Syntax conversion, Computer Network Security

Assignment Help:

Write down the significance of the syntax conversion . Syntax Conversion is described below:

Syntax conversion is a significant function carried out in the presentation layer. It is generally a process of converting the syntax of data received from higher layer that is application layer into a standard format which can be easily understood by all the receiving layers. The benefit of performing syntax conversion is that it enables a smooth data communication among different OSI layers. (Which contain their own syntax). While the conversion of syntax is being done, presentation layer ensures the semantics of messages remain unchanged.

Let us take an example wherein two systems (which follow two different syntax) are communicating with each other, one system stores data in big-endian representation  and the other stores data in small endian representation.

In order to arrange the communication between these two systems the best method is to convert data into a “universal” format that is understood by both the systems. The advantage of using such data conversion approach is that it is extensible that is whenever a new system with different data format is added then instead of understanding different format  used  by  the  other  systems  the  newly  added  system  required  to  understand  the  way  of converting data to and then from the universal format.


Related Discussions:- Syntax conversion

What is internet, The Internet is known as the set of networks connect...

The Internet is known as the set of networks connected by routers that are configured to pass traffic among any machine attached to any network in the set. By internet several

Parsing ipv6 headers, PARSING IPv6 HEADERS Base header is fixed in siz...

PARSING IPv6 HEADERS Base header is fixed in size i.e. 40 octets. NEXT HEADER field in the base header describe kind of header and it seems at end of fixed-size base header. S

Network, what is computer network?

what is computer network?

Ring topology, RING TOPOLOGY In this topology of network the devices a...

RING TOPOLOGY In this topology of network the devices are connected to each other in packed loop. In this network first computer passes data packet to the second and then seco

Potential risks to information systems, Information System Security 1. ...

Information System Security 1. Write about: a. Potential Risks to Information Systems b. Factors to be addressed for making information systems more secure 2. Write about t

Need assignemnt help in information security assignemnt, Need Assignemnt he...

Need Assignemnt help in Information security assignemnt

Threat identification-risk management, Threat Identification After ident...

Threat Identification After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats

Major difference between a virus and a worm, Question: (a) State wheth...

Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

Vigenere Cipher, What key which if used to encrypt the ciphertext again wou...

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd