Communications System Owner Manual
Table Of Contents
- Table of Contents
- ABOUT THIS DOCUMENT
- 1. INTRODUCTION TO CONNECTIVITY
- 2. COMMUNICATION SYSTEM NETWORKING (em AN OVERVIEW
- 3. TANDEM TIE TRUNK NETWORKS
- 4. MAIN-SATELLITE/TRIBUTARY (MS/T) NETWORKS THROUGH THE UDP OR MULTIPREMISES PACKAGES
- 5. ELECTRONIC TANDEM NETWORK (ETN) THROUGH THE ETN AND PNA PACKAGES
- 6. DISTRIBUTED COMMUNICATIONS SYSTEM (DCS)
- 7. DATA CONNECTIVITY - AN OVERVIEW
- 8. DATA COMMUNICATIONS CAPABILITIES
- 9. DATA COMMUNICATIONS CONFIGURATIONS
- A. RELATED DOCUMENTS
- B. SYNCHRONIZATION OF DIGITAL FACILITIES
- THE NEED FOR SYNCHRONIZATION
- SYNCHRONIZATION HIERARCHY
- CHANGES TO THE SCS SOFTWARE MADE AVAILABLE VIA SOFTWARE PATCHES
- NETWORK SYNCHRONIZATION AND ENGIINEERING
- AVAILABILITY OF SYNCHRONIZATION SOURCES
- CONCLUSIONS ON SYNCHRONIZATION
- USE OF GENERIC 2 AS A SYSTEM CLOCK REFERENCE
- USE OF GENERIC 1 AS A SYSTEM CLOCK REFERENCE
- C. TRUNKING TERMS AND CAPABILITIES
- D. COMMUNICATIONS PROTOCOLS
- E. LEAD DEFINITIONS
- F. NETWORKING FEATURES - AVAILABILITY MATRIX
- ABBREVIATIONS
- GLOSSARY
- INDEX
COMMUNICATIONS PROTOCOLS D-5
_ ______________________________________________________________________________________
_ ______________________________________________________________________________________
_ ______________________________________________________________________________________
Session Layer
The session layer, or layer 5, provides a mechanism for controlling dialogue between applications. It
establishes, manages, and terminates connections between cooperating applications.
Presentation Layer
The presentation layer, or layer 6, provides independence to the application processes from differences in
syntax. This layer defines the syntax used for communication between applications and provides for the
selection and subsequent modification of the type of communication to be used. Encryption is a type of
presentation layer protocol.
Application Layer
The application layer, or layer 7, provides a means for distributed applications to access the OSI
environment. Examples of protocols at this level are file transfer and electronic mail protocols (for
example, X.400).
STANDARD PROTOCOLS
Standards organizations differ according to how they name the standards they formulate. For you to
determine whether a standard applies, it may be helpful to you to become familiar with the following
naming conventions:
• Names of digital standards formulated by the CCITT start with X.
• Names of analog standards formulated by the CCITT start with V.
• Names of ISDN standards formulated by the CCITT start with I or Q.
• Names of standards formulated by the EIA start with RS (for recommended standard).
• Names of telecommunication standards formulated by the U.S. federal government start with FED-STD.
• Names of information processing standards formulated by the U.S. federal government start with FIPS.
• Names of standards formulated by the IEEE start with IEEE.
• Names of standards formulated by ANSI start with X.
CCITT Standards
Tables 1-1, 1-2, and 1-3 name some CCITT digital, analog, and ISDN standards. If the CCITT standard is
equivalent to any other standard, the name of the equivalent standard is also given.