Explain briefly the function of layers, covered connectivity, Computer Engineering

Assignment Help:

Explain briefly the function of different layers which are covered under end to end layer connectivity.

Different layer are as follows:

1. Transport Layer:

 This is responsible for establishing a network independent communication path appropriate for the particular terminal elements (for example: providing the suitable data rate and end-to-end error control). Therefore, it relieves the user from being related with such details.

Within a packet switched network, the transport entity breaks-up a long user message in packets to march the network abilities. These packets are reassembled at the receiving end to reconstruct the user message.

Also End-to-end flow control and end-to-end error recovery are the functions of transport layer.

2. Session Layer:

 The session layer is used to permit users to classify themselves when waiting access to the network.

 It is related with setting up and maintaining an operational session among terminals. For example: "signing on" at the commencement of a task and "signing off" at its end.

 The chief function of the session layer is to organize several sessions among cooperating entities and perform all concerned functions as synchronization, failure control and management for the successful execution of a session.

 The other facility given by the session layer is termed as Activity management.

3. Presentation Layer:

It is related with the format of the data represented, so as to overcome difference in representation of the information as supplied to one terminal and needed at other. Their reasons are to make communication over the network machine independent.

This resolves the syntax differences with encoding data into standard abstract notation which is valid in the network. Therefore file format differences, data structure and data representations are resolved by using a standard notation.

4. Application Layer:

 As the highest layer within the OSI reference model, the application layer gives services to the users of OSI environment. The layer gives services as follows:

a. Electronic mail or message handling service

b. Directory services

c. Cost allocation

d. Determination of quality of service

e. File transfer and management

f.  Editors and terminal support services

g. Telematic services like videotext.


Related Discussions:- Explain briefly the function of layers, covered connectivity

Principles of composition, PRINCIPLES OF COMPOSITION The principles of ...

PRINCIPLES OF COMPOSITION The principles of composition are the way that the elements of composition are used to achieve a particular purpose. Some of the main principles of co

Why generalization is very strong, Even while Generalization satisfies Stru...

Even while Generalization satisfies Structural, Interface, Behaviour properties. It is mathematically very strong, as it is Antisymmetric and Transitive. Antisymmetric: employe

Variable or compound expression - unification algorithm, Variable or compou...

Variable or compound expression - Unification algorithm: Here some things to note regarding this method are:  (i) There if really trying to match a constant to a different

Define main memory and auxiliary memory, Define main memory and auxiliary m...

Define main memory and auxiliary memory? The memory unit that communicates directly with the cpu is known as main memory [RAM].Devices that give backup storage are known as aux

Differences between batch systems versus real-time systems, Question 1: ...

Question 1: a. Give NINE general properties of an MIS b. Name and explain the THREE main Problems and Issues of EIS Question 2: a. What are information systems for?

What is called when a star connected intermediate exchange, A star connecte...

A star connected intermediate exchange is known as a? A star connected intermediate exchange is termed as a Hub exchange.

Evidence of intelligent behavior - artificial intelligence, Evidence of int...

Evidence of intelligent behavior - Artificial Intelligence: Machines mean they could simply be personal computers, or they could be robots with embedded automative systems, or

How many flip-flops are required to construct mod 30 counter, How many flip...

How many flip-flops are required to construct mod 30 counter ? Ans. Mod - 30 counter +/- requires 5 Flip-Flop as 30 5 . Mod - N counter counts overall ' N ' number of state

Discuss different routing plan adopted in telephone network, Discuss differ...

Discuss different Routing plan adopted in a Telephone network. Hierarchical networks are able of handing heavy traffic where needed, and at similar time use minimal number of t

State briefly about the register transfer, State briefly about the  Regist...

State briefly about the  Register Transfer A micro operation is a basic operation performed on information stored in one or more registers. The result of operation may replace

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd