Nt1310 Unit 3 Data Analysis

Decent Essays
In OSI stack, presentation layer converts data transferred by the application layer of the transport node.
The functions of presentation layer are :
1. Data transcription
2. Data reconstruction
3. Data Encryption and Decryption
4. Data compression
Data Transcription:
Networks has the ability to connect many servers on the same single network. The presentation layer is constructed for uncertainty while transferring data between networked systems.
Data Conversion:
Presentation layer also implement bit order reversal functions. It converts carriage return data to carriage return with line feed data and it also converts integers to floating point numbers.
Data Compression:
The presentation layer decreases the number of bytes for transmission,

Related Documents

  • Improved Essays

    The design idea we had was modified several times. Initially the fingers that were constructed for the hand seemed to work and look fine in our Solidworks assembly. We did not want the fingers to be too large as the girl were were designing the hand for is only seven years old. However, after printing them, we quickly realized that they were far too small to be able to exert the force to grasp a water bottle. Furthermore, because they were so small, it was difficult for the 3D printer to print out the finger because the walls were so thin.…

    • 1064 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    I just talked to Todd and found out that the reason the cord is not transferred in SAP and delivered along with the rest of the order is due to the N.E.W. limits. The Canopy group holds on to cord that has been transferred on a previous order for future jobs instead of notifying Stores when they are done with the current one so that we can transfer it back to a mag for storage. This would alleviate the inventory in Canopy and allow us to make the transfer at the same time the order is being delivered. The way it has been done since SAP went live is for Canopy to let Stores know when they are ready for it, we drop it off and pick up any cord that is not needed, and then make the transfers in SAP so that there are no hard stops and no safety…

    • 260 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    It is composed of software controllers that communicate with the forwarding network fundamentals through standard interfaces, referred also as the South Bound Interface. The last layer is called Application Layer which takes care of…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The following data is received from a real-time measuring device and is stored at memory location Data1. You are required to write an assembly language program segment with the corresponding data definition directives that would extract the data items and store them at memory locations Day, Month, Year, Temperature and Pressure. [10 points] 5 bits 4 bits 7 bits 8 bits 8 bits Day Month Year Temperature Pressure Write an assembly language program for the following HLL code: [10 Points] unsigned int crc32(const char* data, size_t length) { const unsigned int POLY = 0xEDB88320; unsigned int reminder = 0xFFFFFFFF; for(size_t i = 0; i < length; i++){ reminder ^= (unsigned char)data[i]; // must be zero extended for(size_t bit = 0; bit…

    • 144 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    type of signals, as EEG, ECOG and EAP, that can be capture from recording blocks. All these signals have their particular properties. This particular work focuses on the recording of extracellular action potentials (EAPs). NRS usually implanted inside the brain, very near to the cortex part so that they can be close proximity of the neurons. Additional advantage for doing this is that it prevents the signal for catching noise and interferences from other…

    • 75 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3 Case Study

    • 283 Words
    • 2 Pages

    The kernel is not a fast food venor in this case but the system in which the operating system of the computer (such as Mac, Windows, Linux etc…) communicates with the cpu. What this bug has caused is a massive breach in the way this communication is happening because it has halted the communication from being coded allowing hackers to come in and destroy peoples systems. There should be a full investigation on Intel and any of the other affected chip makers and to prevent this from happening with any other chipsets in the future there needs to be government inspectors in this industry. I hope to learn why Intel/ARM chipset makers did not notice this bug and why they didn’t notify the public of this when they 1st discovered it. I also hope to…

    • 283 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 3 Case Study

    • 305 Words
    • 2 Pages

    Answer 3:- A:- When it is very expensive and slow to access the external network then we use Forwarding name server . What is does keep the records of frequently visited sites in local DNS cache. This improves the efficiency . B:- Round Robin mechanism is used for load balancing . DNS hold maximum record of entry.…

    • 305 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 1 Case Study

    • 333 Words
    • 2 Pages

    1. Message confidentiality means that a message being sent cannot be read by anyone other than the intended recipients, and message remains confidential and it cannot be read by unauthorized ones. Integrity defines the process of data is modified based on cryptographic procedures like hashing and message code techniques that ensures the message is not modified.…

    • 333 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Statistics on the amount and distribution of windows on office buildings was not provided in the 2003 CBECS data. Appendix G of Standard 90.1-2004 required that the vertical fenestration areas modeled in the baseline equal the vertical fenestration area of the proposed design or 40% of the gross above-grade wall area, whichever was smaller. For the baseline and proposed model, the amount and distribution of windows was taken off of the existing architectural drawings of the building. The fenestration area equaled 7.8% of the gross above –grade wall…

    • 89 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    1. The language is improved in the manuscript. 2. All typographical errors are rectified as highlighted in the manuscript. 3.…

    • 49 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    c. Data computing The IoT devices are going to handle a lot of information for better consumer experience. This information needs to be analyzed and processed in real time. If the data is not processed in an appropriate time frame, then that would lead to consumer dissatisfaction. Moreover, the issue lies in the amount of data that will be generated from the IoT devices.…

    • 1436 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Provide administrative support to Vice President and 4 Directors. Was the "single point of contact" for the administrative (arranging travel, scheduling meetings and conference calls, event logistics, maintaining records or files, responding to visitors and telephone calls) needs of assigned internal customers and provided services in a manner that demonstrated the highest levels of quality, accountability, and…

    • 58 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    However the most popular ways to transit a message is oral or written. Written communication holds a very broad portion in a business environment. When a sender gathers all the proper information and chooses a channel the next step would be to encode the message. The Encoding of a message is a component can be characterized as a way for the sender to apply knowledge,…

    • 979 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Wireless Networking Essay

    • 5190 Words
    • 21 Pages

    1.2 Background The Internet has made an enormous impact on the world of communications. It has interconnected billions of networking devices all over the world. These devices share information with each other in the form of digital data packets. The networking protocols are responsible for the safe delivery of these packets to their respective destinations.…

    • 5190 Words
    • 21 Pages
    Great Essays
  • Improved Essays

    Good Communication Essay

    • 1350 Words
    • 6 Pages

    will increase the performance and efficiency. It will help staff and people better. Image 1 The graph above is the basic flow of the communication. When the message sent from the sender…

    • 1350 Words
    • 6 Pages
    Improved Essays