Sample Essay on:
Open Systems Interconnect (OSI) Model

Here is the synopsis of our sample research paper on Open Systems Interconnect (OSI) Model. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This 3 page paper provides an overview of each of the 7 layers in the OSI model, including responsibility of each layer, technology and sample protocols used. Bibliography lists 2 sources.

Page Count:

3 pages (~225 words per page)

File: MM12_PGosicom.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

each of which is responsible for performing specific functions (Brown, 2000). There numerous things involved in the process of sending and receiving data, such as voltages and signals on the cable, network adapters, how data is packaged, error control for anything that may go wrong, and so on (Brown, 2000). Having functions separated into separate layers makes software writing easier (Brown, 2000). * Layer 7: Application Layer - provides applications with access to network services (Brown, 2000). User information at this layer is called and maintained as user data (Squatty.com, 2004). Security at this layer includes authentication, confidentiality, data integrity and non-repudiation. Technology used: Gateway. A sample of the many protocols used include: HTTP, SMTP, FTP, TELNET, GOPHER and NCP (Squatty.com, 2004). * Layer 6: Presentation Layer - the format that will be used to exchange data among networked computers is determined at this layer (Brown, 2000). Responsible for character conversion, e.g., ASCII, encryption and decryption, compression (Squatty.com, 2004). User information at this layer is called messages (Squatty.com, 2004). Security at this layer: confidentiality, authentication, encryption. Technology used: Gateway. Protocols include: ASCII, EBCDIC, POSTSCRIPT, JPEG, MPEG, GIF (Squatty.com, 2004). * Layer 5: Session Layer - This layer allows two applications to establish, use and disconnect a connection between them, which is called a session. This layer provides for name recognition and other functions, such as security that are needed to allow the applications to communicate over the network (Brown, 2000). No security at this layer Technology used: Gateways. Protocols: Remote Procedure Calls (RPC) and SQL, RADIUS, DNS, ASP (Squatty.com, 2004). * Layer 4: Transport Layer - This assures correct delivery of data, e.g., data delivered without errors, in proper sequence, and with no duplications, corruption or losses. Data are repackaged at this layer, ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now