Saturday, October 5, 2019

Network Design management (Dissertation) Literature review

Network Design management (Dissertation) - Literature review Example Theoretical framework: OSI reference model: The OSI model (operation systems interconnection) is used to distribute the internal activities of a communications system into a number of layers (Kozierok, 2005). The model distributes the communication system into seven different logical layers where each layer is designed to perform a unique function. The seven layers are given below: Layer 1: The first layer is known as the physical layer. The first layer is used to specify the physical and electrical needs of the device. The physical layer basically provides a connection between the transmission medium i.e. the communication cable and the device itself. Other than that the physical layer sets up the connection with the communicating device, terminates the communication and the conversion of digital data into analogue signals (Kozierok, 2005). Layer 2: The second layer of the OSI model is the data link layer. The data link layer is responsible for detecting any errors that occur at the first level of the device. In addition the data link layer also handles the flow control of the packets of data. The data link layer is divided into two parts the MAC (Media Access Control) layer and the LLC (Logical Link Control) layer. The MAC layer handles all the activities that allow the device to gain permission to access a network and to transmit the data packet. While the LLC layer is responsible for handling the flow control, error checking and flow control of the data packet (Kozierok, 2005). Layer 3: The third layer is called the network layer and it creates virtual paths on which the data packet is transmitted. Moreover the network layer is responsible for congestion control and addressing the packet (Kozierok, 2005). Layer 4: The fourth layer is the transport layer ensures that the entire data packet layer is transferred from the sender’s end to the receiver’s end. Layer 5: The session layer is responsible for establishing sessions between the sender†™s applications and the receiver’s application. Layer 6: The presentation layer encrypts and decrypts the message from the data packet. The application layer transforms the data into a form that the application can understand. The application layer encrypts the data in such a way that data transferred faces no compatibility issues (Kozierok, 2005). Layer 7: The application layer is the layer with which the user has the most interaction. The application layer supports all the user applications and the user’s activities. User authentication, quality of service and privacy are taken into account at this layer (Kozierok, 2005). E-governance engineering methodology: There has been a lot of work and research carried out regarding the performance measurements used within the public sector. Measuring the service quality and performance monitoring are just some of examples where significant progress has been made. However, there always has been an issue of how these factors a re to be integrated with various process of designing and development processes that are regularly used for e-governance projects (Carter et al., 1995). By adopting and implementing the correct methodology the integration of e-governance process and planning and designing services could become a possibility. There have been a

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.