Show upper layers of tcp-ip model, Computer Networking

Assignment Help:

Q. Show Upper Layers of tcp-ip model?

The Session Layer

- The Session layer allows two parties to hold ongoing communications called a session across a network.

- Not found in TCP/IP model

- In TCP/IP its characteristics are offered by the TCP protocol.(Transport Layer)

The Presentation Layer

The Presentation Layer manages data format information for networked communications. This is complete by converting data into a generic format that could be understood by both sides.

- Not found in TCP/IP model

- In TCP/IP this function is offered by the Application Layer.

Example - External Data Representation Standard (XDR)

MIME (Multipurpose Internet Mail Extensions)

The Application Layer

The Application Layer is the highest layer of the reference model. It offers a set of interfaces for applications to obtain access to networked services as well as access to the kinds of network services that support applications directly.

- MHS, DS, OSI- FTAM, VT, CMIP

TELNET, TCP/IP- FTP, SMTP, DNS, SNMP

- Even though the notion of an application process is common to both their approaches to constructing application entities are different.


Related Discussions:- Show upper layers of tcp-ip model

How does a switch use store and forward, The LAN switch copies the whole fr...

The LAN switch copies the whole frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and verifies the outgoing interface

Message passing programme development environment, Message Passing Programm...

Message Passing Programme Development Environment In a multicomputer system, the computational load among various processors must be balanced. To pass information among variou

Explain ethernet addressing, Ethernet Addressing Every station on t...

Ethernet Addressing Every station on the network must have a unique physical address Offered by a six-byte physical address encoded on the network interface card (NIC)

Define the term - store-and-forward and cut-through switch, Store-and-forwa...

Store-and-forward switch  The layer 2 switch accepts a frame on an input line, buffers it briefly, and then routes it to the appropriate output line. Cut-through switch

C-band earth station , Normal 0 false false false EN-US...

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4

Intrinsic functions, Intrinsic Functions HPF introduces some new intri...

Intrinsic Functions HPF introduces some new intrinsic functions in addition to those defined in F90. The two most regularly used in parallel programming are the system inquiry

Computes their distance vector for network, Consider the following network ...

Consider the following network example. Suppose that the distance vector (DV) routing algorithm is used to compute the distance between nodes. (a) Show the procedure of nod

What are the internal threats - security, What are the Internal Threats ...

What are the Internal Threats Internal security problems are probably the most common. One never knows what someone is going to do. Even the most loyal employees or workers can

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd