top-rated free essay

Introduction to Computer and Network Hardware

By bambam399 Mar 13, 2011 424 Words
Unit 2 IP
Carl Hanner
American Intercontinental University
February 25, 2011

The Application Layer is launched when an application operation starts. It starts the communication with another computer when an application starts. It is in software packages that use client-server software. Examples of services within this layer are DNS, web browser, and NFS.

The Presentation Layer decides how to format the data and the encryption if any is used it formulates the data so that it is acceptable to the layer above. This layer gives functionality between the host OS and software layers. Basically it formats the data that is being sent into a presentable format for the application layer. MIDI, HTML, GIF, and JPEG are examples of the data formats used.

The Session Layer manages the sequencing of the transaction and sometimes the authorization. This layer creates notifications if messages fail it also manages conversations going both ways and can handle many different conversations. The session layer will not pass the data along until the conversation of data is complete. RPC, SQL, NetBIOS, are some examples of these protocols.

The Transport Layer reassembles the packets which are broken up and placing the data in the proper order to be transmitted across certain media. At this layer error recovery is also performed. The following are examples TCP, UDP, and SPX.

The Network Layer is accountable for implementing a logical addressing scheme and for transporting the packets from one end to the other end. The network layer can be connectionless or it can be connection oriented. This layer is also responsible for breaking larger packets up for delivery depending on the media this is known as packet switching. These protocols include Apple talk DDP, IP, and IPX.

The Data Link Layer provides the connections between entities on the network it handles getting data over a specific medium. This layer handles Flow Control and layer sequencing if required. The correct sequence is preserved within the frames it also handles transit delay. This layer also checks the frame for errors using the FCS if it detects errors it discards the frame. Examples are IEEE 802.2, 802.3, HDLC, and Frame Relay. The Physical Layer handles the material aspects of the media being used to send out data. It sets up the binary pattern, buffers the data and ensures synchronization. It decodes the bit stream then notifies the data link layer the frame was received then passes it up. Ethernet, RJ45, V.24, V.35, and NRZ are examples of specifications used in this layer.

Cite This Document

Related Documents

  • Computer networks assignment

    ... Table of Contents Introduction Below is the report is a report outlining the steps that were undertaken in order to come up with a computer network design that will benefit the company, and help improve the security and safety of the company’s information while also improving communication among the four offices. Ta...

    Read More
  • Computer Networks

    ...BUYUKHAN COMPUTER NETWORKS NETWORK TELEPHONY –VOICE OVER INTERNET PROTOCOL(VoIP) VoIP is a set of technologies that enable voice calls to be carried over the internet (or other networks designed for data), rather than the traditional telephone landline system-the Public Switched Telephone Networks(PSTN). VoIP uses IP protocols, originall...

    Read More
  • Introduction to Network Concepts

    ...Introductory Network Concepts, Network Standards, and the OSI Model 1. There are many reasons for a company to network its computers, some are as follows; Share software, information with others on networks, cheaper than buying individual software and hardware for each standalone especially if the software often offers deals for amount be...

    Read More
  • Computer Networks

    ...- Suresh Khanal Computer Networking Short Questions and Answer Computer Networking Short Questions and Answers Suresh Khanal Kalanki, Kathmandu Published By: contact: Computer Networking: Short Questions and Answers Published by PS ...

    Read More
  • Computer Network Security and Firewall

    ... Principals of Information Security 4th Edition Questions Chapter 6 Questions 1. What is the typical relationship among the untrusted network, the firewall, and the trusted network? The relationship is that data is only limited to what firewalls allow via specific places called “ports”. There is the untrusted network on the outside, ...

    Read More
  • computer networks lab

    ...CS2307-COMPUTER NETWORKS LAB MANUAL PROGRAM USING TCP SOCKETS EX NO: 1.i DATE AND TIME SERVER AIM: TO implement date and time display from local host to server using TCP ALGORITHM: CLIENT 1.start the program 2. To create a socket in client to server. 3. the client connection accept to the server and replay to read the system date...

    Read More
  • Computer Networks and the Internet

    ...1 IS 450/650, Fall 2013, Computer Networks and the Internet Today: • Roster • Syllabus Overview (Syllabus on Blackboard) • Chapter 1 Announcements & Reminders: • 450-1 Homework 1 Due Tuesday 9/17 at 23:59. • 450-1 (TR) Test 1 Tuesday 10/1 • 450-1 (TR) Test 2 Thursday 11/7 • 450-1 (TR) Final Exam Thursday 12/19 8-10 a...

    Read More
  • Computer Network

    ...Bahçeşehir University Department of Computer Engineering CMPE 2204 Introduction to Computer Networks Spring 2013 Chapter 1 Data Communications and Networks Overview and Protocol Layers Dr. Çağrı Güngör 1 Basic Info about the Course • Course Content (tentative): — Computer networks; network architectures; protocol layers;...

    Read More

Discover the Best Free Essays on StudyMode

Conquer writer's block once and for all.

High Quality Essays

Our library contains thousands of carefully selected free research papers and essays.

Popular Topics

No matter the topic you're researching, chances are we have it covered.