Model Essay, Research Paper
The Seven Layers of the OSI Network ModelThe OSI Reference model is comprised of seven layers. This network model is used to describe the different layers, or “parts” of a network. Ranging from software related to hardware related, they are: Application, Presentation, Session, Transport, Network, Data-link, and Physical. The Application layer refers to the software used on the network, such as a web browser, and ftp client, or the client s operating system, all of which are used to access resources from the host. Even though all these applications are considered part of the Application level, they may develop their own methods of communicating between each other, just as long as they are compatible with the level below them. This means following the standard protocol for tasks such as file transfer and email. FTP would be the most common example of a file transfer protocol, and the X.400 message protocol and the X.500 directory protocol are worldwide accepted protocols for their two functions. The second layer from the top is the presentation layer. This layer follows a common protocol in communicating with the Application layer, and of course the layer below it, the Session layer. The presentation layer, though, is concerned with taking the message contents and transforming them appropriately for transmission across the network. This means changing the Application contents into digital, or binary, data. ASCII (American Standard Code for Information Interchange) is an example of a component of the presentation layer. This takes displayed characters and converts them into binary values, so they can be transmitted over the network.. In addition to external data representation transformation, which has just been covered, the presentation layer is also used for compression and/or encryption of the data. However, the presentation layer on the other end must also know how to decrypt or decompress this data. The third layer from the top is the Session layer. This layer includes functions that establish a connection with the host. After the presentation layer transforms the data for transmission, the session layer makes it easy for the data connection to be maintained between processes on different systems. In other words, when a process requests a connection with another process on another system, the session layer helps establish the link. Therefore, this layer is responsible for the following tasks:(1) Starting and activating the session(2) Stopping and releasing the session(3) Synchronizing the two ends(4) Dialog control(5) Transfer of dataThe session layer is the last “upper” or software-related layer, and provides the connection to the “lower”, or hardware-related layers.
The first of the two middle layers is the Transport layer. This layer is for decomposing packets that are sent from the session layer, so they may be transmitted over the network. On the other end, the transport layer puts these back together again. When Transport breaks up these layers, it assigns a sequence number to each one, so if they are received out of order on the other side, the remote Transport layer can recompose them as if they had never been broken up. Afterward, the transport layer puts the correct destination address on the packets and does simple routing of them between networks if it is in an internetwork. The next layer down is called the Network layer. This layer accomplishes the task of telling the packet exactly which hosts to go through to reach the final destination host. It does detailed routing of the message so the message knows how to get there. A simple analogy is comparing what Network does to looking carefully at a roadmap and getting explicit directions, rather than saying merely that you want to go from location x to location y. A widely accepted Network Layer protocol is X.25. Now that the message is properly encoded, broken down, and routed, the only thing left to with it is physically transport it. The Data-link layer, the first of the two physical layers, does data transport. It sends data from one end of a line to the other, it activates and deactivates the link, it detects errors in the data link, it allows the link to be shared, it provides transparent data flow, and allows for error recovery and modification. Commonly accepted standards for the Data-link layer are ANSI s ADCCP (Advanced Data Communications Control Procedure), HDLC (High-level Data Link Control), SDLC (SNA s Data Link Control), and IEEE s 802.2. The final layer accomplishes the task of actually sending the message over the physical link. This link is called the Physical Link. There are different ways to transmit this binary data, such as analog signals, amplitude or frequency modulation (AM or FM), light signals, or radio signals. Standards for transmission of binary data in this layer are: CCITT s x.21 for digital transmission, and v.35 & v.24 for analog transmissions. The whole object of the OSI Reference Model is in its name: Open Systems Interconnect. This means that it has to be open for different types of protocols or methods for each layer, while still providing compatibility between the other layers. This will allow flexibility for programmers while still maintaining a strict standard for how these layers must interact with the ones above and below it.
Другие работы по теме:
Bridges Essay Research Paper Bridges are used
Bridges Essay, Research Paper Bridges are used to interconnect LANs using one or more of the IEEE 802.x standards, that is Ethernet or Token Ring LAN environments and also others. Bridges are devices with two or more ports, which connect LANs at the Data Link layer of the OSI Model. The purpose of bridges is to allow nodes connected to different LANs to communicate as if they were located on the same LAN.
Programming And Network Administration Essay Research Paper
Personality Working with computers is a great pleasure for anyone who ever has really discovered how they work. Maintaining computers can broken into a very broad range of duties or jobs. Two of my favorite, Programming and Network Administration, present me with the greatest interest.
Scarlet Colored Savior Essay Research Paper The
Scarlet Colored Savior Essay, Research Paper The mark of the beast came from within, the mark of the beast drew her sin. Hate is all she knew, hate from which she grew. Tattered and torn, scorn and forlorn she long awaits her savior. She knows not yet her saviors face, yet she searches- stopping at every corner.
Relative Dating Essay Research Paper The Fundamental
Relative Dating Essay, Research Paper The Fundamental Principles of Relative DatingRelative dating involves placing events in their proper chronological sequence, that is, in the order of their occurrence (Dutch 1998). This type of dating tells us which geologic event happened first, but does not give an exact date to which something happened.
Tsunami Essay Research Paper TsunamiA tsunami is
Tsunami Essay, Research Paper Tsunami A tsunami is a large water wave that is generated by sesmic activity in or underlying layers known as faults. These enormous wave have historically affected many ways of life and still lie as a major factor for destruction in our coastal communities throughout the world.
Links 2000 Essay Research Paper OK Now
Links 2000 Essay, Research Paper O.K. Now you have an account what do you do now? You need to setup Web folders in My Network Places. Not in Network neighborhood. This is only in WinME.If you are not using WinME you might not have this option. In that case you need to download & install Internet Explorer 5.5 from microsofts website here.After you install IE 5.5 come back here.
Tv Censorship Essay Research Paper Families all
Tv Censorship Essay, Research Paper Families all over America spend evening?s together watching t.v. This seems to be one of America?s favorite pastimes. But with all the violence that is involved with television programs the question arises on weither or not network television should be censored. It seems unlogical for theses censoring to take place.
Telecommunications Act Of 1996 Essay Research Paper
This paper analyzes the effects on the implementation of the Telecommunications Act of 1996 (”Act”) on US telecommunications markets and is based on my forthcoming book with the same title. The Act is a milestone in the history of telecommunications in the United States. Coming 12 years after the breakup of AT&T, the Act attempts to move all telecommunications markets toward competition.
How To Build An Outside Pond Essay
, Research Paper Choose your pond liner size. Once you have your preferred liner size, you want to find the perfect spot to place it. (Make sure it is not near any trees because leaves will fall in to the pond and the roots of the trees will tare the liner.) Now measure out the size that you want your pond to be (note-the size of the pond will be determined by the size of your liner).
Network Debate Essay Research Paper It was
Network Debate Essay, Research Paper It was a brutal race. They interrupted our daily scheduled shows with boisterous promises they could never fulfill. They invaded our towns and cities with their advertisements; their faces defaced our buses and benches. And still, no one has emerged as the clean victor.
OSI Layers Of A Network Essay Research
Paper During the past two decades there has been a tremendous increase in the numbers and sizes of networks. Many of the networks, however, were built using different implementations of hardware and
Market Power In The Deregulation Of Electicity
Essay, Research Paper Market power, which is at the heart of the debate over ownership and control of the electricity transmission network, has been identified by the FERC (Federal Energy Regulatory Commission) as a potential impediment to the development of an unencumbered competitive market for electricity.
Osi Reference Model Essay Research Paper The
Osi Reference Model Essay, Research Paper The OSI layers (from the bottom up) are as follows: Physical: Transmits data Data Link: Corrects transmission errors Network: Provides the physical routing information Transport: Verifies that data is correctly transmitted Session: Synchronizes data exchange between upper and lower layers Presentation: Converts network data to application-specific formats Application: End-user interface The application, presentation, and session layers are all application-oriented in that they are responsible for presenting the application interface to the user.
Internet PC
’s: Next Wave Or Nonsense? Essay, Research Paper Internet PC’s: Next Wave or Nonsense? Call them what you will: Internet appliances. Network terminals. The whole
Zero Effort Network Essay Research Paper Zero
Zero Effort Network Essay, Research Paper Zero Effort Networks (Z.E.N. works) is a great new tool in NetWare 5, that makes the network administrator’s job a lot easier by allowing him to spend less time
Mobile Alerts Essay Research Paper Mobile Alerts
Mobile Alerts Essay, Research Paper Mobile Alerts – Concept Paper. What is Mobile Alert? Mobile Alert is the text message (SMS) sent to a mobile phone as a result of occurrence of an event for which the mobile user has registered the request for getting the notification.
Windows 95 Beats Mac Essay Research Paper
Windows 95 Beats Mac Over the years, there has been much argument over which computer platform to buy. The two contenders in theis competions have been the PC , with its Windows
Fractional Distillation Essay Research Paper Crude Oil
Fractional Distillation Essay, Research Paper Crude Oil Crude oil is made frm dead animals under the sea which were compressed between layers of impermeable rock in sedimentary rock. Fractional Distillation Fractional distillation takes place at an oil refinery. The
Osi Model Essay Research Paper OSI is
Osi Model Essay, Research Paper OSI is a standard description or for how messages should be transmitted between any two points on a network. The OSI model defines seven layers that take place at each end of a communication. It is also valuable as a single reference view of communication that lets everyone have a common ground for education and discussion.
The Old Man And The See Essay
, Research Paper THE HISTORY OF INTERNET In the beginning of the 1970`s in USA was an older military network called ARPANET converted to Internetvork wish was a network between networks. Accept a few Universities
The Bus Network Essay Research Paper The
The Bus Network Essay, Research Paper The Bus Network The world revolves around technology. Everywhere we go we are affected either directly or indirectly by technology. In fact, almost everything that surrounds us is a product of technology. Cell phones, beepers, television, radio; these are just a few basic examples of technological advancement in our human history.
Computing Architectures Essay Research Paper IntroductionAn organization
Computing Architectures Essay, Research Paper IntroductionAn organization s computer network is a major asset and needs extensive planning for proper function. The network design process is a long and arduous task that requires knowledge of the business need of the organization and the technical skills to achieve those needs.
Computer Tech Essay Research Paper Common Network
Computer Tech Essay, Research Paper Common Network Architectures There are many different types of networks used today that could be evaluated. I would like to take a brief look at three main types of networks, the host-based network, the client-based network, and the client-server network. I would like to look at both the advantages and disadvantages of each type.
Home Computer Network Essay Research Paper Have
Home Computer Network Essay, Research Paper Have you ever needed to have more than one home computer for you and your family? Do you have two or more computers, but need to copy and/or share files and/or programs between them, but you don t know how? Do all of your computers need Internet access, but you don t want to have a phone line installed for each of them? Well, you can do all of this.
Network Security And Firewalls Essay Research Paper
Network, in computer science, techniques, physical connections, and computer programs used to link two or more computers. Network users are able to share files, printers, and other resources; send electronic messages; and run programs on other computers.
Network Support Essay Research Paper I have
Network Support Essay, Research Paper I have decided to research the Career path of a Network Support Specialists. I have been looking into this job field for quite sometime now, and still seem to be interested. A Network Support Specialist is responsible for the administration and maintenance of computers, network connection, e-mail, telephones and other IT related tools used by t he client.
What Is A Computer Network Essay Research
Paper What is a computer network? In simple terms, a computer network is a group of connected computers that allow the sharing of information and equipment. The most ordinary network is made up of two computers connected by some kind of cable in order to exchange information more quickly and efficiently. A standalone computer is very useful to many businesses, but without a network, those businesses would have to spend twice the amount of money then they would have to by having a network.
Internet Essay Research Paper Unfortunately there
Internet Essay, Research Paper Unfortunately, there’s a lot to worry about. There are security risks that affect Web servers, the local area networks that host Web sites, and even innocent users of Web browsers.
Token Vs Ethernet Essay Research Paper Well
Token Vs Ethernet Essay, Research Paper Well, now I feel confused about this whole situation. I started taking classes part time at BU about five years ago. I took two networking classes, Network hardware and Network management. I didn?t transfer my credits to um because the technology had changed so fast, and I wanted to learn the newest technology.