.

Wednesday, April 24, 2019

Network Design management (Dissertation) Literature review

Network Design management (Dissertation) - Literature review Example notional framework OSI reference model The OSI model (operation clays interconnection) is used to distribute the internal activities of a converses system into a number of bottoms (Kozierok, 2005). The model distributes the communication system into seven different logical points where each layer is designed to perform a unique function. The seven layers argon given below Layer 1 The archetypal layer is known as the somatogenetic layer. The first layer is used to specify the physical and electrical needs of the device. The physical layer basically provides a connection between the transmission strength i.e. the communication cable and the device itself. Other than that the physical layer sets up the connection with the communicating device, terminates the communication and the conversion of digital entropy into analogue signals (Kozierok, 2005). Layer 2 The second layer of the OSI model is the entropy link layer. The data link layer is responsible for detecting any errors that occur at the first level of the device. In addition the data link layer also handles the flow control of the packets of data. The data link layer is divided into two parts the macintosh (Media Access Control) layer and the LLC (Logical Link Control) layer. The MAC layer handles all the activities that allow the device to gain permission to access a network and to gestate the data packet. While the LLC layer is responsible for handling the flow control, error checking and flow control of the data packet (Kozierok, 2005). Layer 3 The third layer is called the network layer and it creates virtual paths on which the data packet is transmitted. Moreover the network layer is responsible for congestion control and addressing the packet (Kozierok, 2005). Layer 4 The fourth layer is the transport layer ensures that the entire data packet layer is transferred from the vectors end to the receivers end. Layer 5 The ses sion layer is responsible for establishing sessions between the senders finishings and the receivers application. Layer 6 The presentation layer encrypts and decrypts the message from the data packet. The application layer transforms the data into a form that the application can understand. The application layer encrypts the data in such a way that data transferred faces no compatibility issues (Kozierok, 2005). Layer 7 The application layer is the layer with which the user has the most interaction. The application layer supports all the user applications and the users activities. User authentication, musical note of service and privacy are taken into account at this layer (Kozierok, 2005). E-governance engineering methodology in that respect has been a lot of work and research carried out regarding the performance measurements used within the public sector. criterion the service quality and performance monitoring are just some of examples where significant progress has been mad e. However, thither always has been an issue of how these factors are to be integrated with various process of designing and development processes that are regularly used for e-governance projects (Carter et al., 1995). By adopting and implementing the correct methodology the integration of e-governance process and planning and designing operate could become a possibility. There have been a

No comments:

Post a Comment