Explain briefly the function of layers, covered connectivity, Computer Engineering

Assignment Help:

Explain briefly the function of different layers which are covered under end to end layer connectivity.

Different layer are as follows:

1. Transport Layer:

 This is responsible for establishing a network independent communication path appropriate for the particular terminal elements (for example: providing the suitable data rate and end-to-end error control). Therefore, it relieves the user from being related with such details.

Within a packet switched network, the transport entity breaks-up a long user message in packets to march the network abilities. These packets are reassembled at the receiving end to reconstruct the user message.

Also End-to-end flow control and end-to-end error recovery are the functions of transport layer.

2. Session Layer:

 The session layer is used to permit users to classify themselves when waiting access to the network.

 It is related with setting up and maintaining an operational session among terminals. For example: "signing on" at the commencement of a task and "signing off" at its end.

 The chief function of the session layer is to organize several sessions among cooperating entities and perform all concerned functions as synchronization, failure control and management for the successful execution of a session.

 The other facility given by the session layer is termed as Activity management.

3. Presentation Layer:

It is related with the format of the data represented, so as to overcome difference in representation of the information as supplied to one terminal and needed at other. Their reasons are to make communication over the network machine independent.

This resolves the syntax differences with encoding data into standard abstract notation which is valid in the network. Therefore file format differences, data structure and data representations are resolved by using a standard notation.

4. Application Layer:

 As the highest layer within the OSI reference model, the application layer gives services to the users of OSI environment. The layer gives services as follows:

a. Electronic mail or message handling service

b. Directory services

c. Cost allocation

d. Determination of quality of service

e. File transfer and management

f.  Editors and terminal support services

g. Telematic services like videotext.


Related Discussions:- Explain briefly the function of layers, covered connectivity

Determine what part of global array to work on thread number, Q. Determine ...

Q. Determine what part of global array to work on thread number? #include void subdomain(float x[ ], int istart, int ipoints) { int i; for (i = 0; i x[istart+

Find the shortest path, The following is the required interface for the mou...

The following is the required interface for the mouse and cheese problem. Your program is required to read its input from a file named 'maze.txt' In the maze.txt

Differentiate the latch and flip-flop, Differentiate the latch and flip-flo...

Differentiate the latch and flip-flop? The major difference between latch and FF is which latches is level sensitive whereas FF is edge sensitive. They both need the use of clo

What is a table pool, What is a table pool? A table pool (or pool) is ...

What is a table pool? A table pool (or pool) is used to join several logical tables in the ABAP/4 Dictionary.  The definition of a pool having of at least two key fields and a

C, "Super ASCII", if it contains the character frequency equal to their asc...

"Super ASCII", if it contains the character frequency equal to their ascii values. String will contain only lower case alphabets (''a''-''z'') and the ascii values will starts from

Write an algorithm for deadlock detection, Write an algorithm for deadlock ...

Write an algorithm for deadlock detection. An algorithm for deadlock detection: 1. Assume that Work and Finish be vectors of length m and n, correspondingly. Initialize:

What is linked list, Q. What is Linked List? A linked list is a data st...

Q. What is Linked List? A linked list is a data structure formed by zero or more nodes linked by pointers. Every node has two parts as shown in Figure below. One of them is inf

Determine through which symbolic names can be associated, Determine Symboli...

Determine Symbolic names can be associated with Symbolic names can be associated with the data or instruction

What is external procedures, Q. What is External Procedures? These proc...

Q. What is External Procedures? These procedures are written as well as assembled in separate assembly modules and afterwards linked together with the main program to form a bi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd