List all seven layer of osi model, Computer Engineering

Assignment Help:

List all seven layer of OSI model and describe function of application layer.

The layers of OSI model are as follows:

(1) The Physical Layer: It defines an interface in terms of the voltage levels, data rate, and connections in order for signals to be transmitted bit by bit.

(2) The link Layer: It provides correction for a link and error detection to make sure that the exchange of data is reliable. This may need the data stream to be divided in blocks, termed as packets, for synchronization or for inserting error-checking bits. Though, transparency is preserved for the data bits into these blocks.

(3) The network layer: It is concerned with the operation of the network among the terminals. This is responsible for establishing the corrections in between the suitable network nodes.

(4) The transport layer: It is responsible for establishing a network independent communication path appropriate for the particular terminal equipments (for example providing the suitable data rate and end-to-end error control). This therefore relieves the user from being concerned along with such details.

(5) The session layer: It is concerned with setting up and keeping an operational session among terminals. For illustration, 'signing on' at the commencement of a task and 'signing off' at its end.

(6) The presentation layer: It is concerned with the format of the data presented, so as to overcome difference in representation of the information as supplied to one terminal and needed at the other. Its reason is to make communication over the network machine-independent.

(7) The application layer: It defines the nature of the task to be performed. This supplies the user along with the applications programs required. Examples include word processing, electronic mail banking transactions and so on.


Related Discussions:- List all seven layer of osi model

Target - data phase, Target abort -computer architecture: Usually, a t...

Target abort -computer architecture: Usually, a target holds DEVSEL# asserted through the final data phase. However, if a target desserts DEVSEL# before disconnecting without

Explain an exceptional handling in java with an example, Explain an excepti...

Explain an exceptional handling in java with the help of suitable example. Java exception handling is managed through five keywords: catch, try, throw, finally and throws. Th

Discuss the mount and unmount system calls, Discuss the mount and unmount s...

Discuss the mount and unmount system calls. The privileged mount system call is used to join a file system to a directory of another file system; the unmount system call detach

Design a mod-5 synchronous counter using J-Kflip-flops, What are synchronou...

What are synchronous counters? Design a Mod-5 synchronous counter using J-K Flip-Flops. Ans. Synchronous Counters : It means that all flip-flops are clocked concurrently. T

What is shared memory programming, Q. What is Shared Memory Programming? ...

Q. What is Shared Memory Programming? We know all processors share a common memory in shared memory model. Every processor can be assigned a separate portion of program stored

Explain network security, Explain network security. Network security me...

Explain network security. Network security means the security of networks and their services from unauthorized access, changes, destruction or disclosure. It gives for assuranc

Reprographic technologies, Reprography: Reprography, as a term, has ga...

Reprography: Reprography, as a term, has gained international recognition in 1963. It includes "photocopying , microcopying, duplicating and in-plant printing and is character

Describe the structure and function of a computer system, Question: a) ...

Question: a) Describe the structure and function of a computer system. b) The raw speed of a microprocessor will not achieve its potential unless a constant stream of wor

Writing down your own interrupt service routines, Q. Writing down your own ...

Q. Writing down your own Interrupt Service Routines? Here are a few rules which should be kept in mind while writing down your own Interrupt Service Routines: 1.  Use Int 21

Where particular header ends & next item begins of ipv6, As IPV6 contain mu...

As IPV6 contain multiple headers, how does it know where particular header ends and next item begins? Several headers types contain fixed size. For illustration a base header h

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd