Assignment 1
Assignment 1
Page 1 of 8
• Presentation Layer:- The presentation layer is concerned with the syntax and
semantics of the information exchanged between two systems.
The responsibilities are as:-
Translation:- Translate information from sender format- Common format-
Receiver
Format.
Encryption :- information encrypted to transfer from sender and decrypted at receiver
side.
Compression:- perform data compression required
• Application Layer:- The application layer enables the user, whether human or
software, to access the network.
It provides user interfaces and support for services such as electronic mail, remote file access
and transfer, shared database management, and other types of distributed information
services. The services provided by application layer are as :-
Network virtual terminal
File transfer, access, and management (FTAM).
E-mail services.
Directory services.
Layer 1: Network Interface - This layer combines the Physical and Data layers and routes
the data between devices on the same network. It also manages the exchange of data between
the network and other devices.
Layer 2: Internet - This layer corresponds to the Network layer. The Internet Protocol (IP)
uses the IP address, consisting of a Network Identifier and a Host Identifier, to determine
the address of the device it is communicating with.
Layer 3: Transport - Corresponding to the OSI Transport layer, this is the part of the
protocol stack where the Transport Control Protocol (TCP) can be found. TCP works
by asking another device on the network if it is willing to accept information from the local
device.
Layer 4: Application - Layer 4 combines the Session, Presentation and Application layers of
the OSI model. Protocols for specific functions such as e-mail (Simple Mail Transfer
Protocol, SMTP) and file transfer (File Transfer Protocol, FTP) reside at this level.
As you can see, it is not necessary to develop a separate layer for each and every function
outlined in the OSI Reference Model. But developers are able to ensure that a certain level of
compatibility is maintained by following the general guidelines provided by the model.
Unachievable is Achievable
It can generate
4.29×109 address Address space of IPv6 is quite large it
Security feature is
dependent on IPSEC is inbuilt security feature in the
Fragmentation
performed by Sender In IPv6 fragmentation performed only
available
In IPv4 checksumfield
Page 8 of 8