Here is the synopsis of our sample research paper on Open Systems Interconnect (OSI) Model. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 3 page paper provides an overview of each of the 7 layers in the OSI model, including responsibility of each layer, technology and sample protocols used. Bibliography lists 2 sources.
Page Count:
3 pages (~225 words per page)
File: MM12_PGosicom.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
each of which is responsible for performing specific functions (Brown, 2000). There numerous things involved in the process of sending and receiving data, such as voltages and signals on
the cable, network adapters, how data is packaged, error control for anything that may go wrong, and so on (Brown, 2000). Having functions separated into separate layers makes software
writing easier (Brown, 2000). * Layer 7: Application Layer - provides applications with access to network services (Brown, 2000). User information at this layer is called and maintained as user
data (Squatty.com, 2004). Security at this layer includes authentication, confidentiality, data integrity and non-repudiation. Technology used: Gateway. A sample of the many protocols used include: HTTP, SMTP, FTP, TELNET, GOPHER
and NCP (Squatty.com, 2004). * Layer 6: Presentation Layer - the format that will be used to exchange data among networked computers is determined at this layer (Brown, 2000).
Responsible for character conversion, e.g., ASCII, encryption and decryption, compression (Squatty.com, 2004). User information at this layer is called messages (Squatty.com, 2004). Security at this layer: confidentiality, authentication, encryption.
Technology used: Gateway. Protocols include: ASCII, EBCDIC, POSTSCRIPT, JPEG, MPEG, GIF (Squatty.com, 2004). * Layer 5: Session Layer - This layer allows two applications to establish, use and disconnect a
connection between them, which is called a session. This layer provides for name recognition and other functions, such as security that are needed to allow the applications to communicate
over the network (Brown, 2000). No security at this layer Technology used: Gateways. Protocols: Remote Procedure Calls (RPC) and SQL, RADIUS, DNS, ASP (Squatty.com, 2004). * Layer 4:
Transport Layer - This assures correct delivery of data, e.g., data delivered without errors, in proper sequence, and with no duplications, corruption or losses. Data are repackaged at this layer,
...