines to found sessions stuck between them. Sessions offer a range of services, including dialog control (keeping track of whose turn it is to transmit), token management and synchronization (check pointing long transmissions to allow them to continue from where they were after a crash).

The Presentation Layer:
The presentation layer is troubled with the syntax and semantics of the information transmitted. In order to create it possible for computers with different data representations to communicate, the data structures to be changed can be defined in the conceptual way, with a standard encoding to be used ''''on the wire.'''' The presentation layer handle these abstract data structures and allows higher-level data structures for example banking records to be defined and exchanged.

The Application Layer:
The application layer has a multiplicity of protocols that are regularly needed by users. One mostly used application protocol is HTTP (Hypertext Transfer Protocol), which is a beginning for the World Wide Web. When a browser desires a Web page, it sends the name of the page it wishes to the server using HTTP. The server after that sends the page reversed. Other application protocols can be used for file transfer, electronic mail as well as network news.

 

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd