Abstract
The protocols used in a computer network are the mechanisms by which the various entities: nodes, hosts, processes, and users, exchange information in a secure and controlled manner. Because of the number of entities involved, communications protocols are structured into layers, each layer having its own specific protocol. The purpose of a layer is to carry out communication for a higher layer using lower layers as carriers. Each layer allows communication between two similar entities, for example node to node, host to host, user to user. The boundaries between layers has been the subject of considerable debate in standards committees throughout the Western world. Various networks already implemented have defined their own protocols and therefore their own layers. New networks are trying to match the currently agreed layer architecture so that intercommunication will be possible through standard mechanisms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1982 Robert Cole
About this chapter
Cite this chapter
Cole, R. (1982). The X25 Network Access Protocol. In: Computer Communications. Springer, New York, NY. https://doi.org/10.1007/978-1-4757-3915-2_8
Download citation
DOI: https://doi.org/10.1007/978-1-4757-3915-2_8
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4757-3917-6
Online ISBN: 978-1-4757-3915-2
eBook Packages: Springer Book Archive