Explain open-systems interconnections architecture model, Computer Engineering

Assignment Help:

Q. Explain Open-systems interconnections architecture model

The most common network architecture model is the open-systems interconnections (OSI). Figure shows the ISO (International Standards Organization) seven-layer model for an OSI. Although not all layers need be implemented, the more layers that are used, the more functionality and reliability are built into the system. Starting from the bottom layer, the functions of the layers are as follows.

1. Physical-Defines the type of medium, the transmission method, and the transmission rates available for the network; provides the means for transferring data across the interconnection channel and controlling its use.

2. Data Link-Defines how the network medium is accessed, which protocols are used, the packeting/framing methods, and the virtual circuit/connection services; responsible for the transfer of data across the link; provides for the detection and correction of data- transmission errors.

3. Network-Standardizes the way in which addressing is accomplished between linked networks; performs networking functions and internetworking.

4. Transport-Handles the task of reliable message delivery and flow control between applications on different stations; provides source-to-destination data integrity.

5. Session-Establishes two-way communication between applications running on different stations on the network; provides the user interface into the transport layer.

6. Presentation-Translates data formats so that computers with different "languages" can communicate; provides the syntax (rules) of representation of data between devices.

7. Application-Interfaces directly with the application programs running on the stations; provides services such as file access and transfer, peer-to-peer communication among applications, and resource sharing; provides support to process end users' applications such as electronic mail, database management, and file management.

130_Explain open-systems interconnections architecture model.png


Related Discussions:- Explain open-systems interconnections architecture model

External links to files, Somehow, the worksheet has external links to files...

Somehow, the worksheet has external links to files that are no longer around. How can we delete the links? Ans) This happens all of the time to MrExcel. I downloaded a little

4bit counter using JK flip flop and unique sequence, Need to build a 4bit J...

Need to build a 4bit JK flip flop counter with a unique patter. 6 4 2 5 3 1 F C B A

Replacement and substitution, Replacement and substitution: However, e...

Replacement and substitution: However, equivalences allow us to change one sentence with another without affecting the meaning, it means we know already that replacing one sid

Aussie wine tours awt, Business Narrative Aussie Wine Tours (AWT) condu...

Business Narrative Aussie Wine Tours (AWT) conduct tours of the wineries of Victoria's Yarra Valley wine region. The tours take place on the last Sunday of each month. Currentl

Illustrate minimization of gates, Q. Illustrate Minimization of Gates? ...

Q. Illustrate Minimization of Gates? The generalization of Boolean expression is much useful for combinational circuit design. The subsequent three techniques are used for this

Write an awk program - unix , Write an AWK program which takes the followin...

Write an AWK program which takes the following input file and processes it. $cat data.txt John Do 111-1111 English 90 Maths 80 Alice Do 222-2222 English 90 Maths 90 Chemistry 93

The current image in gimp, How do we merge an image from a file to the curr...

How do we merge an image from a file to the current image in GIMP? Ans) Use "File then Open as Layers" menu command or just take the file to a window and drop it there. The file w

Password cracking, Hashed strings can often be deciphered by 'brute forcing...

Hashed strings can often be deciphered by 'brute forcing'. Bad news, eh? Yes, and particularly if your encrypted passwords/usernames are floating around in an unprotected file some

What is vertical organization and horizontal organization, What is vertical...

What is vertical organization and horizontal organization? Highly encoded schemes that use compact codes to state only a small number of control functions in every microinstruc

Does weblogic jms support clustering, WebLogic JMS handles cluster-wide, tr...

WebLogic JMS handles cluster-wide, transparent access to destinations from any server in the cluster. A system administrator can set up cluster-wide, transparent access to destinat

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd